{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T03:07:04Z","timestamp":1696561624867},"reference-count":0,"publisher":"RFC Editor","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.17487\/rfc8019","type":"report","created":{"date-parts":[[2016,11,16]],"date-time":"2016-11-16T08:19:04Z","timestamp":1479284344000},"source":"Crossref","is-referenced-by-count":5,"title":["Protecting Internet Key Exchange Protocol Version 2 (IKEv2) Implementations from Distributed Denial-of-Service Attacks"],"prefix":"10.17487","author":[{"given":"Y.","family":"Nir","sequence":"first","affiliation":[]},{"given":"V.","family":"Smyslov","sequence":"additional","affiliation":[]}],"member":"7045","published-online":{"date-parts":[[2016,11]]},"container-title":[],"original-title":[],"deposited":{"date-parts":[[2016,11,16]],"date-time":"2016-11-16T08:19:05Z","timestamp":1479284345000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.rfc-editor.org\/info\/rfc8019"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":0,"URL":"https:\/\/doi.org\/10.17487\/rfc8019","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}