{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:19:55Z","timestamp":1755998395095},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,2]]},"DOI":"10.23919\/cnsm50824.2020.9269076","type":"proceedings-article","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T21:36:55Z","timestamp":1606772215000},"source":"Crossref","is-referenced-by-count":8,"title":["Pollution Attacks on Counting Bloom Filters for Black Box Adversaries"],"prefix":"10.23919","author":[{"given":"Pedro","family":"Reviriego","sequence":"first","affiliation":[]},{"given":"Ori","family":"Rottenstreich","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2944954"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3373360.3380845"},{"key":"ref12","article-title":"Denial of Service via Algorithmic Complexity Attacks","author":"crosby","year":"2003","journal-title":"Proc Usenix Security Symposium"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30045-5_11"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.2972895"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354235"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.2983405"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365431"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3306193"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.21"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.09.003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129096"},{"key":"ref6","article-title":"Towards Application of Cuckoo Filters in Network Security Monitoring","author":"grash\u00f6fer","year":"2018","journal-title":"International Conference on Network and Service Management (CNSM)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2252341"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2889329"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/90.851975"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.031611.00024"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486415"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2010.07.024"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/BF01190898"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2012.6378946"},{"key":"ref23","author":"gelman","year":"2007","journal-title":"Data Analysis Using Regression and Multi-level\/Hierarchical Models"}],"event":{"name":"2020 16th International Conference on Network and Service Management (CNSM)","location":"Izmir, Turkey","start":{"date-parts":[[2020,11,2]]},"end":{"date-parts":[[2020,11,6]]}},"container-title":["2020 16th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9269033\/9269034\/09269076.pdf?arnumber=9269076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T01:41:36Z","timestamp":1620265296000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9269076\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,2]]},"references-count":23,"URL":"https:\/\/doi.org\/10.23919\/cnsm50824.2020.9269076","relation":{},"subject":[],"published":{"date-parts":[[2020,11,2]]}}}