{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:26:22Z","timestamp":1752283582640},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,25]]},"DOI":"10.23919\/cnsm52442.2021.9615566","type":"proceedings-article","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T20:30:34Z","timestamp":1638477034000},"source":"Crossref","is-referenced-by-count":3,"title":["Analyzing and Assessing Pollution Attacks on Bloom Filters: Some Filters are More Vulnerable than Others"],"prefix":"10.23919","author":[{"given":"Pedro","family":"Reviriego","sequence":"first","affiliation":[]},{"given":"Ori","family":"Rottenstreich","sequence":"additional","affiliation":[]},{"given":"Shanshan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Fabrizio","family":"Lombardi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1368436.1368454"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2378268"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2010.07.024"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1140103.1140317"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.26"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.031611.00024"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415673"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS51098.2021.9352944"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2306060"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3306193"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.21"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269076"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2889329"},{"key":"ref28","article-title":"A model for learned Bloom filters and optimizing by sandwiching","author":"mitzenmacher","year":"0","journal-title":"Annual Conference on Neural Information Processing Systems (NeurIPS)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354235"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196909"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3080008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488624"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3059075"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1137\/080733772"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129096"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365431"},{"key":"ref9","article-title":"Cuckoo filters and Bloom filters: Comparison and application to packet classification","author":"reviriego","year":"2021","journal-title":"IEEE Transactions on Network and Service Management (TNSM)"},{"key":"ref1","article-title":"Denial of service via algorithmic complexity attacks","author":"crosby","year":"0","journal-title":"USENIX Security Symposium"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2272604"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(94)00032-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2015.11.002"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14778\/3303753.3303757"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.46"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00026"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261978"}],"event":{"name":"2021 17th International Conference on Network and Service Management (CNSM)","location":"Izmir, Turkey","start":{"date-parts":[[2021,10,25]]},"end":{"date-parts":[[2021,10,29]]}},"container-title":["2021 17th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9615441\/9615442\/09615566.pdf?arnumber=9615566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T20:53:34Z","timestamp":1647896014000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9615566\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,25]]},"references-count":32,"URL":"https:\/\/doi.org\/10.23919\/cnsm52442.2021.9615566","relation":{},"subject":[],"published":{"date-parts":[[2021,10,25]]}}}