{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T04:54:04Z","timestamp":1694840044438},"reference-count":10,"publisher":"International Academy Publishing (IAP)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"DOI":"10.4304\/jcp.9.6.1426-1435","type":"journal-article","created":{"date-parts":[[2014,6,1]],"date-time":"2014-06-01T16:37:28Z","timestamp":1401640648000},"source":"Crossref","is-referenced-by-count":1,"title":["DDoS: Flood vs. Shrew"],"prefix":"10.17706","volume":"9","author":[{"given":"Zhijun","family":"Wu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guang","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Meng","family":"Yue","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hualong","family":"Zeng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"7163","published-online":{"date-parts":[[2014,6,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2171057"},{"key":"ref2","first-page":"75","article-title":"Low-rate TCP-targeted denial of service attacks","volume-title":"Proceedings of ACM SIGCOMM 2003","author":"Kuzmanovic","year":"2003","unstructured":"[3] Kuzmanovic. A, Knightly. E. W, \"Low-rate TCP-targeted denial of service attacks,\" Proceedings of ACM SIGCOMM 2003, Karlsruhe, Germany, 2003: 75- 86."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.880180"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2012.04237"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2024719"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2013.5211"},{"key":"ref7","first-page":"1","article-title":"Analysis of the SYN Flood DoS Attack","volume":"8","author":"Bogdanoski","year":"2013","unstructured":"[9] Mitko Bogdanoski,Tomislav Shuminoski, and Aleksandar Risteski, \"Analysis of the SYN Flood DoS Attack\", I. J. Computer Network and Information Security, 2013, 8:1-11.","journal-title":"I J Computer Network and Information Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2006.04.007"},{"issue":"6","key":"ref9","first-page":"87","article-title":"Research on the performance of low-rate attack","volume":"29","author":"Zhijun","year":"2008","unstructured":"[11] Wu Zhijun, Yue Meng, \"Research on the performance of low-rate attack,\" Journal of Communications, 2008, 29(6): 87-93.","journal-title":"J Commun","ISSN":"http:\/\/id.crossref.org\/issn\/0021-9916","issn-type":"print"},{"issue":"10","key":"ref10","first-page":"2341","article-title":"Correlation-based Detection of LDoS Attack","volume":"7","author":"Zhi-jun","year":"2012","unstructured":"[12] Zhi-jun Wu, Minghua Wang, Haitao Zhang, Xingchen Liu, \"Correlation-based Detection of LDoS Attack\", Journal of Software, 2012, 7 (10): 2341-2348.","journal-title":"J Softw","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"}],"container-title":["Journal of Computers"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T15:16:25Z","timestamp":1442330185000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jcp\/article\/view\/11617"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,1]]},"references-count":10,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2014,6,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcp.9.6.1426-1435","relation":{},"ISSN":["1796-203X"],"issn-type":[{"value":"1796-203X","type":"print"}],"subject":[],"published":{"date-parts":[[2014,6,1]]}}}