{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:24Z","timestamp":1738777224950,"version":"3.37.0"},"reference-count":13,"publisher":"Academy Publisher","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.3.604-611","type":"journal-article","created":{"date-parts":[[2014,3,6]],"date-time":"2014-03-06T06:27:21Z","timestamp":1394087241000},"source":"Crossref","is-referenced-by-count":0,"title":["Cross-correlation Based Synchronization Mechanism of LDDoS Attacks"],"prefix":"10.4304","volume":"9","author":[{"given":"Zhijun","family":"WU","sequence":"first","affiliation":[]},{"given":"Yi","family":"CUI","sequence":"additional","affiliation":[]},{"given":"Meng","family":"YUE","sequence":"additional","affiliation":[]},{"given":"Lan","family":"MA","sequence":"additional","affiliation":[]},{"given":"Lu","family":"WANG","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,3,5]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.4.3.178-183"},{"key":"ref2","first-page":"75","article-title":"Low-rate TCP-targeted denial of service attacks.","volume-title":"Proceedings of ACM SIGCOMM 2003","author":"Kuzmanovic","year":"2003","unstructured":"[3] Kuzmanovic A, Knightly E W. Low-rate TCP-targeted denial of service attacks. Proceedings of ACM SIGCOMM 2003, Karlsruhe, Germany, 2003, pp. 75-86."},{"key":"ref3","article-title":"On a new class of pulsing denial-of-service attacks and the defense.","volume-title":"Network and Distributed System Security Symposium (NDSS 05)","author":"Luo","year":"2005","unstructured":"[4] Luo X P, Rocky K, Chang C. On a new class of pulsing denial-of-service attacks and the defense. Network and Distributed System Security Symposium (NDSS'05), San Diego, CA, USA, 2005."},{"key":"ref4","article-title":"Bandwidth stealing via link targeted RoQ attacks.","volume-title":"Proc 2nd IASTED International Conference on Communication and Computer Networks","author":"Guirguis","year":"2004","unstructured":"[5] Guirguis M, Bestavros A, Matta I. Bandwidth stealing via link targeted RoQ attacks. Proc 2nd IASTED International Conference on Communication and Computer Networks, Cambridge, MA, 2004."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2107320"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2009.081555"},{"key":"ref8","first-page":"1","article-title":"Practical study of a defense against low-rate TCP-targeted DoS attack","volume-title":"International Conference for Internet Technology and Secured Transactions","author":"Efstathopoulos","year":"2009","unstructured":"[10] Efstathopoulos, P., Practical study of a defense against low-rate TCP-targeted DoS attack; 2009. ICITST 2009. International Conference for Internet Technology and Secured Transactions, 2009 pp. 1- 6."},{"key":"ref9","first-page":"500","article-title":"A queuing analysis for low-rate DoS attacks against application servers","volume-title":"2010 IEEE International Conference on Wireless Communications Networking and Information Security (WCNIS)","author":"Xu","year":"2010","unstructured":"[13] Xiaodong Xu, Xiao Guo, Shirui Zhu; A queuing analysis for low-rate DoS attacks against application servers; 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), 2010 pp. 500- 504."},{"issue":"No. 7","key":"ref10","first-page":"1539","article-title":"A Method of Line Matching Based on Feature Points.","volume":"7","author":"Wang","year":"2012","unstructured":"[16] Yanxia Wang, Yan Ma, Qixin Chen. A Method of Line Matching Based on Feature Points. Journal of Software, Vol. 7, No. 7, pp. 1539 \u2013 1545, July 2012.","journal-title":"J Softw","ISSN":"https:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"issue":"No. 10","key":"ref11","first-page":"2341","article-title":"Correlation-based Detection of LDoS Attack.","volume":"7","author":"Zhi-jun","year":"2012","unstructured":"[17] Zhi-jun Wu, Minghua Wang, Haitao Zhang, Xingchen Liu. Correlation-based Detection of LDoS Attack. Journal of Networks, Vol. 7, No. 10, pp. 2341 \u2013 2348, October 2012.","journal-title":"Journal of Networks"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.05.091407"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2024719"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:05:21Z","timestamp":1738775121000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,5]]},"references-count":13,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2014,3,5]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.3.604-611","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,3,5]]}}}