iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/AICCSA.2005.1387066
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:44:42Z","timestamp":1730195082596,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/aiccsa.2005.1387066","type":"proceedings-article","created":{"date-parts":[[2005,4,1]],"date-time":"2005-04-01T15:16:50Z","timestamp":1112368610000},"page":"367-374","source":"Crossref","is-referenced-by-count":4,"title":["Practical techniques for defending against DDoS attacks"],"prefix":"10.1109","author":[{"given":"E.Y.","family":"Chen","sequence":"first","affiliation":[]},{"given":"A.","family":"Yonezawa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"3"},{"year":"0","author":"brox","journal-title":"Signature Based or Anomaly Based Intrusion Detection - The Practice and Pitfalls","key":"2"},{"year":"2004","author":"moriarty","journal-title":"IETF Draft","article-title":"Distributed denial of service incident handling: Real-time inter-network defense","key":"10"},{"year":"0","author":"scambray","journal-title":"Usenix Security Symposium 2001","article-title":"Inferring internet denial-of-service activity","key":"1"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/DISCEX.2003.1194894"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/96559.214080"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1145\/321479.321481"},{"year":"0","key":"4"},{"year":"0","author":"mcclure","journal-title":"Hacking Exposed Network Security Secrets & Solutions Fourth Edition (Hacking Exposed)","key":"9"},{"year":"0","key":"8"},{"key":"11","article-title":"Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing","volume":"2267","author":"ferguson","year":"0","journal-title":"RFC"}],"event":{"name":"The 3rd ACS\/IEEE International Conference onComputer Systems and Applications, 2005.","location":"Cairo, Egypt"},"container-title":["The 3rd ACS\/IEEE International Conference onComputer Systems and Applications, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9525\/30191\/01387066.pdf?arnumber=1387066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T00:04:32Z","timestamp":1489536272000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1387066\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":11,"URL":"http:\/\/dx.doi.org\/10.1109\/aiccsa.2005.1387066","relation":{},"subject":[]}}