{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:17:56Z","timestamp":1725520676139},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1109\/iccnc.2014.6785304","type":"proceedings-article","created":{"date-parts":[[2014,4,17]],"date-time":"2014-04-17T18:04:24Z","timestamp":1397757864000},"page":"53-57","source":"Crossref","is-referenced-by-count":0,"title":["Stack protection in packet processing systems"],"prefix":"10.1109","author":[{"family":"Peng Wu","sequence":"first","affiliation":[]},{"given":"Tilman","family":"Wolf","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1145\/316188.316220","article-title":"An integrated congestion management architecture for internet hosts","author":"balakrishnan","year":"1999","journal-title":"Proceedings of the Conference on Applications Technologies Architectures and Protocols for Computer Communication (SIGCOMM)"},{"journal-title":"Proc of Symposium on Click Modular Router","article-title":"An open flow switch element for click","year":"2009","author":"mundada","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219077"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/35.722141"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"journal-title":"Architecture of Network Systems","year":"2011","author":"serpanos","key":"1"},{"key":"10","first-page":"3","article-title":"A first step towards automated detection of buffer overrun vulnerabilities","author":"wagner","year":"2000","journal-title":"Proc of the Network and Distributed System Security Symposium (NDSS)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2005.266"},{"journal-title":"Network Infrastructure Security","year":"2009","author":"wong","key":"6"},{"journal-title":"Cryptography and Network Security","year":"2006","author":"stallings","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.50"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185370"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278605"}],"event":{"name":"2014 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2014,2,3]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2014,2,6]]}},"container-title":["2014 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6778476\/6785290\/06785304.pdf?arnumber=6785304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T11:46:10Z","timestamp":1498131970000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6785304\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2014.6785304","relation":{},"subject":[],"published":{"date-parts":[[2014,2]]}}}