{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:40:53Z","timestamp":1725795653997},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icitcs.2015.7292994","type":"proceedings-article","created":{"date-parts":[[2015,10,8]],"date-time":"2015-10-08T21:57:27Z","timestamp":1444341447000},"page":"1-5","source":"Crossref","is-referenced-by-count":17,"title":["Low-Rate Denial-of-Service Attacks against HTTP\/2 Services"],"prefix":"10.1109","author":[{"given":"Erwin","family":"Adi","sequence":"first","affiliation":[]},{"given":"Zubair","family":"Baig","sequence":"additional","affiliation":[]},{"given":"Chiou Peng","family":"Lam","sequence":"additional","affiliation":[]},{"given":"Philip","family":"Hingston","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Hypertext Transfer Protocol Version 2 (HTTP\/2)","author":"belshe","year":"2015","journal-title":"RFC 7450"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NGI.2012.6252145"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/sec.118"},{"article-title":"Nghttp 2: HTTP\/2 C Library","year":"2015","author":"tsujikawa","key":"ref14"},{"journal-title":"Denial of Service Attacks","year":"2014","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(10)70056-8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039856"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2107320"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/863965.863966"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70128-3"},{"journal-title":"High Performance Browser Networking What Every Web Developer Should Know about Networking and Browser Performance","year":"2013","author":"grigorik","key":"ref1"},{"key":"ref9","article-title":"Denial of Service via Algorithmic Complexity Attacks","author":"crosby","year":"2003","journal-title":"Usenix Security"}],"event":{"name":"2015 5th International Conference on IT Convergence and Security (ICITCS)","start":{"date-parts":[[2015,8,24]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2015,8,27]]}},"container-title":["2015 5th International Conference on IT Convergence and Security (ICITCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7287494\/7292885\/07292994.pdf?arnumber=7292994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T22:29:26Z","timestamp":1490394566000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7292994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icitcs.2015.7292994","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}