{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T10:31:01Z","timestamp":1743330661664,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icnp.2000.896287","type":"proceedings-article","created":{"date-parts":[[2002,11,11]],"date-time":"2002-11-11T14:56:01Z","timestamp":1037026561000},"page":"3-11","source":"Crossref","is-referenced-by-count":8,"title":["Hop integrity in computer networks"],"prefix":"10.1109","author":[{"given":"M.G.","family":"Gouda","sequence":"first","affiliation":[]},{"given":"E.N.","family":"Elnozahy","sequence":"additional","affiliation":[]},{"given":"C.-T.","family":"Huang","sequence":"additional","affiliation":[]},{"given":"T.M.","family":"McGuire","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2406"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1996.492416"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2408"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2412"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0777"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1321"},{"key":"ref16","volume":"i","author":"stevens","year":"1994","journal-title":"TCP\/IP Illustrated"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1997.579225"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1145\/506133.506136","volume":"32","author":"de vivo","year":"1998","journal-title":"Operating Systems Review"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2267"},{"journal-title":"Internetworking With TCP\/IP Vol I Principles Protocols and Architecture","year":"1988","author":"comer","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2000.896287"},{"journal-title":"Elements of Network Protocol Design","year":"1998","author":"gouda","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2401"},{"key":"ref7","first-page":"7","article-title":"A Simple Active Attack Against TCP","author":"joncheray","year":"1995","journal-title":"Proceedings of the 5th Usenix UNIX Security Symposium"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1997.646178"},{"journal-title":"TCP SYN flooding and IP spoofing attacks","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2402"}],"event":{"name":"ICNP 2000. 8th IEEE Conference on Network Protocols","acronym":"ICNP-00","location":"Osaka, Japan"},"container-title":["Proceedings 2000 International Conference on Network Protocols"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7201\/19403\/00896287.pdf?arnumber=896287","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T13:56:52Z","timestamp":1497535012000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/896287\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icnp.2000.896287","relation":{},"subject":[]}}