{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:17:10Z","timestamp":1725614230224},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/icoin.2013.6496396","type":"proceedings-article","created":{"date-parts":[[2013,4,15]],"date-time":"2013-04-15T14:45:16Z","timestamp":1366037116000},"page":"315-319","source":"Crossref","is-referenced-by-count":10,"title":["Threat of DoS by interest flooding attack in content-centric networking"],"prefix":"10.1109","author":[{"family":"Seungoh Choi","sequence":"first","affiliation":[]},{"family":"Kwangsoo Kim","sequence":"additional","affiliation":[]},{"family":"Seongmin Kim","sequence":"additional","affiliation":[]},{"family":"Byeong-hee Roh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749260"},{"journal-title":"OPNETWORK 2012","article-title":"An implementation of content-centric network, using OPNET modeler","year":"2012","author":"kim","key":"11"},{"year":"0","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6231276"},{"journal-title":"Cisco Visual Networking Index Forecast and Methodology 2011-2016","year":"2012","key":"1"},{"year":"2012","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2096149.2096160"},{"journal-title":"Open Arch","article-title":"Backscatter from the data plane-threats to stability and security in information-centric networking","year":"2012","author":"wahlisch","key":"6"},{"journal-title":"Security & Scalability of Content-Centric Networking","year":"2010","author":"lauinger","key":"5"},{"key":"4","first-page":"2426","article-title":"Enhancing cache robustness for content-centric networking","author":"xie","year":"2012","journal-title":"INFOCOM 2012 Proceedings IEEE"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.15"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601338"}],"event":{"name":"2013 International Conference on Information Networking (ICOIN)","start":{"date-parts":[[2013,1,28]]},"location":"Bangkok","end":{"date-parts":[[2013,1,30]]}},"container-title":["The International Conference on Information Networking 2013 (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6490228\/6496336\/06496396.pdf?arnumber=6496396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T14:33:16Z","timestamp":1490193196000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6496396\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icoin.2013.6496396","relation":{},"subject":[],"published":{"date-parts":[[2013,1]]}}}