{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:20:26Z","timestamp":1725661226598},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1109\/ipdps.2006.1639676","type":"proceedings-article","created":{"date-parts":[[2006,7,10]],"date-time":"2006-07-10T15:59:56Z","timestamp":1152547196000},"page":"8 pp.","source":"Crossref","is-referenced-by-count":1,"title":["A case for exploit-robust and attack-aware protocol RFCs"],"prefix":"10.1109","author":[{"given":"V.","family":"Pothamsetty","sequence":"first","affiliation":[]},{"given":"P.","family":"Mateti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"A functional method for assessing protocol implementation security","year":"2001","author":"kaksonen","key":"3"},{"journal-title":"RPC 3720 - Internet Small Computer Systems Interface (iSCSI)","year":"2004","author":"satran","key":"2"},{"year":"0","key":"1"},{"journal-title":"A vulnerability taxonomy for network protocols Corresponding engineering best practice countermeasures","year":"2005","author":"pothamsetty","key":"7"},{"journal-title":"Source code scanners for better code","year":"1992","author":"nazario","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1985.229776"},{"year":"0","key":"4"},{"key":"8","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1145\/1030083.1030088","article-title":"Testing network-based intrusion detection signatures using mutant exploits","author":"vigna","year":"2004","journal-title":"CCS '04 Proceedings of the 11th ACM Conference on Computer and Communications Security"}],"event":{"name":"Proceedings 20th IEEE International Parallel & Distributed Processing Symposium","start":{"date-parts":[[2006,4,25]]},"location":"Rhodes Island, Greece","end":{"date-parts":[[2006,4,29]]}},"container-title":["Proceedings 20th IEEE International Parallel & Distributed Processing Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10917\/34366\/01639676.pdf?arnumber=1639676","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T03:23:02Z","timestamp":1497669782000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1639676\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/ipdps.2006.1639676","relation":{},"subject":[],"published":{"date-parts":[[2006]]}}}