{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:49:57Z","timestamp":1729673397266,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/issa.2013.6641057","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T23:20:04Z","timestamp":1383088804000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["An analysis of service degradation attacks against real-time MPLS networks"],"prefix":"10.1109","author":[{"given":"Abdulrahman","family":"Al-Mutairi","sequence":"first","affiliation":[]},{"given":"Stephen D.","family":"Wolthusen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/90.779197"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10625-5_16"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/49.32327"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/18.61109"},{"key":"33","article-title":"Multiprotocol label switching architecture","author":"rosen","year":"2001","journal-title":"IETF RFC 3031"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.1990.128748"},{"year":"0","key":"34"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/BF01094342"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/49.363150"},{"key":"14","first-page":"101","article-title":"Real-time calculus for scheduling hard real-time systems","volume":"4","author":"thiele","year":"2000","journal-title":"Circuits and Systems 2000 Proceedings ISCAS 2000 Geneva The 2000 IEEE International Symposium on"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/5.259431"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683543"},{"key":"21","article-title":"Requirements for traffic engineering over mpls","author":"awduche","year":"1999","journal-title":"IETF RFC 2702"},{"key":"20","doi-asserted-by":"crossref","first-page":"1442","DOI":"10.1109\/TNET.2007.896501","article-title":"A network calculus with effective bandwidth","volume":"15","author":"li","year":"2007","journal-title":"IEEE\/ACM Transactions on Networking (TON)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-011-9511-7"},{"journal-title":"QoS Support in MPLS networks","year":"2003","author":"fineberg","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.157"},{"key":"25","article-title":"Ldp specification","author":"andersson","year":"2007","journal-title":"IETF RFC 5036"},{"key":"26","article-title":"Rsvp-te: Extensions to rsvp for lsp tunnels","author":"awduche","year":"2001","journal-title":"IETF RFC 3209"},{"key":"27","article-title":"Constraint-based lsp setup using ldp","author":"jamoussi","year":"2002","journal-title":"IETF RFC 3212"},{"key":"28","article-title":"Applicability statement for cr-ldp","author":"ash","year":"2002","journal-title":"IETF RFC 3213"},{"key":"29","article-title":"Integrated service in the internet architecture: An overview","author":"braden","year":"1994","journal-title":"Program on Internet and Telecoms Convergence"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2009.08.002"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2008.08.005"},{"key":"10","article-title":"Rtp: A transport protocol for real-time applications","author":"jacobson","year":"2003","journal-title":"IETF RFC 3550"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16806-2_9"},{"key":"30","article-title":"An architecture for differentiated services","author":"blake","year":"1998","journal-title":"IETF RFC 2475"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/BF01893145"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1637957"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.01.032"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/11557654_60"},{"key":"31","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1049\/ic:20040013","article-title":"defining and monitoring qos metrics in the next generation wireless networks","author":"gurijala","year":"2004","journal-title":"Telecommunications Quality of Service The Business of Success (QoS 2004)"},{"key":"4","article-title":"Analysis of the security of bgp\/mpls ip virtual private networks (vpns)","author":"behringer","year":"2006","journal-title":"IETF RFC 4381"},{"journal-title":"Internet Protocol AspectsQuality of Service and Network Performance-Network Performance Objectives for IP-based Services","year":"2011","key":"9"},{"journal-title":"Internet Protocol AspectsQuality of Service and Network Performance-Internet Protocol Data Communication Service IP Packet Transfer and Availability Performance Parameters","year":"2011","key":"8"}],"event":{"name":"2013 Information Security for South Africa","start":{"date-parts":[[2013,8,14]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2013,8,16]]}},"container-title":["2013 Information Security for South Africa"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621627\/6641027\/06641057.pdf?arnumber=6641057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:01:52Z","timestamp":1498093312000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6641057\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/issa.2013.6641057","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}