{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T23:38:18Z","timestamp":1706053098581},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2006,10,1]],"date-time":"2006-10-01T00:00:00Z","timestamp":1159660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Select. Areas Commun."],"published-print":{"date-parts":[[2006,10]]},"DOI":"10.1109\/jsac.2006.877214","type":"journal-article","created":{"date-parts":[[2006,10,12]],"date-time":"2006-10-12T00:09:58Z","timestamp":1160611798000},"page":"1889-1900","source":"Crossref","is-referenced-by-count":7,"title":["Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed"],"prefix":"10.1109","volume":"24","author":[{"given":"E.Y.K.","family":"Chan","sequence":"first","affiliation":[]},{"given":"H.W.","family":"Chan","sequence":"additional","affiliation":[]},{"given":"K.M.","family":"Chan","sequence":"additional","affiliation":[]},{"given":"P.S.","family":"Chan","sequence":"additional","affiliation":[]},{"given":"S.T.","family":"Chanson","sequence":"additional","affiliation":[]},{"given":"M.H.","family":"Cheung","sequence":"additional","affiliation":[]},{"given":"C.F.","family":"Chong","sequence":"additional","affiliation":[]},{"given":"K.P.","family":"Chow","sequence":"additional","affiliation":[]},{"given":"A.K.T.","family":"Hui","sequence":"additional","affiliation":[]},{"given":"L.C.K.","family":"Hui","sequence":"additional","affiliation":[]},{"given":"S.K.","family":"Ip","sequence":"additional","affiliation":[]},{"given":"C.K.","family":"Lam","sequence":"additional","affiliation":[]},{"given":"W.C.","family":"Lau","sequence":"additional","affiliation":[]},{"given":"K.H.","family":"Pun","sequence":"additional","affiliation":[]},{"given":"Y.F.","family":"Tsang","sequence":"additional","affiliation":[]},{"given":"W.W.","family":"Tsang","sequence":"additional","affiliation":[]},{"given":"C.W.","family":"Tso","sequence":"additional","affiliation":[]},{"given":"D.Y.","family":"Yeung","sequence":"additional","affiliation":[]},{"given":"S.M.","family":"Yiu","sequence":"additional","affiliation":[]},{"given":"K.Y.","family":"Yu","sequence":"additional","affiliation":[]},{"given":"W.","family":"Ju","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","article-title":"Network traffic control\u2014Implementation overview","author":"Almesberger","year":"1999"},{"key":"ref2","article-title":"Traffic Management Specification ver. 4.1, (AF-TM-0121.000)","volume-title":"The ATM Forum Technical Committee","year":"1999"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/543613.543615"},{"key":"ref4","article-title":"TFN2K\u2014An analysis","author":"Barlow","year":"2003"},{"key":"ref5","article-title":"ICMP traceback messages","author":"Bellovin","year":"2001"},{"key":"ref6","article-title":"Syn cookies","author":"Bernstein","year":"1996"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref8","first-page":"636","article-title":"Network applications of Bloom filters: A survey, 2002","volume-title":"Proc. 40th Annu. Allerton Conf. Commun., Control, Comput.","author":"Broder"},{"key":"ref9","first-page":"319","article-title":"Tracing anonymous packets to their approximate source","volume-title":"Proc. USENIX LISA","author":"Burch"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISPAN.2004.1300541"},{"key":"ref11","article-title":"Trends in denial of service attack technology","author":"Houle","year":"2001"},{"key":"ref12","article-title":"Computer Security Institute and Federal Bureau of Investigation","year":"2003","journal-title":"CSI\/FBI computer crime and security survey"},{"key":"ref13","article-title":"The national strategy to security cyberspace","volume-title":"U.S. Department of Homeland Security","year":"2003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633056"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916648"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2827"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/90.413212"},{"key":"ref18","article-title":"Notes of class-based queueing: Setting parameters","author":"Floyd","year":"1995"},{"key":"ref19","first-page":"1817","article-title":"Single packet IP traceback in AS-level partial deployment scenario","volume-title":"Proc. IEEE GLOBECOM","author":"Chao Gong"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863968"},{"key":"ref21","first-page":"314","article-title":"Congestion avoidance and control","volume-title":"Proc. ACM SIGCOMM","author":"acobson"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948245"},{"key":"ref23","volume-title":"IEEE Commun. Soc.","author":"Jin","year":"2004"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354679"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/762471.762473"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/508791.508835"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2002.1181787"},{"key":"ref29","article-title":"Controlling high bandwidth aggregates in the network","author":"Mahajan","year":"2001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v008.i14"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181418"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30555-2_47"},{"key":"ref35","article-title":"Defending against slave and reflector attacks","volume-title":"Proc. Nat. Conf. Commun.","author":"Rayanchu"},{"key":"ref36","article-title":"Unreliable guide to kernel hacking","author":"Russell","year":"2000"},{"key":"ref38","first-page":"165","article-title":"Beyond softnet","volume-title":"Proc.5th Annu. Linux Showcase Conf.","author":"Salim"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383060"},{"key":"ref41","article-title":"Event Report","author":"Vixie","year":"2002"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199330"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.842221"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/49\/35995\/01705620.pdf?arnumber=1705620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T22:41:59Z","timestamp":1706049719000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1705620\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10]]},"references-count":40,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/jsac.2006.877214","relation":{},"ISSN":["0733-8716"],"issn-type":[{"value":"0733-8716","type":"print"}],"subject":[],"published":{"date-parts":[[2006,10]]}}}