{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T15:50:57Z","timestamp":1746805857246,"version":"3.40.5"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/compsac.2017.207","type":"proceedings-article","created":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T16:49:01Z","timestamp":1505148541000},"page":"572-577","source":"Crossref","is-referenced-by-count":3,"title":["Secure Double-Layered Defense against HTTP-DDoS Attacks"],"prefix":"10.1109","author":[{"given":"Mohamad Samir A.","family":"Eid","sequence":"first","affiliation":[]},{"given":"Hitoshi","family":"Aida","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Radware Common DDoS Attack Tools Jan 2016","year":"0","key":"ref32"},{"journal-title":"DETERLab Node Types","year":"0","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2010.62"},{"key":"ref10","article-title":"Lack of Trust in Internet Privacy and Security May Deter Economic and Other Online Activities","author":"goldberg","year":"2016","journal-title":"U S Dept of Commerce National Telecommunications & Information Administration (NTIA)"},{"journal-title":"Trends Study - Thales e-Security Inc","article-title":"Encryption Application","year":"0","key":"ref11"},{"journal-title":"AWS best practices for DDoS resiliency","year":"2016","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076752"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2014.64"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2631469"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.35"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSE.2014.060711"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23109"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2684464.2684503"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39218-4_26"},{"journal-title":"Incapsula Report 2015&#x2013;2016 Annual DDoS Threat Landscape Report Aug 2016","year":"0","key":"ref4"},{"key":"ref27","first-page":"44","article-title":"Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model Information Security Practice and Experience","author":"liu","year":"2013","journal-title":"9th International Conference ISPEC 2013"},{"journal-title":"McAfee Labs Threats Report - March 2016","year":"0","key":"ref3"},{"volume":"xi","journal-title":"Arbor Worldwide Infrastructure Security Report","year":"0","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.03.014"},{"journal-title":"A10 storms the DDoS prevention market with Thunder TPS","year":"0","author":"mccallion","key":"ref5"},{"journal-title":"Kona DDoS defender","year":"0","key":"ref8"},{"journal-title":"SSL Options","article-title":"CloudFlare","year":"0","key":"ref7"},{"journal-title":"Kaspersky DDoS attacks in Q4","year":"0","key":"ref2"},{"journal-title":"DDoS protection services","article-title":"VeriSign","year":"0","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2016ICP0024"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140370"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2015.0754"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.09.010"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-013-0196-5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JISIC.2014.21"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2995272.2995279"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.08.002"}],"event":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","start":{"date-parts":[[2017,7,4]]},"location":"Turin","end":{"date-parts":[[2017,7,8]]}},"container-title":["2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8027037\/8029872\/08029992.pdf?arnumber=8029992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,12]],"date-time":"2017-10-12T16:43:13Z","timestamp":1507826593000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8029992\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/compsac.2017.207","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}