{ "labelLang" : "hun", "responseDate" : "2024-03-29 16:17", "content" : { "otype" : "Citation", "mtid" : 28380853, "status" : "VALIDATED", "published" : true, "unhandledTickets" : 0, "deleted" : false, "lastModified" : "2019-10-31T13:31:14.068+0000", "created" : "2019-10-31T12:46:47.895+0000", "creator" : { "otype" : "Admin", "mtid" : 10014110, "link" : "/api/admin/10014110", "label" : "Szmolyán Mária (BME admin 5 - INAKTÍV)", "familyName" : "Szmolyán", "givenName" : "Mária", "published" : true, "oldId" : 10014110, "snippet" : true }, "lastDuplumOK" : "2019-10-31T13:31:14.181+0000", "lastDuplumSearch" : "2019-10-31T13:31:14.181+0000", "validated" : "2019-10-31T13:31:14.174+0000", "validator" : { "otype" : "Admin", "mtid" : 10039288, "link" : "/api/admin/10039288", "label" : "Szmolyán Mária (BME 4 admin - INAKTÍV)", "familyName" : "Szmolyán", "givenName" : "Mária", "published" : true, "oldId" : 10039288, "snippet" : true }, "publication" : { "otype" : "BookChapter", "mtid" : 2611721, "link" : "/api/publication/2611721", "label" : "Bencsáth Boldizsár et al. A game based analysis of the client puzzle approach to defend against DoS attacks. (2003) Megjelent: Proceedings of the 11th International conference on software, telecommunications and computer networks (SoftCOM 2003) pp. 763-767", "core" : true, "citation" : false, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 25, "link" : "/api/publicationtype/25", "label" : "Könyvrészlet", "code" : 25, "otypeName" : "BookChapter", "listPosition" : 2, "published" : true, "oldId" : 25, "snippet" : true }, "subType" : { "otype" : "SubType", "mtid" : 10000312, "link" : "/api/subtype/10000312", "label" : "Konferenciaközlemény (Könyvrészlet)", "name" : "Konferenciaközlemény", "nameEng" : "Conference paper", "docType" : { "otype" : "PublicationType", "mtid" : 25, "link" : "/api/publicationtype/25", "label" : "Könyvrészlet", "code" : 25, "otypeName" : "BookChapter", "listPosition" : 2, "published" : true, "oldId" : 25, "snippet" : true }, "listPosition" : 228, "published" : true, "oldId" : 10000312, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "title" : "A game based analysis of the client puzzle approach to defend against DoS attacks", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 819883, "link" : "/api/publicationidentifier/819883", "label" : "Teljes dokumentum: http://www.crysys.hu/publications/files/BencsathBV2003softcom.pdf", "source" : { "otype" : "PlainSource", "mtid" : 39, "link" : "/api/publicationsource/39", "label" : "Teljes dokumentum", "type" : { "otype" : "PublicationSourceType", "mtid" : 10006, "link" : "/api/publicationsourcetype/10006", "label" : "Link", "mayHaveOa" : true, "published" : true, "snippet" : true }, "name" : "Teljes dokumentum", "linkPattern" : "@@@", "publiclyVisible" : true, "published" : true, "oldId" : 39, "snippet" : true }, "oaFree" : false, "validState" : "NO", "idValue" : "http://www.crysys.hu/publications/files/BencsathBV2003softcom.pdf", "published" : false, "oldId" : 726785, "snippet" : true } ], "publishedAt" : [ ], "pageLength" : 5, "publishedYear" : 2003, "foreignEdition" : true, "foreignLanguage" : true, "fullPublication" : true, "conferencePublication" : true, "nationalOrigin" : true, "published" : true, "oldId" : 2611721, "snippet" : true }, "publicationMtid" : 2611721, "related" : { "otype" : "JournalArticle", "mtid" : 30870623, "link" : "/api/publication/30870623", "label" : "Zhu W.-W. et al. Network packet sampling strategy model of intrusion detection based on risk management approach. (2007) XI TONG GONG CHENG YU DIAN ZI JI SHU / SYSTEMS ENGINEERING AND ELECTRONICS 1001-506X 29 4 647-650", "core" : false, "citation" : true, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 24, "link" : "/api/publicationtype/24", "label" : "Folyóiratcikk", "code" : 24, "otypeName" : "JournalArticle", "listPosition" : 1, "published" : true, "oldId" : 24, "snippet" : true }, "subType" : { "otype" : "SubType", "mtid" : 10000059, "link" : "/api/subtype/10000059", "label" : "Szakcikk (Folyóiratcikk)", "name" : "Szakcikk", "nameEng" : "Article", "docType" : { "otype" : "PublicationType", "mtid" : 24, "link" : "/api/publicationtype/24", "label" : "Folyóiratcikk", "code" : 24, "otypeName" : "JournalArticle", "listPosition" : 1, "published" : true, "oldId" : 24, "snippet" : true }, "listPosition" : 101, "published" : true, "oldId" : 10000059, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10040, "link" : "/api/language/10040", "label" : "Kínai", "name" : "Kínai", "nameEng" : "Chinese", "published" : true, "oldId" : 10000079, "snippet" : true } ], "title" : "Network packet sampling strategy model of intrusion detection based on risk management approach", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 16015508, "link" : "/api/publicationidentifier/16015508", "label" : "Scopus: 34250027284", "source" : { "otype" : "PlainSource", "mtid" : 3, "link" : "/api/publicationsource/3", "label" : "Scopus", "type" : { "otype" : "PublicationSourceType", "mtid" : 10003, "link" : "/api/publicationsourcetype/10003", "label" : "Indexelő adatbázis", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "Scopus", "linkPattern" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-@@@", "publiclyVisible" : true, "published" : true, "oldId" : 3, "snippet" : true }, "idValue" : "34250027284", "published" : false, "snippet" : true } ], "journal" : { "otype" : "Journal", "mtid" : 10042157, "link" : "/api/journal/10042157", "label" : "XI TONG GONG CHENG YU DIAN ZI JI SHU / SYSTEMS ENGINEERING AND ELECTRONICS 1001-506X", "pIssn" : "1001-506X", "reviewType" : "REVIEWED", "noIF" : true, "sciIndexed" : false, "scopusIndexed" : true, "lang" : "FOREIGN", "hungarian" : false, "published" : true, "oldId" : 10042157, "snippet" : true }, "volume" : "29", "issue" : "4", "publishedAt" : [ ], "pageLength" : 4, "publishedYear" : 2007, "foreignEdition" : true, "foreignLanguage" : true, "fullPublication" : true, "conferencePublication" : false, "nationalOrigin" : false, "published" : true, "snippet" : true }, "relatedMtid" : 30870623, "source" : "Scopus", "externalCitation" : true, "externalCitationOK" : null, "mentionCount" : 1, "link" : "/api/citation/28380853", "label" : "Zhu W.-W. et al. Network packet sampling strategy model of intrusion detection based on risk management approach. (2007) XI TONG GONG CHENG YU DIAN ZI JI SHU / SYSTEMS ENGINEERING AND ELECTRONICS 1001-506X 29 4 647-650", "template" : "