{ "labelLang" : "hun", "responseDate" : "2024-03-29 09:10", "content" : { "otype" : "JournalArticle", "mtid" : 22832319, "status" : "ADMIN_APPROVED", "published" : true, "comment" : "T3 2nd International Conference on Algorithmic Aspects in Information and Management, AAIM 2006", "unhandledTickets" : 0, "oldTimestamp" : "2018-09-14T08:19:42.000+0000", "deleted" : false, "oldId" : 12832319, "lastRefresh" : "2021-12-12T21:46:37.505+0000", "lastModified" : "2018-09-14T08:19:42.000+0000", "created" : "2013-01-15T15:52:13.000+0000", "creator" : { "otype" : "Admin", "mtid" : 10015168, "link" : "/api/admin/10015168", "label" : "Szakonyi Erzsebet (RAMKI admin 4)", "familyName" : "Szakonyi", "givenName" : "Erzsebet", "published" : true, "oldId" : 10015168, "snippet" : true }, "lastDuplumOK" : "2018-10-20T20:34:10.601+0000", "lastDuplumSearch" : "2018-10-20T20:34:10.601+0000", "core" : false, "citation" : true, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 24, "link" : "/api/publicationtype/24", "label" : "Folyóiratcikk", "code" : 24, "otypeName" : "JournalArticle", "listPosition" : 1, "published" : true, "oldId" : 24, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "firstAuthor" : "Li, L", "authorships" : [ { "otype" : "PersonAuthorship", "mtid" : 21593012, "link" : "/api/authorship/21593012", "label" : "Li, L", "listPosition" : 1, "share" : 0.0, "first" : true, "last" : false, "familyName" : "Li", "givenName" : "L", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "oldId" : 31049137, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 21593013, "link" : "/api/authorship/21593013", "label" : "Mahdian, M", "listPosition" : 2, "share" : 0.0, "first" : false, "last" : false, "familyName" : "Mahdian", "givenName" : "M", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "oldId" : 31049136, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 21593014, "link" : "/api/authorship/21593014", "label" : "Mirrokni, VS", "listPosition" : 3, "share" : 0.0, "first" : false, "last" : true, "familyName" : "Mirrokni", "givenName" : "VS", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "oldId" : 31049135, "snippet" : true } ], "title" : "Secure overlay network design", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 5701046, "link" : "/api/publicationidentifier/5701046", "label" : "WoS: 000239454600033", "source" : { "otype" : "PlainSource", "mtid" : 1, "link" : "/api/publicationsource/1", "label" : "WoS", "type" : { "otype" : "PublicationSourceType", "mtid" : 10003, "link" : "/api/publicationsourcetype/10003", "label" : "Indexelő adatbázis", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "WoS", "nameEng" : "WoS", "linkPattern" : "http://gateway.isiknowledge.com/gateway/Gateway.cgi?&GWVersion=2&SrcAuth=CustomerName&SrcApp=CustomerName&DestLinkType=FullRecord&KeyUT=@@@&DestApp=WOS", "publiclyVisible" : true, "published" : true, "oldId" : 1, "snippet" : true }, "validState" : "NO", "idValue" : "000239454600033", "realUrl" : "http://gateway.isiknowledge.com/gateway/Gateway.cgi?&GWVersion=2&SrcAuth=CustomerName&SrcApp=CustomerName&DestLinkType=FullRecord&KeyUT=000239454600033&DestApp=WOS", "published" : false, "oldId" : 16188438, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 5701047, "link" : "/api/publicationidentifier/5701047", "label" : "Scopus: 33746200178", "source" : { "otype" : "PlainSource", "mtid" : 3, "link" : "/api/publicationsource/3", "label" : "Scopus", "type" : { "otype" : "PublicationSourceType", "mtid" : 10003, "link" : "/api/publicationsourcetype/10003", "label" : "Indexelő adatbázis", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "Scopus", "linkPattern" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-@@@", "publiclyVisible" : true, "published" : true, "oldId" : 3, "snippet" : true }, "validState" : "NO", "idValue" : "33746200178", "realUrl" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-33746200178", "published" : false, "oldId" : 2844220, "snippet" : true } ], "journal" : { "otype" : "Journal", "mtid" : 3029, "link" : "/api/journal/3029", "label" : "LECTURE NOTES IN COMPUTER SCIENCE 0302-9743 1611-3349", "pIssn" : "0302-9743", "eIssn" : "1611-3349", "reviewType" : "REVIEWED", "noIF" : false, "sciIndexed" : true, "scopusIndexed" : true, "lang" : "FOREIGN", "hungarian" : false, "published" : true, "oldId" : 3029, "snippet" : true }, "volume" : "4041 LNCS", "firstPage" : "354", "lastPage" : "366", "firstPageOrInternalIdForSort" : "354", "pageLength" : 13, "publishedYear" : 2006, "digital" : null, "printed" : null, "sourceYear" : 2013, "packet" : "(Szakonyi Erzsebet (MATK admin); 2013.01.15. 16:50:48)", "foreignEdition" : true, "foreignLanguage" : true, "fullPublication" : false, "conferencePublication" : null, "nationalOrigin" : null, "missingAuthor" : false, "oaType" : "NONE", "oaCheckDate" : "2021-12-12", "oaFree" : false, "citationCount" : 0, "citationCountUnpublished" : 0, "citationCountWoOther" : 0, "independentCitCountWoOther" : 0, "doiCitationCount" : 0, "wosCitationCount" : 0, "scopusCitationCount" : 0, "independentCitationCount" : 0, "unhandledCitationCount" : 0, "citingPubCount" : 0, "independentCitingPubCount" : 0, "unhandledCitingPubCount" : 0, "citedPubCount" : 1, "citedCount" : 1, "references" : [ { "otype" : "Reference", "mtid" : 15677166, "link" : "/api/reference/15677166", "label" : "1. Adler, M., Tradeoffs in probabilistic packet marking for ip traceback (2002) Proc. ACM Symposium on Theory of Computing (STOC), , May", "listPosition" : 1, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677167, "link" : "/api/reference/15677167", "label" : "2. Bu, T., Norden, S., Woo, T., Trading resiliency for security: Model and algorithms (2004) Proc. IEEE International Conference on Network Protocols(ICNP)", "listPosition" : 2, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677168, "link" : "/api/reference/15677168", "label" : "3. Burch, H., Cheswick, B., Tracing anonymous packets to their approximate source (2000) Proc. USENIX LISA, pp. 319-327. , December", "listPosition" : 3, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677169, "link" : "/api/reference/15677169", "label" : "4. Dean, D., Franklin, M., Stubblefield, A., An algebraic approach to IP traceback (2001) Proc. NDSS, pp. 3-12. , February", "listPosition" : 4, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677170, "link" : "/api/reference/15677170", "label" : "5. Doeppner, T., Klein, P., Koyfman, A., Using router stamping to identify the source of IP packets (2000) Proc. ACM CCS, pp. 184-189. , November", "listPosition" : 5, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677171, "link" : "/api/reference/15677171", "label" : "6. Ferguson, P., Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing (1998) RFC, 2267. , January", "listPosition" : 6, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677172, "link" : "/api/reference/15677172", "label" : "7. Garber, L., Denial-of-service attacks rip the Internet (2000) IEEE Computer, 33 (4), pp. 12-17. , April", "listPosition" : 7, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677173, "link" : "/api/reference/15677173", "label" : "8. Goodrich, M.T., Efficient packet marking for large-scale IP traceback (2002) Proc. ACM CCS, pp. 117-126. , November", "listPosition" : 8, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677174, "link" : "/api/reference/15677174", "label" : "9. Keromytis, A.D., Misra, V., Rubenstein, D., SOS: Secure overlay services (2002) Proc. ACM SIGCOMM, pp. 61-72. , August", "listPosition" : 9, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677175, "link" : "/api/reference/15677175", "label" : "10. Kleitman, D., Spencer, J., Families of k-independent sets (1973) Discrete Mathematics, 6, pp. 255-262", "listPosition" : 10, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677176, "link" : "/api/reference/15677176", "label" : "11. Li, J., Sung, M., Xu, J., Li, L.E., Large-scale ip traceback in high-speed internet: Practical techniques and theoretical foundation (2004) Proc. IEEE Symposium on Security and Privacy, pp. 115-129", "listPosition" : 11, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677177, "link" : "/api/reference/15677177", "label" : "12. Mahajan, R., Bellovin, S., Floyd, S., Ioannidis, J., Paxson, V., Shenker, S., Controlling high bandwidth aggregates in the network (2002) ACM Computer Communication Review, 32 (3), pp. 62-73. , July", "listPosition" : 12, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677178, "link" : "/api/reference/15677178", "label" : "13. McGuire, D., Krebs, B., (2002) Attack on Internet Called Largest Ever, , http://www.washingtonpost.com/wp-dyn/articles/A828-20020ct22.html, October", "listPosition" : 13, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677179, "link" : "/api/reference/15677179", "label" : "14. Mirkovic, J., Prier, G., Reiher, P., Attacking DDoS at the source (2002) Proc. IEEE ICNP, pp. 312-321. , November", "listPosition" : 14, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677180, "link" : "/api/reference/15677180", "label" : "15. Mirkovic, J., Robinson, M., Reiher, P., Kuenning, G., Alliance formation for ddos defense (2003) Proc. New Security Paradigms Workshop, ACM SIGSAC, , August", "listPosition" : 15, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677181, "link" : "/api/reference/15677181", "label" : "16. Papadopoulos, C., Lindell, R., Mehringer, J., Hussain, A., Govidan, R., COSSACK: Coordinated suppression of simultaneous attacks (2003) DISCEX III, pp. 22-24. , April", "listPosition" : 16, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677182, "link" : "/api/reference/15677182", "label" : "17. Park, K., Lee, H., On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets (2001) Proc. ACM SIGCOMM, pp. 15-26. , August", "listPosition" : 17, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677183, "link" : "/api/reference/15677183", "label" : "18. Ruszinkó, M., On the upper bound of the size of the r-cover-free families (1994) Journal of Combinatorial Theory, Series A, 66, pp. 302-310", "listPosition" : 18, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677184, "link" : "/api/reference/15677184", "label" : "19. Savage, S., Wetherall, D., Karlin, A., Anderson, T., Practical network support for IP traceback (2000) Proc. ACM SIGCOMM, pp. 295-306. , August", "listPosition" : 19, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677185, "link" : "/api/reference/15677185", "label" : "20. Snoeren, A., Partridge, C., Hash-based IP traceback (2001) Proc. ACM SIGCOMM, pp. 3-14. , August", "listPosition" : 20, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677186, "link" : "/api/reference/15677186", "label" : "21. Song, D., Perrig, A., Advanced and authenticated marking schemes for IP traceback (2001) Proc. IEEE INFOCOM, pp. 878-886. , April", "listPosition" : 21, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15677187, "link" : "/api/reference/15677187", "label" : "22. Vijayan, J., (2004) Akamai Attack Reveals Increased Sophistication: Host's DNS Servers Were DDoS Targets, Slowing Large Sites, , http://www.computerworld.com/securitytopics/security/story/0,10801, 93977p2,00.html, June", "listPosition" : 22, "published" : false, "snippet" : true } ], "hasCitationDuplums" : false, "userChangeableUntil" : "2017-12-31T23:00:00.000+0000", "publishDate" : "2013-01-23T23:00:10.000+0000", "directInstitutesForSort" : "", "ownerAuthorCount" : 1, "ownerInstituteCount" : 15, "directInstituteCount" : 0, "authorCount" : 3, "contributorCount" : 0, "hasQualityFactor" : false, "link" : "/api/publication/22832319", "label" : "Li L et al. Secure overlay network design. (2006) LECTURE NOTES IN COMPUTER SCIENCE 0302-9743 1611-3349 4041 LNCS 354-366", "template" : "