{“id”:“https://openalex.org/W1483042250“,”doi“:”https://doi.org/10.109/saintw.2005.1619990“,”title“:”Denial of Service Attack的IP追踪模拟“,”display_name“:”拒绝服务攻击的IP追踪仿真“,”publication_year“:2006,”publiation_date“:”2006-05-06“,”ids“:{”openalex“:”https://openalex.org/W1483042250“,”doi“:”https://doi.org/10.109/saintw.2005.1619990“,”mag“:”1483042250“},”language“:”en“,”primary_location“:{”is_oa“:false,”landing_page_url“:”https://doi.org/10.109/saintw.2005.1619990“,”pdf_url“:null,”source“:null,”license“:null,”license_id“:null,”version“:null,”is_accepted“:false,”is_published“:false},”type“:”article“,”type_crossref“:”proceedings article“,”indexed_in“:[”crossref“],”open_access“:{”is_oa“:false,”oa_status“:”closed“,”oa_url“:null,”any_repository_has_fulltext“:false},”authorships“:[{”author_position“:“第一个”,“作者“:{”id“:”https://openalex.org/A5052405308“,”display_name“:”M.Yamana“,”orcid“:null},”institutions“:[],”countries“:[],”is_correresponsing“:false,”raw_author_name“:”M.Yamana“,”raw_affiation_strings“:[”Matsushita Electric Works,Ltd.“],”affiliations“:[{”raw_affiation_string“:”Matsushita Electric Works,Ltd.“,”institution_ids“:[]}]]},{”author_position“:”middle“,”author“:”id“:”https://openalex.org/A5087962607“,”display_name“:”Ken\u2010ichi Hirata“,”orcid“:”https://orcid.org/0000-0002-9607-6864“},”机构“:[],”国家“:[[],”is_corresponding“:false,”raw_author_name“:K.Hirata”,“raw_affiliation_strings”:[“Matsushita Electric Works,Ltd.#TAB#”],“afliations”:[{“raw_affiliation_string”:“Matsusita Electrical Works,Ltd.#TAB#”,“institution_ids”:[]},{“author_position”:“middle”,“author”:{“id”https://openalex.org/A5053476763“,”display_name“:”Hisayo Shimizu“,”orcid“:”https://orcid.org/0000-0002-2823-5798“},”机构“:[],”国家“:[[],”is_corresponding“:false,”raw_author_name“:”H.Shimizu“,”raw _ afiliation_strings“:[”Matsushita Electric Works,Ltd.#TAB#“],”affiliations“:[{”raw _affiliation_strong“:”Matsushata Electrical Works,Ltd.#TAB#“,”institution_ids“:[]}”,{“author_position”:“middle”,“author”:{“id”https://openalex.org/A5063756610“,”display_name“:”Hiroshige Nakatani“,”orcid“:null},”机构“:[],”国家“:[],”is_correresponsing“:false,”raw_author_name“:”H.Nakatani“,”raw_affiation_strings“:[”Matsushita Electric Works,Ltd.#TAB#“],”附属机构“:[{”raw_affiation_string“:”Matsushita Electric Works,Ltd.#TAB#“,”institution_ids“:[]}]}]},{”author_position“:”middle“,”作者“:{”id“:”https://openalex.org/A5046636209“,”display_name“:”Toshifumi Kai“,”orcid“:null},”institutions“:[],”countries“:[],”is_corresponding“:false,”raw_author_name“:”Toshiffim Kai”,“raw_affiliation_strings”:[“Matsushita Electric Works,Ltd.#TAB#”],“afliations”:[{“raw_affiliation_string”:“Matsushata Electrical Works,Ltd.#TAB##”,”institiation_ids“:[]},{“author_position”:“last”,“author”:{id“:”https://openalex.org/A5076086365“,”display_name“:”K.Tsukamoto“,”orcid“:null},”institutions“:[{”id“:”https://openalex.org/I116465919“,”display_name“:”Kogakuin University“,”ror“:”https://ror.org/01wc2tq75“,”country_code“:”JP“,”type“:“教育”,”世系“:[”https://openalex.org/I116465919“]}],”国家“:[”JP“],”is_corresponding“:false,”raw_author_name“:”K.Tsukamoto“,”raw _ afiliation_strings“:[“Kogakuin University,”],”affiliations“:[{”raw_ afiliation _string“:”Kogakun University“,”institution_ids“:]”https://openalex.org/I116465919“]}]}],”institution_assertions“:[],”countries_destict_count“:1,”institutions_dispict_count“:1,”corresponding_author_ids“:[],”corresponding_institution_ids“:[],”apc_list“:null,”apc_payed“:null,”fwci“:0.0,”has_fulltext“:false,”cited_by_count“:1,”citation_normalized_p百分位“:{”value“:0.250617,”is_in_top_1_p百分位“:false,”is_in_top_10_percent“:false},”cited_by_percentile_year“:{”min“:61,”max“:68},“biblio”:{“volume”:null,“issue”:nul,“first_page”:null,“last_page”:null},,“is_retracted”:false,“is_paratext”:false,“primary_topic”:{“id”:“https://openalex.org/T10400“,”“display_name”:“网络入侵检测和防御机制”,“score”:0.9999,“subfield”:{“id”:“https://openalex.org/subfields/1705“,”display_name“:”计算机网络和通信“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},”主题“:[{”id“:”https://openalex.org/T10400“,”“display_name”:“网络入侵检测和防御机制”,“score”:0.9999,“subfield”:{“id”:“https://openalex.org/subfields/1705“,”display_name“:”计算机网络和通信“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},{”id“:”https://openalex.org/T11598“,”“display_name”:“互联网流量分类的机器学习”,“score”:0.9992,“subfield”:{“id”:“https://openalex.org/subfields/1702“,”display_name“:”人工智能“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},{”id“:”https://openalex.org/T11241“,”display_name“:”Android恶意软件的特征描述和检测“,”score“:0.9989,”subfield“:{”id“:”https://openalex.org/subfields/1711“,”display_name“:”信号处理“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}}],”关键词“:[{”id“:”https://openalex.org/keywords/ip-traceback“,”display_name“:”IP traceback“,”score“:0.9785383},{”id“:”https://openalex.org/keywords/tracing“,”display_name“:”Tracing“,”score“:0.8225223},{”id“:”https://openalex.org/keywords/ddos-attacks网站“,”display_name“:”DDoS攻击“,”score“:0.576759},{”id“:”https://openalex.org/keywords/intrusion-detection网站“,”display_name“:”入侵检测“,”score“:0.527508},{”id“:”https://openalex.org/keywords/iot-security“,”display_name“:”物联网安全“,”score“:0.504636},{”id“:”https://openalex.org/keywords/internet-traffic网站“,”display_name“:”Internet流量“,”score“:0.502569},{”id“:”https://openalex.org/keywords/botnet检测“,”display_name“:”僵尸网络检测“,”score“:0.500803}],”concepts“:[{”id“:”https://openalex.org/C2776059407,“wikidata”:https://www.wikidata.org/wiki/Q5973212“,”display_name“:”IP traceback“,”level“:4,”score“:0.9785383},{”id“:”https://openalex.org/C195219913,“wikidata”:https://www.wikidata.org/wiki/Q13162“,”display_name“:”Internet控制消息协议“,”level“:3,”score“:0.89217246},{”id“:”https://openalex.org/C38822068,“wikidata”:https://www.wikidata.org/wiki/Q131406“,”display_name“:”拒绝服务攻击“,”level“:3,”score“:0.8864286},{”id“:”https://openalex.org/C138673069,“wikidata”:https://www.wikidata.org/wiki/Q322229“,”display_name“:”Tracing“,”level“:2,”score“:0.8225223},{”id“:”https://openalex.org/C41008148,“wikidata”:https://www.wikidata.org/wiki/Q21198“,”display_name“:”计算机科学“,”level“:0,”score“:0.7760359},{”id“:”https://openalex.org/C38652104,“wikidata”:https://www.wikidata.org/wiki/Q3510521“,”display_name“:”计算机安全“,”level“:1,”score“:0.60104483},{”id“:”https://openalex.org/C31258907,“wikidata”:https://www.wikidata.org/wiki/Q1301371“,”display_name“:”计算机网络“,”level“:1,”score“:0.5941836},{”id“:”https://openalex.org/C110875604,“wikidata”:https://www.wikidata.org/wiki/Q75“,”display_name“:”The Internet“,”level“:2,”score“:0.4943893},{”id“:”https://openalex.org/C111919701,“wikidata”:https://www.wikidata.org/wiki/Q9135“,”display_name“:”操作系统“,”level“:1,”score“:0.10517219},{”id“:”https://openalex.org/C158379750,“wikidata”:https://www.wikidata.org/wiki/Q214111“,”display_name“:”Network packet“,”level“:2,”score“:0.06258449}],”mesh“:[],”locations_count“:1,”location“:[{”is_oa“:false,”landing_page_url“:”https://doi.org/10.109/saintw.2005.1619990“,”pdf_url“:null,”source“:nul,”license“:null:”license_id“:nulse,”version“:null,”is_accepted“:false,”is_published“:false}],”best_oa_location“:nuld,”sustainable_development_goals“:[{”score“:0.71,”display_name“:”和平、正义和强大的制度“,”id“:”https://metadata.un.org/sdg/16“}],”grants“:[],”dataset“:[],”versions“:[],”referenced_works_count“:8,”referenced_works“:[”https://openalex.org/W1498306861","https://openalex.org/W1516942127","https://openalex.org/W1578138711","https://openalex.org/W1967949770","https://openalex.org/W2106655090","https://openalex.org/W2119030343","https://openalex.org/W2150228605","https://openalex.org/W4236793779“],”related_works“:[”https://openalex.org/W2359167911","https://openalex.org/W2353701916","https://openalex.org/W2353292112","https://openalex.org/W2342208107","https://openalex.org/W2199179552","https://openalex.org/W2170470865","https://openalex.org/W2167302331","https://openalex.org/W2151002785","https://openalex.org/W2127772962","https://openalex.org/W1493760256“],”abstract_inverted_index“:{”In“:[0],”recent“:[1],”years“:[2],”DoS“:[3],”攻击“:[4],”are“:[5,15],”beging“:[6],”more“:[7],”serious“:[8],”In“:[9],”security“:[10],”of“:[11,87,94],”the“:[12,27,40,75,79,85,92,95],”Internet.“:[13],”They“:[14],“相当”:[16],“容易”:[17],“到”:[18,22,26,34,77],“实现”,“:[19],“但是”:[20],“困难”:[21]防止。“:[23],”因此,“:[24],”跟踪“:[25,43,80],”攻击者“:[28],”和“:[29,48,66],”惩罚“:[30],”他们“:[31],”是“:[32,84],”考虑“:[33],”be“:[35],”an“:[36],”有效“:[37],”意味着“:[38],”对抗“:[39],”攻击。“:[41],”几个“:[42],”机制“:[44],”已经“:[45],”被“:[46],”提议“:[47],”分析“:[49],”对于“:[50,59],”简化“:[51],”模型。“:[52],”This“:[53,72],”paper“:[54],”descriptions“:[55],”a“:[56],”simulation“:[57,88],”method“:[58,73],”two“:[60],”network“:[61],”models“:[62],”ICMP“:[63],”traceback“:[64,69],”(iTrace)“:[65],”IP“:[67],”marking“:[68],”。“:[71],”修改“:[74],”OPNET“:[76],”添加“:[78],”代码。“:[81],”另外“:[82],”描述“:[83],”结果“:[86],”实验“:[89],”其中“:[90],”表示“:[91],”有效性“:[93],”方法。“:[96]},”cited_by_api_url“:”https://api.openalex.org/works?filter=cites:W1483042250“,”counts_by_year“:[{”年“:2012,”cited_by_count“:1}],”更新日期“:”2024-09-19T05:14:52.316417“,”创建日期“:“2016-06-24”}