{"id":"https://openalex.org/W1519207820","doi":"https://doi.org/10.1109/icccn.2004.1401737","title":"ForCES protocol design analysis for protection against DoS attacks","display_name":"ForCES protocol design analysis for protection against DoS attacks","publication_year":2005,"publication_date":"2005-03-21","ids":{"openalex":"https://openalex.org/W1519207820","doi":"https://doi.org/10.1109/icccn.2004.1401737","mag":"1519207820"},"language":"en","primary_location":{"id":"doi:10.1109/icccn.2004.1401737","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2004.1401737","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082902777","display_name":"S. Lakkavalli","orcid":null},"institutions":[{"id":"https://openalex.org/I126345244","display_name":"Portland State University","ror":"https://ror.org/00yn2fy02","country_code":"US","type":"education","lineage":["https://openalex.org/I126345244"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"S. Lakkavalli","raw_affiliation_strings":["Portland State University, USA"],"affiliations":[{"raw_affiliation_string":"Portland State University, USA","institution_ids":["https://openalex.org/I126345244"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003385630","display_name":"Hamid Khosravi","orcid":null},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"H. Khosravi","raw_affiliation_strings":["Intel Corporation, USA"],"affiliations":[{"raw_affiliation_string":"Intel Corporation, USA","institution_ids":["https://openalex.org/I1343180700"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5082902777"],"corresponding_institution_ids":["https://openalex.org/I126345244"],"apc_list":null,"apc_paid":null,"fwci":0.3557,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.61469056,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"550","last_page":"550"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7544221878051758},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.7245299220085144},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7039411664009094},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6305227279663086},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5886529088020325},{"id":"https://openalex.org/keywords/transmission-control-protocol","display_name":"Transmission Control Protocol","score":0.49949002265930176},{"id":"https://openalex.org/keywords/protocol-design","display_name":"Protocol design","score":0.4458843767642975},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4393455982208252},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42099544405937195},{"id":"https://openalex.org/keywords/network-congestion","display_name":"Network congestion","score":0.4140496850013733},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.2738375663757324},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.10127842426300049}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7544221878051758},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.7245299220085144},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7039411664009094},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6305227279663086},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5886529088020325},{"id":"https://openalex.org/C33588617","wikidata":"https://www.wikidata.org/wiki/Q8803","display_name":"Transmission Control Protocol","level":3,"score":0.49949002265930176},{"id":"https://openalex.org/C2982881601","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Protocol design","level":3,"score":0.4458843767642975},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4393455982208252},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42099544405937195},{"id":"https://openalex.org/C195563490","wikidata":"https://www.wikidata.org/wiki/Q180368","display_name":"Network congestion","level":3,"score":0.4140496850013733},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.2738375663757324},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.10127842426300049},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn.2004.1401737","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2004.1401737","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W26296735","https://openalex.org/W3011637539","https://openalex.org/W2495125142","https://openalex.org/W2039664313","https://openalex.org/W2019522905","https://openalex.org/W2039234374","https://openalex.org/W4283459152","https://openalex.org/W2384317380","https://openalex.org/W2184592418","https://openalex.org/W2028508447"],"abstract_inverted_index":{"This":[0],"work":[1],"discusses":[2],"a":[3,21],"design":[4,73],"analysis":[5],"for":[6,24,70],"the":[7,10,25,34,40,53,77],"protection":[8],"of":[9,15],"ForCES":[11,26],"protocol":[12,41],"against":[13],"denial":[14],"service":[16],"(DoS)":[17],"attacks,":[18],"which":[19],"is":[20],"key":[22],"requirement":[23],"protocol.":[27],"In":[28],"order":[29],"to":[30,43],"meet":[31],"this":[32],"requirement,":[33],"control":[35,56],"and":[36,57,65],"data":[37,58],"messages":[38],"in":[39],"needs":[42],"be":[44],"separated.":[45],"The":[46,72],"separation":[47],"scheme":[48],"consists":[49],"of:":[50],"(1)":[51],"separating":[52],"congestion":[54],"aware,":[55],"transport":[59],"connections":[60,64],"such":[61],"as":[62],"TCP":[63],"(2)":[66],"gives":[67],"higher":[68],"priority":[69],"control.":[71],"issues":[74],"along":[75],"with":[76],"experimental":[78],"results":[79],"are":[80],"discussed.":[81]},"counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
