Advertisement
Guest User

Untitled

a guest
Jun 14th, 2016
192
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
BibTeX 17.42 KB | None | 0 0
  1. % $ biblatex auxiliary file $
  2. % $ biblatex version 2.5 $
  3. % Do not modify the above lines!
  4. %
  5. % This is an auxiliary file used by the 'biblatex' package.
  6. % This file may safely be deleted. It will be recreated as
  7. % required.
  8. %
  9. \begingroup
  10. \makeatletter
  11. \@ifundefined{ver@biblatex.sty}
  12.   {\@latex@error
  13.     {Missing 'biblatex' package}
  14.     {The bibliography requires the 'biblatex' package.}
  15.      \aftergroup\endinput}
  16.   {}
  17. \endgroup
  18.  
  19. \entry{akamai2015}{report}{}
  20.   \name{author}{1}{}{%
  21.    {{}%
  22.     {Akamai}{A.}%
  23.     {}{}%
  24.     {}{}%
  25.     {}{}}%
  26.  }
  27.   \strng{namehash}{A1}
  28.   \strng{fullhash}{A1}
  29.   \field{sortinit}{A}
  30.   \field{title}{{Akamai's State of The Internet Security Report - Q3 2015}}
  31.   \verb{url}
  32.   \verb https://www.stateoftheinternet.com/downloads/pdfs/2015-cloud-security-r
  33.   \verb eport-q3.pdf
  34.   \endverb
  35.   \list{institution}{1}{%
  36.    {Akamai Technologies}%
  37.  }
  38.   \field{type}{techreport}
  39.   \field{year}{2015}
  40. \endentry
  41.  
  42. \entry{scion2015}{article}{}
  43.   \name{author}{4}{}{%
  44.    {{}%
  45.     {Barrera}{B.}%
  46.     {David}{D.}%
  47.     {}{}%
  48.     {}{}}%
  49.    {{}%
  50.     {Reischuk}{R.}%
  51.     {Raphael~M.}{R.~M.}%
  52.     {}{}%
  53.     {}{}}%
  54.    {{}%
  55.     {Szalachowski}{S.}%
  56.     {Pawel}{P.}%
  57.     {}{}%
  58.     {}{}}%
  59.    {{}%
  60.     {Perrig}{P.}%
  61.     {Adrian}{A.}%
  62.     {}{}%
  63.     {}{}}%
  64.  }
  65.   \keyw{scion}
  66.   \strng{namehash}{BD+1}
  67.   \strng{fullhash}{BDRRMSPPA1}
  68.   \field{sortinit}{B}
  69.   \verb{eprint}
  70.   \verb 1508.01651
  71.   \endverb
  72.   \field{title}{{SCION Five Years Later: Revisiting Scalability, Control, and
  73.  Isolation on Next-Generation Networks}}
  74.   \verb{url}
  75.   \verb http://arxiv.org/pdf/1508.01651
  76.   \endverb
  77.   \field{journaltitle}{arXiv e-prints}
  78.   \field{eprinttype}{arXiv}
  79.   \field{eprintclass}{cs.NI}
  80.   \field{month}{08}
  81.   \field{year}{2015}
  82. \endentry
  83.  
  84. \entry{sibra2016}{inproceedings}{}
  85.   \name{author}{8}{}{%
  86.    {{}%
  87.     {Basescu}{B.}%
  88.     {Cristina}{C.}%
  89.     {}{}%
  90.     {}{}}%
  91.    {{}%
  92.     {Reischuk}{R.}%
  93.     {Raphael~M.}{R.~M.}%
  94.     {}{}%
  95.     {}{}}%
  96.    {{}%
  97.     {Szalachowski}{S.}%
  98.     {Pawel}{P.}%
  99.     {}{}%
  100.     {}{}}%
  101.    {{}%
  102.     {Perrig}{P.}%
  103.     {Adrian}{A.}%
  104.     {}{}%
  105.     {}{}}%
  106.    {{}%
  107.     {Zhang}{Z.}%
  108.     {Yao}{Y.}%
  109.     {}{}%
  110.     {}{}}%
  111.    {{}%
  112.     {Hsiao}{H.}%
  113.     {Hsu-Chun}{H.-C.}%
  114.     {}{}%
  115.     {}{}}%
  116.    {{}%
  117.     {Kubota}{K.}%
  118.     {Ayumu}{A.}%
  119.     {}{}%
  120.     {}{}}%
  121.    {{}%
  122.     {Urakawa}{U.}%
  123.     {Jumpei}{J.}%
  124.     {}{}%
  125.     {}{}}%
  126.  }
  127.   \keyw{ddos}
  128.   \strng{namehash}{BC+1}
  129.   \strng{fullhash}{BCRRMSPPAZYHHCKAUJ1}
  130.   \field{sortinit}{B}
  131.   \field{booktitle}{Proceedings of Symposium on Network and Distributed System
  132.  Security (NDSS)}
  133.   \field{title}{{SIBRA}: Scalable Internet Bandwidth Reservation Architecture}
  134.   \verb{url}
  135.   \verb http://www.scion-architecture.net/pdf/2016-SIBRA.pdf
  136.   \endverb
  137.   \field{month}{02}
  138.   \field{year}{2016}
  139. \endentry
  140.  
  141. \entry{clarke2009costs}{article}{}
  142.   \name{author}{1}{}{%
  143.    {{}%
  144.     {Clarke}{C.}%
  145.     {Richard~N}{R.~N.}%
  146.     {}{}%
  147.     {}{}}%
  148.  }
  149.   \strng{namehash}{CRN1}
  150.   \strng{fullhash}{CRN1}
  151.   \field{sortinit}{C}
  152.   \field{number}{1}
  153.   \field{title}{Costs of neutral/unmanaged IP networks}
  154.   \field{volume}{8}
  155.   \field{journaltitle}{Review of network economics}
  156.   \field{year}{2009}
  157. \endentry
  158.  
  159. \entry{EC2015}{misc}{}
  160.   \name{author}{1}{}{%
  161.    {{}%
  162.     {Commision}{C.}%
  163.     {European}{E.}%
  164.     {}{}%
  165.     {}{}}%
  166.  }
  167.   \strng{namehash}{CE1}
  168.   \strng{fullhash}{CE1}
  169.   \field{sortinit}{C}
  170.   \field{title}{{Digital Agenda For Europe: EU Actions on Net Neutrality}}
  171.   \verb{url}
  172.   \verb https://ec.europa.eu/digital-agenda/en/eu-actions-net-neutrality
  173.   \endverb
  174.   \list{institution}{1}{%
  175.    {European Commission}%
  176.  }
  177.   \field{month}{10}
  178.   \field{year}{2015}
  179. \endentry
  180.  
  181. \entry{dyaberi2012managing}{article}{}
  182.   \name{author}{9}{}{%
  183.    {{}%
  184.     {Dyaberi}{D.}%
  185.     {Jagadeesh~M}{J.~M.}%
  186.     {}{}%
  187.     {}{}}%
  188.    {{}%
  189.     {Parsons}{P.}%
  190.     {Brian}{B.}%
  191.     {}{}%
  192.     {}{}}%
  193.    {{}%
  194.     {Pai}{P.}%
  195.     {Vijay~S}{V.~S.}%
  196.     {}{}%
  197.     {}{}}%
  198.    {{}%
  199.     {Kannan}{K.}%
  200.     {Kalapriya}{K.}%
  201.     {}{}%
  202.     {}{}}%
  203.    {{}%
  204.     {Chen}{C.}%
  205.     {Yih-Farn~Robin}{Y.-F.~R.}%
  206.     {}{}%
  207.     {}{}}%
  208.    {{}%
  209.     {Jana}{J.}%
  210.     {Rittwik}{R.}%
  211.     {}{}%
  212.     {}{}}%
  213.    {{}%
  214.     {Stern}{S.}%
  215.     {Daniel}{D.}%
  216.     {}{}%
  217.     {}{}}%
  218.    {{}%
  219.     {Varshavsky}{V.}%
  220.     {Alexander}{A.}%
  221.     {}{}%
  222.     {}{}}%
  223.    {{}%
  224.     {Wei}{W.}%
  225.     {Bin}{B.}%
  226.     {}{}%
  227.     {}{}}%
  228.  }
  229.   \list{publisher}{1}{%
  230.    {IEEE}%
  231.  }
  232.   \strng{namehash}{DJM+1}
  233.   \strng{fullhash}{DJMPBPVSKKCYFRJRSDVAWB1}
  234.   \field{sortinit}{D}
  235.   \field{number}{11}
  236.   \field{pages}{100\bibrangedash 107}
  237.   \field{title}{Managing cellular congestion using incentives}
  238.   \field{volume}{50}
  239.   \field{journaltitle}{Communications Magazine, IEEE}
  240.   \field{year}{2012}
  241. \endentry
  242.  
  243. \entry{FCC2015}{misc}{}
  244.   \field{sortinit}{F}
  245.   \field{title}{{FCC Open Internet Rules}}
  246.   \verb{url}
  247.   \verb https://www.fcc.gov/general/open-internet
  248.   \endverb
  249.   \list{institution}{1}{%
  250.    {FCC}%
  251.  }
  252.   \field{month}{02}
  253.   \field{year}{2015}
  254. \endentry
  255.  
  256. \entry{ferreira2005}{inproceedings}{}
  257.   \name{author}{2}{}{%
  258.    {{}%
  259.     {Ferreira}{F.}%
  260.     {Pedro}{P.}%
  261.     {}{}%
  262.     {}{}}%
  263.    {{}%
  264.     {Sirbu}{S.}%
  265.     {Marvin}{M.}%
  266.     {}{}%
  267.     {}{}}%
  268.  }
  269.   \list{organization}{1}{%
  270.    {ACM}%
  271.  }
  272.   \strng{namehash}{FPSM1}
  273.   \strng{fullhash}{FPSM1}
  274.   \field{sortinit}{F}
  275.   \field{booktitle}{Proceedings of the 6th ACM conference on Electronic
  276.  commerce}
  277.   \field{pages}{137\bibrangedash 146}
  278.   \field{title}{Inefficiency in provisioning interconnected communication
  279.  networks}
  280.   \field{year}{2005}
  281. \endentry
  282.  
  283. \entry{glass2015}{misc}{}
  284.   \name{author}{1}{}{%
  285.    {{}%
  286.     {Glass}{G.}%
  287.     {Victor}{V.}%
  288.     {}{}%
  289.     {}{}}%
  290.  }
  291.   \strng{namehash}{GV1}
  292.   \strng{fullhash}{GV1}
  293.   \field{sortinit}{G}
  294.   \field{note}{{Talk held at SDP Conference, Princeton University}}
  295.   \field{title}{{Smart Data Pricing: The Net-Neutrality Test}}
  296.   \verb{url}
  297.   \verb http://sdpindustryforum.com/static/files/victor_glass.pdf
  298.   \endverb
  299.   \field{month}{04}
  300.   \field{year}{2015}
  301. \endentry
  302.  
  303. \entry{hsiao2013stride}{inproceedings}{}
  304.   \name{author}{7}{}{%
  305.    {{}%
  306.     {Hsiao}{H.}%
  307.     {Hsu-Chun}{H.-C.}%
  308.     {}{}%
  309.     {}{}}%
  310.    {{}%
  311.     {Kim}{K.}%
  312.     {Tiffany Hyun-Jin}{T.~H.-J.}%
  313.     {}{}%
  314.     {}{}}%
  315.    {{}%
  316.     {Yoo}{Y.}%
  317.     {Sangjae}{S.}%
  318.     {}{}%
  319.     {}{}}%
  320.    {{}%
  321.     {Zhang}{Z.}%
  322.     {Xin}{X.}%
  323.     {}{}%
  324.     {}{}}%
  325.    {{}%
  326.     {Lee}{L.}%
  327.     {Soo~Bum}{S.~B.}%
  328.     {}{}%
  329.     {}{}}%
  330.    {{}%
  331.     {Gligor}{G.}%
  332.     {Virgil}{V.}%
  333.     {}{}%
  334.     {}{}}%
  335.    {{}%
  336.     {Perrig}{P.}%
  337.     {Adrian}{A.}%
  338.     {}{}%
  339.     {}{}}%
  340.  }
  341.   \list{organization}{1}{%
  342.    {ACM}%
  343.  }
  344.   \strng{namehash}{HHC+1}
  345.   \strng{fullhash}{HHCKTHJYSZXLSBGVPA1}
  346.   \field{sortinit}{H}
  347.   \field{booktitle}{Proceedings of the 8th ACM SIGSAC symposium on Information,
  348.  computer and communications security}
  349.   \field{pages}{415\bibrangedash 426}
  350.   \field{title}{STRIDE: sanctuary trail--refuge from internet DDoS entrapment}
  351.   \field{year}{2013}
  352. \endentry
  353.  
  354. \entry{joe2011time}{inproceedings}{}
  355.   \name{author}{3}{}{%
  356.    {{}%
  357.     {Joe-Wong}{J.-W.}%
  358.     {Carlee}{C.}%
  359.     {}{}%
  360.     {}{}}%
  361.    {{}%
  362.     {Ha}{H.}%
  363.     {Sangtae}{S.}%
  364.     {}{}%
  365.     {}{}}%
  366.    {{}%
  367.     {Chiang}{C.}%
  368.     {Mung}{M.}%
  369.     {}{}%
  370.     {}{}}%
  371.  }
  372.   \list{organization}{1}{%
  373.    {IEEE}%
  374.  }
  375.   \strng{namehash}{JWCHSCM1}
  376.   \strng{fullhash}{JWCHSCM1}
  377.   \field{sortinit}{J}
  378.   \field{booktitle}{Distributed Computing Systems (ICDCS), 2011 31st
  379.  International Conference on}
  380.   \field{pages}{288\bibrangedash 298}
  381.   \field{title}{Time-dependent broadband pricing: Feasibility and benefits}
  382.   \field{year}{2011}
  383. \endentry
  384.  
  385. \entry{matsumoto2015}{article}{}
  386.   \name{author}{5}{}{%
  387.    {{}%
  388.     {Matsumoto}{M.}%
  389.     {Stephanos}{S.}%
  390.     {}{}%
  391.     {}{}}%
  392.    {{}%
  393.     {Reischuk}{R.}%
  394.     {Raphael~M.}{R.~M.}%
  395.     {}{}%
  396.     {}{}}%
  397.    {{}%
  398.     {Szalachowski}{S.}%
  399.     {Pawel}{P.}%
  400.     {}{}%
  401.     {}{}}%
  402.    {{}%
  403.     {Kim}{K.}%
  404.     {Tiffany~Hyun{-}Jin}{T.~H.}%
  405.     {}{}%
  406.     {}{}}%
  407.    {{}%
  408.     {Perrig}{P.}%
  409.     {Adrian}{A.}%
  410.     {}{}%
  411.     {}{}}%
  412.  }
  413.   \strng{namehash}{MS+1}
  414.   \strng{fullhash}{MSRRMSPKTHPA1}
  415.   \field{sortinit}{M}
  416.   \field{title}{Designing a Global Authentication Infrastructure}
  417.   \verb{url}
  418.   \verb http://arxiv.org/abs/1506.03392
  419.   \endverb
  420.   \field{volume}{abs/1506.03392}
  421.   \field{journaltitle}{CoRR}
  422.   \field{year}{2015}
  423. \endentry
  424.  
  425. \entry{meeker2016internet}{report}{}
  426.   \name{author}{1}{}{%
  427.    {{}%
  428.     {Meeker}{M.}%
  429.     {Mary}{M.}%
  430.     {}{}%
  431.     {}{}}%
  432.  }
  433.   \strng{namehash}{MM1}
  434.   \strng{fullhash}{MM1}
  435.   \field{sortinit}{M}
  436.   \field{title}{Internet Trends 2016}
  437.   \verb{url}
  438.   \verb http://www.kpcb.com/internet-trends
  439.   \endverb
  440.   \list{institution}{1}{%
  441.    {KPCB}%
  442.  }
  443.   \field{type}{techreport}
  444.   \field{year}{2016}
  445. \endentry
  446.  
  447. \entry{odlyzko2014will}{report}{}
  448.   \name{author}{1}{}{%
  449.    {{}%
  450.     {Odlyzko}{O.}%
  451.     {Andrew}{A.}%
  452.     {}{}%
  453.     {}{}}%
  454.  }
  455.   \strng{namehash}{OA1}
  456.   \strng{fullhash}{OA1}
  457.   \field{sortinit}{O}
  458.   \field{title}{Will smart pricing finally take off?}
  459.   \list{institution}{1}{%
  460.    {DTIC Document}%
  461.  }
  462.   \field{type}{techreport}
  463.   \field{year}{2014}
  464. \endentry
  465.  
  466. \entry{odlyzko2012know}{article}{}
  467.   \name{author}{4}{}{%
  468.    {{}%
  469.     {Odlyzko}{O.}%
  470.     {Andrew}{A.}%
  471.     {}{}%
  472.     {}{}}%
  473.    {{}%
  474.     {Arnaud}{A.}%
  475.     {Bill~St}{B.~S.}%
  476.     {}{}%
  477.     {}{}}%
  478.    {{}%
  479.     {Stallman}{S.}%
  480.     {Erik}{E.}%
  481.     {}{}%
  482.     {}{}}%
  483.    {{}%
  484.     {Weinberg}{W.}%
  485.     {Michael}{M.}%
  486.     {}{}%
  487.     {}{}}%
  488.  }
  489.   \strng{namehash}{OA+1}
  490.   \strng{fullhash}{OAABSSEWM1}
  491.   \field{sortinit}{O}
  492.   \field{title}{Know your limits: Considering the role of data caps and usage
  493.  based billing in internet access service}
  494.   \field{journaltitle}{Public Knowledge}
  495.   \field{year}{2012}
  496. \endentry
  497.  
  498. \entry{parno2007portcullis}{inproceedings}{}
  499.   \name{author}{6}{}{%
  500.    {{}%
  501.     {Parno}{P.}%
  502.     {Bryan}{B.}%
  503.     {}{}%
  504.     {}{}}%
  505.    {{}%
  506.     {Wendlandt}{W.}%
  507.     {Dan}{D.}%
  508.     {}{}%
  509.     {}{}}%
  510.    {{}%
  511.     {Shi}{S.}%
  512.     {Elaine}{E.}%
  513.     {}{}%
  514.     {}{}}%
  515.    {{}%
  516.     {Perrig}{P.}%
  517.     {Adrian}{A.}%
  518.     {}{}%
  519.     {}{}}%
  520.    {{}%
  521.     {Maggs}{M.}%
  522.     {Bruce}{B.}%
  523.     {}{}%
  524.     {}{}}%
  525.    {{}%
  526.     {Hu}{H.}%
  527.     {Yih-Chun}{Y.-C.}%
  528.     {}{}%
  529.     {}{}}%
  530.  }
  531.   \list{organization}{1}{%
  532.    {ACM}%
  533.  }
  534.   \strng{namehash}{PB+1}
  535.   \strng{fullhash}{PBWDSEPAMBHYC1}
  536.   \field{sortinit}{P}
  537.   \field{booktitle}{ACM SIGCOMM Computer Communication Review}
  538.   \field{number}{4}
  539.   \field{pages}{289\bibrangedash 300}
  540.   \field{title}{Portcullis: protecting connection setup from
  541.  denial-of-capability attacks}
  542.   \field{volume}{37}
  543.   \field{year}{2007}
  544. \endentry
  545.  
  546. \entry{sathiaseelan2015exploring}{inproceedings}{}
  547.   \name{author}{3}{}{%
  548.    {{}%
  549.     {Sathiaseelan}{S.}%
  550.     {Arjuna}{A.}%
  551.     {}{}%
  552.     {}{}}%
  553.    {{}%
  554.     {Tyson}{T.}%
  555.     {Gareth}{G.}%
  556.     {}{}%
  557.     {}{}}%
  558.    {{}%
  559.     {Sen}{S.}%
  560.     {Soumya}{S.}%
  561.     {}{}%
  562.     {}{}}%
  563.  }
  564.   \list{organization}{1}{%
  565.    {IEEE}%
  566.  }
  567.   \strng{namehash}{SATGSS1}
  568.   \strng{fullhash}{SATGSS1}
  569.   \field{sortinit}{S}
  570.   \field{booktitle}{Computer Communications Workshops (INFOCOM WKSHPS), 2015
  571.  IEEE Conference on}
  572.   \field{pages}{558\bibrangedash 563}
  573.   \field{title}{Exploring the role of smart data pricing in enabling affordable
  574.  internet access}
  575.   \field{year}{2015}
  576. \endentry
  577.  
  578. \entry{sen2013survey}{article}{}
  579.   \name{author}{4}{}{%
  580.    {{}%
  581.     {Sen}{S.}%
  582.     {Soumya}{S.}%
  583.     {}{}%
  584.     {}{}}%
  585.    {{}%
  586.     {Joe-Wong}{J.-W.}%
  587.     {Carlee}{C.}%
  588.     {}{}%
  589.     {}{}}%
  590.    {{}%
  591.     {Ha}{H.}%
  592.     {Sangtae}{S.}%
  593.     {}{}%
  594.     {}{}}%
  595.    {{}%
  596.     {Chiang}{C.}%
  597.     {Mung}{M.}%
  598.     {}{}%
  599.     {}{}}%
  600.  }
  601.   \list{publisher}{1}{%
  602.    {ACM}%
  603.  }
  604.   \strng{namehash}{SS+1}
  605.   \strng{fullhash}{SSJWCHSCM1}
  606.   \field{sortinit}{S}
  607.   \field{number}{2}
  608.   \field{pages}{15}
  609.   \field{title}{A survey of smart data pricing: Past proposals, current plans,
  610.  and future trends}
  611.   \field{volume}{46}
  612.   \field{journaltitle}{ACM Computing Surveys (CSUR)}
  613.   \field{year}{2013}
  614. \endentry
  615.  
  616. \entry{kddi2015}{report}{}
  617.   \name{author}{6}{}{%
  618.    {{}%
  619.     {Sugiyama}{S.}%
  620.     {Kohei}{K.}%
  621.     {}{}%
  622.     {}{}}%
  623.    {{}%
  624.     {Urakawa}{U.}%
  625.     {Jumpei}{J.}%
  626.     {}{}%
  627.     {}{}}%
  628.    {{}%
  629.     {Taya}{T.}%
  630.     {Masato}{M.}%
  631.     {}{}%
  632.     {}{}}%
  633.    {{}%
  634.     {Yamada}{Y.}%
  635.     {Akira}{A.}%
  636.     {}{}%
  637.     {}{}}%
  638.    {{}%
  639.     {Kobayashi}{K.}%
  640.     {Arei}{A.}%
  641.     {}{}%
  642.     {}{}}%
  643.    {{}%
  644.     {Tagami}{T.}%
  645.     {Atsushi}{A.}%
  646.     {}{}%
  647.     {}{}}%
  648.  }
  649.   \strng{namehash}{SK+1}
  650.   \strng{fullhash}{SKUJTMYAKATA1}
  651.   \field{sortinit}{S}
  652.   \field{title}{{Empirical Analysis of Customer Behavior for Tiered Data Plans
  653.  in Mobile Market}}
  654.   \list{institution}{1}{%
  655.    {{KDDI R\&D Laboratories Inc., Japan}}%
  656.  }
  657.   \field{type}{techreport}
  658.   \field{year}{2015}
  659. \endentry
  660.  
  661. \entry{swanson2008estimating}{article}{}
  662.   \name{author}{2}{}{%
  663.    {{}%
  664.     {Swanson}{S.}%
  665.     {Bret}{B.}%
  666.     {}{}%
  667.     {}{}}%
  668.    {{}%
  669.     {Gilder}{G.}%
  670.     {George}{G.}%
  671.     {}{}%
  672.     {}{}}%
  673.  }
  674.   \strng{namehash}{SBGG1}
  675.   \strng{fullhash}{SBGG1}
  676.   \field{sortinit}{S}
  677.   \field{title}{Estimating the exaflood}
  678.   \field{journaltitle}{Discovery Institute white paper}
  679.   \field{year}{2008}
  680. \endentry
  681.  
  682. \entry{cisco2015}{report}{}
  683.   \name{author}{1}{}{%
  684.    {{}%
  685.     {Systems}{S.}%
  686.     {Cisco}{C.}%
  687.     {}{}%
  688.     {}{}}%
  689.  }
  690.   \strng{namehash}{SC1}
  691.   \strng{fullhash}{SC1}
  692.   \field{sortinit}{S}
  693.   \field{title}{{Cisco visual networking index: forecast and methodology,
  694.  2014-2019}}
  695.   \verb{url}
  696.   \verb http://www.cisco.com/c/en/us/solutions/collateral/service-provider/ip-n
  697.   \verb gn-ip-next-generation-network/white_paper_c11-481360.pdf
  698.   \endverb
  699.   \list{institution}{1}{%
  700.    {Cisco}%
  701.  }
  702.   \field{type}{techreport}
  703.   \field{year}{2015}
  704. \endentry
  705.  
  706. \entry{szabo1996mental}{article}{}
  707.   \name{author}{1}{}{%
  708.    {{}%
  709.     {Szabo}{S.}%
  710.     {Nick}{N.}%
  711.     {}{}%
  712.     {}{}}%
  713.  }
  714.   \strng{namehash}{SN1}
  715.   \strng{fullhash}{SN1}
  716.   \field{sortinit}{S}
  717.   \field{title}{The mental accounting barrier to micropayments}
  718.   \field{journaltitle}{h ttp://szabo. best. vwh. net/index. html}
  719.   \field{year}{1996}
  720. \endentry
  721.  
  722. \entry{cloudflare2015}{report}{}
  723.   \field{sortinit}{T}
  724.   \field{title}{{Technical Details Behind a 400Gbps NTP Amplification DDoS
  725.  Attack}}
  726.   \verb{url}
  727.   \verb https://blog.cloudflare.com/technical-details-behind-a-400gbps-ntp-ampl
  728.   \verb ification-ddos-attack/
  729.   \endverb
  730.   \list{institution}{1}{%
  731.    {Cloudflare}%
  732.  }
  733.   \field{type}{techreport}
  734.   \field{year}{2015}
  735. \endentry
  736.  
  737. \entry{theeco2009}{article}{}
  738.   \field{sortinit}{T}
  739.   \field{title}{The mother of invention: Network operators in the poor world
  740.  are cutting costs and increasing access in innovative ways}
  741.   \verb{url}
  742.   \verb http://www.economist.com/node/14483880
  743.   \endverb
  744.   \field{journaltitle}{The Economist}
  745.   \field{month}{09}
  746.   \field{year}{2009}
  747. \endentry
  748.  
  749. \entry{varadhan2000persistent}{article}{}
  750.   \name{author}{3}{}{%
  751.    {{}%
  752.     {Varadhan}{V.}%
  753.     {Kannan}{K.}%
  754.     {}{}%
  755.     {}{}}%
  756.    {{}%
  757.     {Govindan}{G.}%
  758.     {Ramesh}{R.}%
  759.     {}{}%
  760.     {}{}}%
  761.    {{}%
  762.     {Estrin}{E.}%
  763.     {Deborah}{D.}%
  764.     {}{}%
  765.     {}{}}%
  766.  }
  767.   \list{publisher}{1}{%
  768.    {Elsevier}%
  769.  }
  770.   \strng{namehash}{VKGRED1}
  771.   \strng{fullhash}{VKGRED1}
  772.   \field{sortinit}{V}
  773.   \field{number}{1}
  774.   \field{pages}{1\bibrangedash 16}
  775.   \field{title}{Persistent route oscillations in inter-domain routing}
  776.   \field{volume}{32}
  777.   \field{journaltitle}{Computer networks}
  778.   \field{year}{2000}
  779. \endentry
  780.  
  781. \entry{yang2005limiting}{inproceedings}{}
  782.   \name{author}{3}{}{%
  783.    {{}%
  784.     {Yang}{Y.}%
  785.     {Xiaowei}{X.}%
  786.     {}{}%
  787.     {}{}}%
  788.    {{}%
  789.     {Wetherall}{W.}%
  790.     {David}{D.}%
  791.     {}{}%
  792.     {}{}}%
  793.    {{}%
  794.     {Anderson}{A.}%
  795.     {Thomas}{T.}%
  796.     {}{}%
  797.     {}{}}%
  798.  }
  799.   \list{organization}{1}{%
  800.    {ACM}%
  801.  }
  802.   \strng{namehash}{YXWDAT1}
  803.   \strng{fullhash}{YXWDAT1}
  804.   \field{sortinit}{Y}
  805.   \field{booktitle}{ACM SIGCOMM Computer Communication Review}
  806.   \field{number}{4}
  807.   \field{pages}{241\bibrangedash 252}
  808.   \field{title}{A DoS-limiting network architecture}
  809.   \field{volume}{35}
  810.   \field{year}{2005}
  811. \endentry
  812.  
  813. \entry{yuksel2007value}{inproceedings}{}
  814.   \name{author}{5}{}{%
  815.    {{}%
  816.     {Yuksel}{Y.}%
  817.     {Murat}{M.}%
  818.     {}{}%
  819.     {}{}}%
  820.    {{}%
  821.     {Ramakrishnan}{R.}%
  822.     {KK}{K.}%
  823.     {}{}%
  824.     {}{}}%
  825.    {{}%
  826.     {Kalyanaraman}{K.}%
  827.     {Shivkumar}{S.}%
  828.     {}{}%
  829.     {}{}}%
  830.    {{}%
  831.     {Houle}{H.}%
  832.     {Joseph~D}{J.~D.}%
  833.     {}{}%
  834.     {}{}}%
  835.    {{}%
  836.     {Sadhvani}{S.}%
  837.     {Rita}{R.}%
  838.     {}{}%
  839.     {}{}}%
  840.  }
  841.   \list{organization}{1}{%
  842.    {IEEE}%
  843.  }
  844.   \strng{namehash}{YM+1}
  845.   \strng{fullhash}{YMRKKSHJDSR1}
  846.   \field{sortinit}{Y}
  847.   \field{booktitle}{Quality of Service, 2007 Fifteenth IEEE International
  848.  Workshop on}
  849.   \field{pages}{109\bibrangedash 112}
  850.   \field{title}{value of supporting class-of-service in IP backbones}
  851.   \field{year}{2007}
  852. \endentry
  853.  
  854. \lossort
  855. \endlossort
  856.  
  857. \endinput
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement