{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:53:30Z","timestamp":1725472410196},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494621"},{"type":"electronic","value":"9783540494638"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935070_24","type":"book-chapter","created":{"date-parts":[[2006,11,13]],"date-time":"2006-11-13T02:25:27Z","timestamp":1163384727000},"page":"342-353","source":"Crossref","is-referenced-by-count":3,"title":["Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network"],"prefix":"10.1007","author":[{"given":"Jian","family":"Kang","sequence":"first","affiliation":[]},{"given":"Yuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jiu-bin","family":"Ju","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"Jelena, M.: D-WARD. Source-End Defense Against Distributed Denial-of-Service Attacks, CSD of UCLA, pp. 101\u2013125 (2003)"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Kang, J., Zhang, Z., Ju, J.-b.: Protect e-commerce against DDoS attacks with improved D-WARD detection system. In: IEEE International Conference on e-Technology, e-Commerce and e-Service, Hong Kong (April 2005)","DOI":"10.1109\/EEE.2005.109"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1007\/978-3-540-24693-0_63","volume-title":"NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications","author":"T. Peng","year":"2004","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol.\u00a03042, pp. 771\u2013782. Springer, Heidelberg (2004)"},{"key":"24_CR4","doi-asserted-by":"publisher","first-page":"1594","DOI":"10.1360\/crad20050921","volume":"42","author":"D. Zhou","year":"2005","unstructured":"Zhou, D., Zhang, H.: A DDoS Attack Detection Method Based on Hidden Markov Model. Journal of Computer Research and Development\u00a042, 1594\u20131599 (2005)","journal-title":"Journal of Computer Research and Development"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Moore, D., Voelker, G., Savage, S.: Inferring internet denial-of-service activity. In: The 10th USENIX Security Symposium, Washington (2001)","DOI":"10.21236\/ADA400003"},{"key":"24_CR6","unstructured":"Chang-Han, J., Shiuh-Pyng, S.: Detecting Distributed DoS\/Scanning by Anomaly Distribution of Packet Fields. In: International Computer Symposium 2002 (2002)"},{"key":"24_CR7","unstructured":"Zeng, Z., Tu, J.: Pianfetti: Audio-visual affect recognition through multi-stream fused HMM for HCI. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition (June 2005)"},{"issue":"3","key":"24_CR8","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/TSP.2003.822353","volume":"52","author":"H. Pan","year":"2004","unstructured":"Pan, H., Levinson, S., Huang, T.S., Liang, Z.P.: A fused Hidden Markov Model With Application to Bimodal Speech Processing. IEEE Transaction on Signal Processing\u00a052(3), 573\u2013581 (2004)","journal-title":"IEEE Transaction on Signal Processing"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Brand, M., Oliver, N.: Coupled hidden Markov models for complex action recognition. Computer Vision Pattern Recognition, 201\u2013206 (1997)","DOI":"10.1109\/CVPR.1997.609450"},{"key":"24_CR10","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1023\/A:1007649326333","volume":"37","author":"L.K. Saul","year":"1999","unstructured":"Saul, L.K., Jordan, M.I.: Mixed memory Markov model: Decomposing complex stochastic processes as mixture of simpler ones. Machine Learning\u00a037, 75\u201388 (1999)","journal-title":"Machine Learning"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Rabiner, L.R.: A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. Proceedings of IEEE\u00a077(2) (February 1989)","DOI":"10.1109\/5.18626"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935070_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:48:03Z","timestamp":1619495283000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935070_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494621","9783540494638"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11935070_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}