{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T02:58:06Z","timestamp":1725850686736},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319262253"},{"type":"electronic","value":"9783319262277"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-26227-7_75","type":"book-chapter","created":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T14:54:29Z","timestamp":1457103269000},"page":"797-806","source":"Crossref","is-referenced-by-count":6,"title":["DDoS Attacks Detection by Means of Statistical Models"],"prefix":"10.1007","author":[{"given":"Tomasz","family":"Andrysiak","sequence":"first","affiliation":[]},{"given":"\u0141ukasz","family":"Saganowski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,5]]},"reference":[{"key":"75_CR1","unstructured":"Jackson, K.: Intrusion Detection Systems (IDS). Product Survey. Los Alamos National Library, LA-UR-99-3883 (1999)"},{"key":"75_CR2","unstructured":"Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone C.: Evaluating pattern recognition techniques in intrusion detection systems. In: PRIS, pp. 144\u2013153 (2005)"},{"key":"75_CR3","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.H.: Characterization of network-wide anomalies in traffic flows. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, pp. 201\u2013206 (2004)","DOI":"10.1145\/1028788.1028813"},{"issue":"3","key":"75_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chondola","year":"2009","unstructured":"Chondola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1\u201372 (2009)","journal-title":"ACM Comput. Surv."},{"key":"75_CR5","first-page":"125","volume-title":"Advances in Intelligent and Soft Computing","author":"Aitor Corchero Rodriguez","year":"2010","unstructured":"Rodriguez, A., Mozos, M.: Improving network security through traffic log anomaly detection using time series analysis. In: Computational Intelligence in Security for Information Systems, pp. 125\u2013133 (2010)"},{"key":"75_CR6","doi-asserted-by":"crossref","unstructured":"Liang H., Xiaoming B.: Research of DDoS attack mechanism and its defense frame, computer research and development (ICCRD). In: 3rd International Conference, pp. 440\u2013442 (2011)","DOI":"10.1109\/ICCRD.2011.5763941"},{"key":"75_CR7","unstructured":"Atak i Obrona 2013 Raport, Ataki i metody obrony w internecie w Polsce (2013)"},{"key":"75_CR8","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1111\/j.1467-9892.1980.tb00297.x","volume":"1","author":"CWJ Granger","year":"1980","unstructured":"Granger, C.W.J., Joyeux, R.: An introduction to long-memory time series models andfractional differencing. J. Time Ser. Anal. 1, 15\u201329 (1980)","journal-title":"J. Time Ser. Anal."},{"key":"75_CR9","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1093\/biomet\/68.1.165","volume":"68","author":"J Hosking","year":"1981","unstructured":"Hosking, J.: Fractional differencing. Biometrika 68, 165\u2013176 (1981)","journal-title":"Biometrika"},{"key":"75_CR10","doi-asserted-by":"publisher","first-page":"987","DOI":"10.2307\/1912773","volume":"50","author":"R Engle","year":"1982","unstructured":"Engle, R.: Autoregressive conditional heteroskedasticity with estimates of the variance of UK inflation. Econometrica 50, 987\u20131008 (1982)","journal-title":"Econometrica"},{"key":"75_CR11","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/S0304-4076(95)01749-6","volume":"74","author":"R Baillie","year":"1996","unstructured":"Baillie, R., Bollerslev, T., Mikkelsen, H.: Fractionally integrated generalized autoregressive conditional heteroskedasticity. J. Econom. 74, 3\u201330 (1996)","journal-title":"J. Econom."},{"key":"75_CR12","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1002\/(SICI)1099-131X(199603)15:2<107::AID-FOR612>3.0.CO;2-D","volume":"15","author":"N Crato","year":"1996","unstructured":"Crato, N., Ray, B.K.: Model selection and forecasting for long-range dependent processes. J. Forecast. 15, 107\u2013125 (1996)","journal-title":"J. Forecast."},{"key":"75_CR13","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1111\/j.1368-423X.2004.00139.x","volume":"7","author":"VJ Gabriel","year":"2004","unstructured":"Gabriel, V.J., Martins, L.F.: On the forecasting ability of ARFIMA models when infrequent breaks occur. Econom. J. 7, 455\u2013475 (2004)","journal-title":"Econom. J."},{"issue":"3","key":"75_CR14","doi-asserted-by":"crossref","first-page":"175","DOI":"10.17713\/ajs.v41i3.172","volume":"41","author":"M Tayefi","year":"2012","unstructured":"Tayefi, M., Ramanathan, T.V.: An overview of FIGARCH and related time series models. AUSTRIAN J. Stat. 41(3), 175\u2013196 (2012)","journal-title":"AUSTRIAN J. Stat."},{"key":"75_CR15","volume-title":"Time Series Analysis","author":"G Box","year":"1970","unstructured":"Box, G., Jenkins, G., Reinsel, G.: Time Series Analysis. Holden-day, San Francisco (1970)"},{"key":"75_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/b97391","volume-title":"Introduction to Time Series and Forecasting","author":"P Brockwell","year":"2002","unstructured":"Brockwell, P., Davis, R.: Introduction to Time Series and Forecasting. Springer, Berlin (2002)"},{"key":"75_CR17","volume-title":"Statistics for Long-Memory Processes","author":"JA Beran","year":"1994","unstructured":"Beran, J.A.: Statistics for Long-Memory Processes. Chapman and Hall, New York (1994)"},{"issue":"1","key":"75_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2307\/2347679","volume":"38","author":"J Haslett","year":"1989","unstructured":"Haslett, J.: Raftery AE space-time modelling with long-memory dependence: assessing Ireland\u2019s wind power resource (with discussion). Appl. Stat. 38(1), 1\u201350 (1989)","journal-title":"Appl. Stat."},{"issue":"3","key":"75_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v027.i03","volume":"27","author":"RJ Hyndman","year":"2008","unstructured":"Hyndman, R.J., Khandakar, Y.: Automatic time series forecasting: the forecast Package for R. J. Stat. Softw. 27(3), 1\u201322 (2008)","journal-title":"J. Stat. Softw."},{"key":"75_CR20","unstructured":"SNORT\u2014Intrusion Detection System, \n                    https:\/\/www.snort.org\/"},{"key":"75_CR21","unstructured":"The CAIDA Dataset, \n                    http:\/\/www.caida.org\/data\n                    \n                   (2006\u20132009)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 9th International Conference on Computer Recognition Systems CORES 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26227-7_75","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T17:31:52Z","timestamp":1559410312000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26227-7_75"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319262253","9783319262277"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26227-7_75","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]}}}