{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:01:42Z","timestamp":1764687702322},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319292359"},{"type":"electronic","value":"9783319292366"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-29236-6_7","type":"book-chapter","created":{"date-parts":[[2016,4,16]],"date-time":"2016-04-16T13:03:37Z","timestamp":1460811817000},"page":"62-72","source":"Crossref","is-referenced-by-count":8,"title":["Using the Cumulative Sum Algorithm Against Distributed Denial of Service Attacks in Internet of Things"],"prefix":"10.1007","author":[{"given":"Pheeha","family":"Machaka","sequence":"first","affiliation":[]},{"given":"Andre","family":"McDonald","sequence":"additional","affiliation":[]},{"given":"Fulufhelo","family":"Nelwamondo","sequence":"additional","affiliation":[]},{"given":"Antoine","family":"Bagula","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,17]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Uckelmann, D., Harrison, M., Michahelles, F.: An architectural approach towards the future internet of things. In: Architecting the Internet of Things (2011)","key":"7_CR1","DOI":"10.1007\/978-3-642-19157-2"},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"26","author":"RH Weber","year":"2010","unstructured":"Weber, R.H.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23\u201330 (2010)","journal-title":"Comput. Law Secur. Rev."},{"issue":"5","key":"7_CR3","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.comnet.2003.10.003","volume":"44","author":"C Douligeris","year":"2004","unstructured":"Douligeris, C., Mitrokotsa, A.: DDoS attacks and defense mechanisms: classification and state-of-the-art. Comput. Netw. 44(5), 643\u2013666 (2004)","journal-title":"Comput. Netw."},{"issue":"2","key":"7_CR4","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34(2), 39\u201353 (2004)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"4","key":"7_CR5","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"ST Zargar","year":"2013","unstructured":"Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutorials 15(4), 2046\u20132069 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"},{"unstructured":"Lazarevic, A., Kumar, V., Srivastava, J.: Intrusion detection: a survey. In: Managing Cyber Threats (2005)","key":"7_CR6"},{"key":"7_CR7","doi-asserted-by":"crossref","DOI":"10.1201\/b15088","volume-title":"Network Anomaly Detection A Machine Learning Perspective","author":"DK Bhattacharyya","year":"2013","unstructured":"Bhattacharyya, D.K., Kalita, J.K.: Network Anomaly Detection A Machine Learning Perspective. CRC Press, Boca Raton (2013)"},{"issue":"1","key":"7_CR8","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cose.2009.06.008","volume":"29","author":"CV Zhou","year":"2010","unstructured":"Zhou, C.V., Leckie, C., Karunasekera, S.: A survey of coordinated attacks and collaborative intrusion detection. Comput. Secur. 29(1), 124\u2013140 (2010)","journal-title":"Comput. Secur."},{"issue":"9","key":"7_CR9","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1016\/j.comcom.2005.09.008","volume":"29","author":"VA Siris","year":"2006","unstructured":"Siris, V.A., Papagalou, F.: Application of anomaly detection algorithms for detecting SYN flooding attacks. Comput. Commun. 29(9), 1433\u20131442 (2006)","journal-title":"Comput. Commun."},{"issue":"9","key":"7_CR10","doi-asserted-by":"publisher","first-page":"3372","DOI":"10.1109\/TSP.2006.879308","volume":"54","author":"AG Tartakovsky","year":"2006","unstructured":"Tartakovsky, A.G., Rozovskii, B.L., Blazek, R.B., Kim, H.: A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods. IEEE Trans. Signal Process. 54(9), 3372\u20133382 (2006)","journal-title":"IEEE Trans. Signal Process."},{"issue":"1","key":"7_CR11","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/JSTSP.2012.2233713","volume":"7","author":"AG Tartakovsky","year":"2013","unstructured":"Tartakovsky, A.G., Polunchenko, A.S., Sokolov, G.: Efficient computer network anomaly detection by change point detection methods. IEEE J. Sel. Top. Sign. Process. 7(1), 4\u201311 (2013)","journal-title":"IEEE J. Sel. Top. Sign. Process."},{"key":"7_CR12","volume-title":"Detection of Abrupt Changes: Theory and Application","author":"M Basseville","year":"1993","unstructured":"Basseville, M., Nikiforov, I.V.: Detection of Abrupt Changes: Theory and Application, vol. 104. Prentice Hall, Englewood Cliffs (1993)"},{"key":"7_CR13","volume-title":"Quickest Detection","author":"HV Poor","year":"2009","unstructured":"Poor, H.V., Hadjiliadis, O.: Quickest Detection, vol. 40. Cambridge University Press, New York (2009)"},{"issue":"1","key":"7_CR14","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MIC.2006.5","volume":"10","author":"G Carl","year":"2006","unstructured":"Carl, G., Kesidis, G., Brooks, R.R., Rai, S.: Denial-of-service attack-detection techniques. IEEE Internet Comput. 10(1), 82\u201389 (2006)","journal-title":"IEEE Internet Comput."},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1093\/biomet\/41.1-2.100","volume":"41","author":"E Page","year":"1954","unstructured":"Page, E.: Continuous inspection schemes. Biometrika 41, 100\u2013115 (1954)","journal-title":"Biometrika"},{"unstructured":"Bo, C., Fang, B., Yun, X.: A new approach for early detection of internet worms based on connection degree. In: Proceedings of 2005 International Conference on Machine Learning and Cybernetics (2005)","key":"7_CR16"},{"doi-asserted-by":"crossref","unstructured":"Dainotti, A., Pescap\u00e9, A., Ventre, G.: Wavelet-based detection of DoS attacks. In: Global Telecommunications Conference, GLOBECOM 2006. IEEE (2006)","key":"7_CR17","DOI":"10.1109\/GLOCOM.2006.279"},{"doi-asserted-by":"publisher","unstructured":"Wang, H., Zhang, D., Shin, K.G.: Detecting SYN flooding attacks. In: Proceedings of Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies INFOCOM 2002, IEEE (2002). doi:\n                  10.1109\/INFCOM.2002.1019404","key":"7_CR18","DOI":"10.1109\/INFCOM.2002.1019404"},{"doi-asserted-by":"crossref","unstructured":"Machaka, P., Bagula, A., De Wet, N.: A highly scalable monitoring tool for wi-fi networks. In: 2012 IEEE 1st International Symposium on Wireless Systems (IDAACS-SWS) (2012)","key":"7_CR19","DOI":"10.1109\/IDAACS-SWS.2012.6377643"},{"key":"7_CR20","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16868-5","volume-title":"Scalable Information Systems","author":"P Machaka","year":"2014","unstructured":"Machaka, P., Bagula, A.: An investigation of scalable anomaly detection techniques for a large network of wi-fi hotspots. In: Jung, J.J., Badica, C., Kiss, A. (eds.) INFOSCALE 2014. LNICST, vol. 139. Springer, Heidelberg (2014). doi:\n                  10.1007\/978-3-319-16868-5"},{"key":"7_CR21","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-319-14227-2_5","volume-title":"Context-Aware Systems and Applications","author":"DQ Tran","year":"2014","unstructured":"Tran, D.Q., Nguyen, M.H.: Drought monitoring: a performance investigation of three machine learning techniques. In: Vinh, P.C., Alagar, V., Vassev, E., Khare, A. (eds.) ICCASA 2013. LNICST, vol. 128, pp. 47\u201356. Springer, Heidelberg (2014)"},{"key":"7_CR22","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-642-32711-7_14","volume-title":"Bio-Inspired Models of Networks, Information, and Computing Systems","author":"A Bagula","year":"2012","unstructured":"Bagula, A., Machaka, P., Mabande, T.: Monitoring of a large Wi-Fi hotspots network: performance investigation of soft computing techniques. In: Hart, E., Timmis, J., Mitchell, P., Nakamo, T., Dabiri, F. (eds.) BIONETICS 2011. LNICST, vol. 103, pp. 155\u2013162. Springer, Heidelberg (2012)"},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/978-3-642-21560-5_41","volume-title":"Wired\/Wireless Internet Communications","author":"A Bagula","year":"2011","unstructured":"Bagula, A., Machaka, P.: Preemptive performance monitoring of a large network of Wi-Fi Hotspots: an artificial immune system. In: Masip-Bruin, X., Verchere, D., Tsaoussidis, V., Yannuzzi, M. (eds.) WWIC 2011. LNCS, vol. 6649, pp. 494\u2013504. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Context-Aware Systems and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-29236-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T00:33:32Z","timestamp":1559435612000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-29236-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319292359","9783319292366"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-29236-6_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2016]]}}}