{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:00:20Z","timestamp":1742382020335},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540232087"},{"type":"electronic","value":"9783540301448"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30144-8_17","type":"book-chapter","created":{"date-parts":[[2010,9,18]],"date-time":"2010-09-18T20:34:45Z","timestamp":1284842085000},"page":"195-206","source":"Crossref","is-referenced-by-count":11,"title":["Securing DBMS: Characterizing and Detecting Query Floods"],"prefix":"10.1007","author":[{"given":"Elisa","family":"Bertino","sequence":"first","affiliation":[]},{"given":"Teodoro","family":"Leggieri","sequence":"additional","affiliation":[]},{"given":"Evimaria","family":"Terzi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imielinski, T., Swami, A.: Mining association rules between sets of items in large databases. In: SIGMOD (1993)","DOI":"10.1145\/170035.170072"},{"key":"17_CR2","unstructured":"Axelsson, S.: Intrusion detection systems: A survey and taxonomy. In: Technical Report No 99-15, Dept. of Computer Engineering, Chalmers Univeristy of Technology, Sweden (2000)"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Bellman, R.: On the approximation of curves by line segments using dynamic programming. Communications of the ACM\u00a04(6) (1961)","DOI":"10.1145\/366573.366611"},{"key":"17_CR4","volume-title":"Practical Handbook of Internet Computing","author":"E. Bertino","year":"2003","unstructured":"Bertino, E., Ferrari, E.: Information security. In: Singh, M. (ed.) Practical Handbook of Internet Computing, CRC Press, Boca Raton (2003)"},{"issue":"1","key":"17_CR5","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/T-C.1971.223082","volume":"C-20","author":"A. ACantoni","year":"1971","unstructured":"ACantoni, A.: Optimal curve fitting with piecewise linear functions. IEEE Transactions on Computers\u00a0C-20(1), 59\u201367 (1971)","journal-title":"IEEE Transactions on Computers"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Daswani, N., Garcia-Molina, H.: Query-flood attacks in gnutella. Technical Report, Stanford University (2002)","DOI":"10.1145\/586135.586136"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Keogh, E., Chu, S., Hart, D., Pazzani, M.: An online algorithm for segmenting time series. In: ICDM, pp. 289\u2013296 (2001)","DOI":"10.1109\/ICDM.2001.989531"},{"issue":"3","key":"17_CR8","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1145\/322510.322526","volume":"2","author":"T. Lane","year":"1999","unstructured":"Lane, T., Brodley, C.E.: Temporal sequence learning and data reduction for anomaly detection. ACM Trans. Inf. Syst. Secur.\u00a02(3), 295\u2013331 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"4","key":"17_CR9","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/382912.382914","volume":"3","author":"W. Lee","year":"2000","unstructured":"Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur.\u00a03(4), 227\u2013261 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Li, W.: Dna segmentation as a model selection process. In: RECOMB, pp. 204\u2013210 (2001)","DOI":"10.1145\/369133.369202"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Moore, D., Voelker, G., Savage, S.: Inferring internet denial of service activity. In: USENIX Security Symposium (2001)","DOI":"10.21236\/ADA400003"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Schuba, C., Krsul, I., Kuhn, M., Spafford, E., Sundaram, A., Zamboni, D.: Analysis of a denial of service attack on tcp. In: IEEE Symposium on Security and Privacy, pp. 208\u2013223 (1997)","DOI":"10.1109\/SECPRI.1997.601338"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Yu, C., Gligor, V.: A formal specification and verification method for the prevention of denial of service. In: IEEE Symposium on Security and Privacy, pp. 187\u2013202 (1988)","DOI":"10.1109\/SECPRI.1988.8111"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30144-8_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:44:55Z","timestamp":1605743095000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30144-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232087","9783540301448"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30144-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}