{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T05:46:36Z","timestamp":1740894396152,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540238980"},{"type":"electronic","value":"9783540304838"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30483-8_22","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T22:47:02Z","timestamp":1294440422000},"page":"173-181","source":"Crossref","is-referenced-by-count":3,"title":["A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform"],"prefix":"10.1007","author":[{"given":"Xinyu","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Yaar, A., Perrig, A., Song, D.: Pi: a path identification mechanism to defend against DDoS attacks. In: Proceedings of the 2003 Symposium on Security and Privacy, May 11-14, pp. 93\u2013107 (2003)","DOI":"10.1109\/SECPRI.2003.1199330"},{"key":"22_CR2","unstructured":"http:\/\/www.netscan.org\/Guiding_Against_DDoS"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Yaar, A., Perrig, A., Song, D.: Pi: a path identification mechanism to defend against DDoS attacks. In: Proceedings of the 2003 Symposium on Security and Privacy, May 11-14, pp. 93\u2013107 (2003)","DOI":"10.1109\/SECPRI.2003.1199330"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Feinstein, L., Schnackenberg, D., Balupari, R., Kindred, D.: Statistical approaches to ddos attack detection and response. In: Proceedings of the DARPA Information Survivability Conference and Exposition, April 22-24, 2003. Scalable DDoS Protection Using Route-Based Filtering, vol.\u00a01, pp. 303\u2013314 (2003)","DOI":"10.1109\/DISCEX.2003.1194894"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Park, K.: Scalable DDoS protection using route-based filtering. In: Proceedings of the DARPA Information Survivability Conference and Exposition, April 22-24, vol.\u00a02, p. 97 (2003)","DOI":"10.1109\/DISCEX.2003.1194933"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Yoohwan, K., Ju-Yeon, J., Chao, H.J., Merat, F.: High-speed router filter for blocking TCP flooding under DDoS attack. In: Proceedings of the 2003 IEEE International Conference on Performance, Computing, and Communications, April 9-11, pp. 183\u2013190 (2003)","DOI":"10.1109\/PCCC.2003.1203698"},{"key":"22_CR7","unstructured":"CERT Coordination Center. Internet Denial of Service Attacks and the Federal Response (February 2000), http:\/\/www.cert.org\/congressional_testimony\/Fithen_testimony_Feb29.html"},{"key":"22_CR8","volume-title":"Wavelet transform and edge detection, Stochastics processes in physics and engineering, Hazeaingke Meds.","author":"A. Grossmann","year":"1986","unstructured":"Grossmann, A.: Wavelet transform and edge detection, Stochastics processes in physics and engineering, Hazeaingke Meds. Dorecht, Reidel (1986)"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Mallat, S., Hwang, W.L.: Singularity Detection and Processing with Wavelets. IEEE Transactions on Information Theory\u00a038(2) (March 1992)","DOI":"10.1109\/18.119727"},{"issue":"4","key":"22_CR10","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1109\/18.86995","volume":"37","author":"S. Mallat","year":"1997","unstructured":"Mallat, S.: Zero-crossing of wavelet transform. IEEE Trans. on Information Theory\u00a037(4), 1019\u20131033 (1997)","journal-title":"IEEE Trans. on Information Theory"},{"issue":"u","key":"22_CR11","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/34.142909","volume":"14","author":"S. Mallat","year":"1992","unstructured":"Mallat, S., Zhong, S.F.: Characterization of signals from multiscale edges. IEEE Trans. on Pattern Analysis and Machine Intelligence\u00a014(u), 710\u2013732 (1992)","journal-title":"IEEE Trans. on Pattern Analysis and Machine Intelligence"},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1109\/34.192463","volume":"11","author":"S. Mallat","year":"1989","unstructured":"Mallat, S., refs. Within: A Theory for Multiresolution Signal Decomposition: the Wavelet Representation. IEEE Trans. on Pattern Anal. and Mach. Intell.\u00a011, 674\u2013693 (1989)","journal-title":"IEEE Trans. on Pattern Anal. and Mach. Intell."},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Garcia, R.C., Sadiku, M.N.O., Cannady, J.D.: WAID: wavelet analysis intrusion detection, Circuits and Systems. In: The 2002 45th Midwest Symposium on MWSCAS 2002, August 4-7, vol.\u00a03, pp. III-688 - III-691 (2002)","DOI":"10.1109\/MWSCAS.2002.1187133"},{"issue":"4","key":"22_CR14","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1109\/3468.935051","volume":"31","author":"D.A. Nash","year":"2001","unstructured":"Nash, D.A., Ragsdale, D.J.: Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systems. IEEE Transactions on Systems, Man and Cybernetics, Part A\u00a031(4), 327\u2013331 (2001)","journal-title":"IEEE Transactions on Systems, Man and Cybernetics, Part A"},{"key":"22_CR15","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1137\/0515056","volume":"15","author":"A. Grossmann","year":"1984","unstructured":"Grossmann, A., Morlet, J.: Decomposition of Hardy functions into square integrable wavelets of constant shape. SIAM J. Math.\u00a015, 723\u2013736 (1984)","journal-title":"SIAM J. Math."},{"key":"22_CR16","volume-title":"Digital Signal Processing","author":"A.V. Oppenheim","year":"1975","unstructured":"Oppenheim, A.V., Sehafer, R.W.: Digital Signal Processing. Prentice-Hall, Englewood Cliffs (1975)"}],"container-title":["Lecture Notes in Computer Science","Content Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30483-8_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T14:43:21Z","timestamp":1740840201000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30483-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540238980","9783540304838"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30483-8_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}