{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:51:44Z","timestamp":1725565904892},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642158247"},{"type":"electronic","value":"9783642158254"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15825-4_15","type":"book-chapter","created":{"date-parts":[[2010,9,13]],"date-time":"2010-09-13T05:11:59Z","timestamp":1284354719000},"page":"118-123","source":"Crossref","is-referenced-by-count":5,"title":["Detecting DDoS Attack towards DNS Server Using a Neural Network Classifier"],"prefix":"10.1007","author":[{"given":"Jun","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaodong","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Baoping","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Estan, C., Savage, S., Varghese, G.: Automatically inferring patterns of resource consumption in network traffic. In: Proceedings of the ACM SIGCOMM Conference (2003)","DOI":"10.1145\/863955.863972"},{"key":"15_CR2","unstructured":"Rastegari, S., Saripan, M.I., Rasid, M.F.A.: Detection of Denial of Service Attacks against Domain Name System Using Neural Networks. IJCSI International Journal of Computer Science Issues 6(1) (2009)"},{"key":"15_CR3","unstructured":"Ryan, J., Lin, M., Miikkulainen, R.: Intrusion Detection with Neural Networks. In: AI Approaches to Fraud Detection and Risk Management: Papers from the 1997 AAAI Workshop, Providence, RI, pp. 72-79 (1997)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Cunningham, R., Lippmann, R.: Improving intrusion detection performance using keyword selection and neural networks. In: Proceedings of the International Symposium on Recent Advances in Intrusion Detection, Purdue, IN (1999)","DOI":"10.1016\/S1389-1286(00)00140-7"},{"key":"15_CR5","first-page":"148","volume-title":"NETLAB: Algorithms for Pattern Recognition","author":"I.T. Nabney","year":"2001","unstructured":"Nabney, I.T.: NETLAB: Algorithms for Pattern Recognition, pp. 148\u2013151. Springer, NewYork (2001)"},{"key":"15_CR6","unstructured":"Kolmogorov, A.N.: On the representation of continuous functions of many variables by superpositions of continuous functions of one variable and addition (1957)"},{"issue":"4","key":"15_CR7","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1016\/S0893-6080(05)80056-5","volume":"6","author":"M.F. Moller","year":"1993","unstructured":"Moller, M.F.: A scaled conjugate gradient algorithm for fast supervised learning. Neural Networks\u00a06(4), 520\u2013540 (1993)","journal-title":"Neural Networks"},{"issue":"6","key":"15_CR8","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1037\/h0058700","volume":"61","author":"W.P. Tanner Jr.","year":"1954","unstructured":"Tanner Jr., W.P., Swets, J.A.: A decision-making theory of visual detection. Psychological Review\u00a061(6), 401\u2013409 (1954)","journal-title":"Psychological Review"},{"issue":"11","key":"15_CR9","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/0895-7177(93)90204-C","volume":"18","author":"L. Ingber","year":"1993","unstructured":"Ingber, L.: Simulated Annealing: Practice Versus Theory. J. of Mathematical and Computer Modeling\u00a018(11), 29\u201357 (1993)","journal-title":"J. of Mathematical and Computer Modeling"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks \u2013 ICANN 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15825-4_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:41:15Z","timestamp":1606167675000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15825-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642158247","9783642158254"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15825-4_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}