{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:08:49Z","timestamp":1743116929975,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662474006"},{"type":"electronic","value":"9783662474013"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-47401-3_26","type":"book-chapter","created":{"date-parts":[[2015,6,19]],"date-time":"2015-06-19T08:27:04Z","timestamp":1434702424000},"page":"197-205","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DDoS Detection Based on Second-Order Features and Machine Learning"],"prefix":"10.1007","author":[{"given":"Xiaowei","family":"He","sequence":"first","affiliation":[]},{"given":"Shuyuan","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Yunxue","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Huiqiang","family":"Chi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,20]]},"reference":[{"key":"26_CR1","first-page":"222","volume":"13","author":"DS Yeung","year":"2007","unstructured":"Yeung, D.S., Jin, S.: Covariance matrix modeling and detecting various flooding attacks. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 13, 222\u2013232 (2007)","journal-title":"IEEE Trans. Syst. Man Cybern. Part A Syst. Hum."},{"key":"26_CR2","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"DE Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13, 222\u2013232 (1987)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1\u20132","key":"26_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garc\u00eda-Teodoro","year":"2009","unstructured":"Garc\u00eda-Teodoro, P., D\u00edaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1\u20132), 18\u201328 (2009). ISSN: 0167-4048","journal-title":"Comput. Secur."},{"issue":"2","key":"26_CR4","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1016\/j.amc.2008.05.028","volume":"205","author":"X Tan","year":"2008","unstructured":"Tan, X., Xi, H.: Hidden semi-markov model for anomaly detection. Appl. Math. Comput. 205(2), 562\u2013567 (2008). ISSN: 0096-3003","journal-title":"Appl. Math. Comput."},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Vijayasarathy, R., Raghavan, S.V., Ravindran, B.: A system approach to network modeling for DDoS detection using a Na\u00efve Bayesian classifier. In: 2011 Third International Conference on Communication Systems and Networks (COMSNETS), pp. 1\u201310, 4\u20138 January 2011","DOI":"10.1109\/COMSNETS.2011.5716474"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Reif, M., Goldstein, M., Stahl, A., Breuel, T.M.: Anomaly detection by combining decision trees and parametric densities. In: 2008 19th International Conference on Pattern Recognition, ICPR 2008, pp. 1\u20134, 8\u201311 December 2008","DOI":"10.1109\/ICPR.2008.4761796"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Ndong, J., Salamatian, K.: A robust anomaly detection technique using combined statistical methods. In: Proceedings of the 2011 Ninth Annual Communication Networks and Services Research Conference (CNSR 2011). IEEE Computer Society, Washington, pp. 101\u2013108","DOI":"10.1109\/CNSR.2011.23"},{"issue":"4","key":"26_CR8","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.cose.2004.09.008","volume":"24","author":"S Chebrolu","year":"2005","unstructured":"Chebrolu, S., Abraham, A., Thomas, J.P.: Feature deduction and ensemble design of intrusion detection systems. Comput. Secur. 24(4), 295\u2013307 (2005)","journal-title":"Comput. Secur."}],"container-title":["Communications in Computer and Information Science","Trustworthy Computing and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-47401-3_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T03:51:02Z","timestamp":1676951462000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-47401-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662474006","9783662474013"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-47401-3_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"20 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}