{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T16:26:05Z","timestamp":1747153565827,"version":"3.40.5"},"publisher-location":"Singapore","reference-count":7,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819724208"},{"type":"electronic","value":"9789819724215"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-2421-5_33","type":"book-chapter","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:01:48Z","timestamp":1715414508000},"page":"489-495","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CY-Apollo: A Multi-view Profile System for\u00a0Complicated Network Attacks"],"prefix":"10.1007","author":[{"given":"Zhaoquan","family":"Gu","sequence":"first","affiliation":[]},{"given":"Haiyan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiayu","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5709-690X","authenticated-orcid":false,"given":"Wenying","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Jianxin","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,12]]},"reference":[{"key":"33_CR1","doi-asserted-by":"publisher","unstructured":"Rivers, A.T., Vouk, M.A., Williams, L.A.: On coverage-based attack profiles. In: 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion, San Francisco, CA, USA, pp. 5\u20136 (2014). https:\/\/doi.org\/10.1109\/SERE-C.2014.15.","DOI":"10.1109\/SERE-C.2014.15."},{"key":"33_CR2","doi-asserted-by":"publisher","unstructured":"Maghrebi, H.: Assessment of common side channel countermeasures with respect to deep learning based profiled attacks. In: 2019 31st International Conference on Microelectronics (ICM), Cairo, Egypt, pp. 126\u2013129 (2019). https:\/\/doi.org\/10.1109\/ICM48031.2019.9021728.","DOI":"10.1109\/ICM48031.2019.9021728."},{"issue":"9","key":"33_CR3","doi-asserted-by":"publisher","first-page":"1778","DOI":"10.1109\/TCAD.2019.2926389","volume":"39","author":"A Barenghi","year":"2020","unstructured":"Barenghi, A., Fornaciari, W., Pelosi, G., Zoni, D.: Scramble suit: a profile differentiation countermeasure to prevent template attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(9), 1778\u20131791 (2020). https:\/\/doi.org\/10.1109\/TCAD.2019.2926389","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"33_CR4","doi-asserted-by":"publisher","unstructured":"Alotaibi, F., Lisitsa, A.: Matrix profile for DDoS attacks detection. In: 2021 16th Conference on Computer Science and Intelligence Systems (FedCSIS), Sofia, Bulgaria, pp. 357\u2013361 (2021). https:\/\/doi.org\/10.15439\/2021F114.","DOI":"10.15439\/2021F114."},{"key":"33_CR5","doi-asserted-by":"publisher","unstructured":"Li, P., Feng, Y., Kawamoto, J., Sakurai, K.: A proposal for cyber-attack trace-back using packet marking and logging. In: 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Fukuoka, Japan, pp. 603\u2013607 (2016). https:\/\/doi.org\/10.1109\/IMIS.2016.89","DOI":"10.1109\/IMIS.2016.89"},{"key":"33_CR6","doi-asserted-by":"publisher","unstructured":"Ling, Y., Yang, C., Li, X., Xie, M., Ming, S.: WEB attack source tracing technology based on genetic algorithm. In: 2022 7th International Conference on Cyber Security and Information Engineering (ICCSIE), Brisbane, Australia, pp. 123\u2013126 (2022). https:\/\/doi.org\/10.1109\/ICCSIE56462.2022.00032","DOI":"10.1109\/ICCSIE56462.2022.00032"},{"key":"33_CR7","doi-asserted-by":"publisher","unstructured":"Li, Y., Liu, S., Yan, Z., Deng, R.H.: Secure 5G positioning with truth discovery, attack detection, and tracing. IEEE Internet Things J. 9(22), 22220\u201322229 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3088852","DOI":"10.1109\/JIOT.2021.3088852"}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-2421-5_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:08:27Z","timestamp":1715414907000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-2421-5_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819724208","9789819724215"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-2421-5_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APWeb-WAIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apwebwaim2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.apweb-waim2023.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}