{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T21:08:34Z","timestamp":1778533714435,"version":"3.51.4"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T00:00:00Z","timestamp":1464825600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004595","name":"Universiti Sains Malaysia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s00521-016-2358-9","type":"journal-article","created":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T01:57:42Z","timestamp":1464832662000},"page":"525-538","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["NADTW: new approach for detecting TCP worm"],"prefix":"10.1007","volume":"28","author":[{"given":"Mohammed","family":"Anbar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rosni","family":"Abdullah","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alhamza","family":"Munther","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohammed Azmi","family":"Al-Betar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Redhwan M. A.","family":"Saad","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,6,2]]},"reference":[{"key":"2358_CR1","doi-asserted-by":"crossref","unstructured":"Xu W, Zhang F, Zhu S (2010) Toward worm detection in online social networks. In: Proceedings of the 26th annual computer security applications conference, ACM, pp 11\u201320","DOI":"10.1145\/1920261.1920264"},{"issue":"1","key":"2358_CR2","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/COMST.2008.4483668","volume":"10","author":"P Li","year":"2008","unstructured":"Li P, Salour M, Su X (2008) A survey of internet worm detection and containment. IEEE Commun Surv Tutor 10(1):20\u201335","journal-title":"IEEE Commun Surv Tutor"},{"issue":"3","key":"2358_CR3","doi-asserted-by":"crossref","first-page":"129","DOI":"10.14257\/ijunesst.2014.7.3.12","volume":"7","author":"S Paul","year":"2014","unstructured":"Paul S, Mishra BK (2014) Survey of polymorphic worm signatures. Int J U E Service Sci Technol 7(3):129\u2013150","journal-title":"Int J U E Service Sci Technol"},{"key":"2358_CR4","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/j.jnca.2013.09.014","volume":"40","author":"D Jiang","year":"2014","unstructured":"Jiang D, Xu Z, Zhang P, Zhu T (2014) A transform domain-based anomaly detection approach to network-wide traffic. J Netw Comput Appl 40:292\u2013306","journal-title":"J Netw Comput Appl"},{"issue":"3","key":"2358_CR5","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1002\/ett.2619","volume":"26","author":"D Jiang","year":"2015","unstructured":"Jiang D, Yao C, Xu Z, Qin W (2015) Multi-scale anomaly detection for high-speed network traffic. Trans Emerg Telecommun Technol 26(3):308\u2013317","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"2","key":"2358_CR6","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1109\/SURV.2013.100913.00195","volume":"16","author":"Y Wang","year":"2014","unstructured":"Wang Y, Wen S, Xiang Y, Zhou W (2014) Modeling the propagation of worms in networks: a survey. IEEE Commun Surv Tutor 16(2):942\u2013960","journal-title":"IEEE Commun Surv Tutor"},{"issue":"2","key":"2358_CR7","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1504\/IJIPT.2014.066379","volume":"8","author":"W Yang","year":"2014","unstructured":"Yang W, Gao Y-P, Zhu Z-L, Chang G-R, Yao Y (2014) Modelling, analysis and containment of passive worms in p2p networks. Int J Internet Protoc Technol 8(2):130\u2013142","journal-title":"Int J Internet Protoc Technol"},{"issue":"4","key":"2358_CR8","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MSECP.2003.1219056","volume":"1","author":"D Moore","year":"2003","unstructured":"Moore D, Paxson V, Savage S, Shannon C, Staniford S, Weaver N (2003) Inside the slammer worm. IEEE Secur Priv 1(4):33\u201339","journal-title":"IEEE Secur Priv"},{"key":"2358_CR9","doi-asserted-by":"crossref","unstructured":"Collins MP, Reiter MK (2007) Hit-list worm detection and bot identification in large networks using protocol graphs. In: Proceedings of the 10th international conference on recent advances in intrusion detection, RAID\u201907, Springer, Berlin, pp 276\u2013295. \n                        http:\/\/dl.acm.org\/citation.cfm?id=1776434.1776456","DOI":"10.1007\/978-3-540-74320-0_15"},{"key":"2358_CR10","doi-asserted-by":"crossref","unstructured":"Jung J, Milito RA, Paxson V (2007) On the adaptive real-time detection of fast-propagating network worms. In: Detection of intrusions and malware, and vulnerability assessment, Springer, Berlin, pp 175\u2013192","DOI":"10.1007\/978-3-540-73614-1_11"},{"key":"2358_CR11","doi-asserted-by":"crossref","unstructured":"Schechter SE, Jung J, Berger AW (2004) Fast detection of scanning worm infections. In: Recent advances in intrusion detection. Springer, Berlin, pp 59\u201381","DOI":"10.1007\/978-3-540-30143-1_4"},{"key":"2358_CR12","unstructured":"Sekar V, Xie Y, Reiter M, Zhang H (2006) A multi-resolution approach for worm detection and containment. In: International conference on Dependable systems and networks, DSN 2006, pp 189\u2013198"},{"key":"2358_CR13","unstructured":"Gu G, Sharif M, Qin X, Dagon D, Lee W, Riley G (2004) Worm detection, early warning and response based on local victim information. In: Computer security applications conference, 2004. 20th Annual, IEEE, pp 136\u2013145"},{"issue":"15","key":"2358_CR14","doi-asserted-by":"crossref","first-page":"1952","DOI":"10.1080\/00207160.2012.696621","volume":"89","author":"M Anbar","year":"2012","unstructured":"Anbar M, Manasrah A, Manickam S (2012) Statistical cross-relation approach for detecting tcp and udp random and sequential network scanning (scans). Int J Comput Math 89(15):1952\u20131969","journal-title":"Int J Comput Math"},{"key":"2358_CR15","unstructured":"Riley GF (2003) Simulation of large scale networks II: large-scale network simulations with gtnets. In: Proceedings of the 35th conference on winter simulation: driving innovation, Winter Simulation Conference, pp 676\u2013684"},{"key":"2358_CR16","doi-asserted-by":"crossref","unstructured":"Stafford S, Li J (2010) Behavior-based worm detectors compared. In: Recent advances in intrusion detection. Springer, Berlin, pp 38\u201357","DOI":"10.1007\/978-3-642-15512-3_3"},{"issue":"7","key":"2358_CR17","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1016\/0167-4048(92)90144-G","volume":"11","author":"F Cohen","year":"1992","unstructured":"Cohen F (1992) A formal definition of computer worms and some related results. Comput Secur 11(7):641\u2013652","journal-title":"Comput Secur"},{"key":"2358_CR18","doi-asserted-by":"crossref","unstructured":"Berk V, Bakos G, Morris R (2003) Designing a framework for active worm detection on global networks. In: Information assurance, IWIAS 2003. Proceedings First IEEE international workshop on IEEE, pp 13\u201323","DOI":"10.1109\/IWIAS.2003.1192455"},{"key":"2358_CR19","doi-asserted-by":"crossref","unstructured":"Jung J, Paxson V, Berger AW, Balakrishnan H (2004) Fast portscan detection using sequential hypothesis testing. In: Security and privacy, 2004. Proceedings 2004 IEEE Symposium on IEEE, pp 211\u2013225","DOI":"10.1109\/SECPRI.2004.1301325"},{"key":"2358_CR20","doi-asserted-by":"crossref","unstructured":"Zou CC, Gong W, Towsley D (2002) Code red worm propagation modeling and analysis. In: Proceedings of the 9th ACM conference on computer and communications security, ACM, pp 138\u2013147","DOI":"10.1145\/586110.586130"},{"key":"2358_CR21","doi-asserted-by":"crossref","unstructured":"Chen Z, Gao L, Kwiaty K (2003) Modeling the spread of active worms. In: INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications. IEEE Societies, vol 3, IEEE, pp 1890\u20131900","DOI":"10.1109\/INFCOM.2003.1209211"},{"key":"2358_CR22","first-page":"027","volume":"3","author":"K Yiquan","year":"2012","unstructured":"Yiquan K (2012) Network worm simulated experimental design and implementation based on gtnets. Comput Digit Eng 3:027","journal-title":"Comput Digit Eng"},{"key":"2358_CR23","first-page":"004","volume":"6","author":"J Jiao","year":"2012","unstructured":"Jiao J, Chen X (2012) Wssl: A worm spreading simulation language. J Beijing Inform Sci Technol Uni 6:004","journal-title":"J Beijing Inform Sci Technol Uni"},{"key":"2358_CR24","first-page":"022","volume":"4","author":"H Zheng","year":"2010","unstructured":"Zheng H, Li-Fa W (2010) Worm detection system based on positive selection. J Softw 4:022","journal-title":"J Softw"},{"issue":"11","key":"2358_CR25","first-page":"15","volume":"8","author":"A Osareh","year":"2008","unstructured":"Osareh A, Shadgar B (2008) Intrusion detection in computer networks based on machine learning algorithms. Int J Comput Sci Netw Secur (IJCSNS) 8(11):15\u201323","journal-title":"Int J Comput Sci Netw Secur (IJCSNS)"},{"issue":"1","key":"2358_CR26","doi-asserted-by":"crossref","first-page":"255","DOI":"10.2307\/2532051","volume":"45","author":"I Lawrence","year":"1989","unstructured":"Lawrence I, Lin K (1989) A concordance correlation coefficient to evaluate reproducibility. Biometrics 45(1):255\u2013268","journal-title":"Biometrics"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-016-2358-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-016-2358-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-016-2358-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-016-2358-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,22]],"date-time":"2017-11-22T07:56:07Z","timestamp":1511337367000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-016-2358-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,2]]},"references-count":26,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["2358"],"URL":"https:\/\/doi.org\/10.1007\/s00521-016-2358-9","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,2]]}}}