{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T19:19:54Z","timestamp":1768677594113,"version":"3.49.0"},"reference-count":38,"publisher":"Oxford University Press (OUP)","issue":"7","license":[{"start":{"date-parts":[[2018,3,24]],"date-time":"2018-03-24T00:00:00Z","timestamp":1521849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61762033"],"award-info":[{"award-number":["61762033"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61363071"],"award-info":[{"award-number":["61363071"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702539"],"award-info":[{"award-number":["61702539"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Natural Science Foundation of Hainan","award":["617048"],"award-info":[{"award-number":["617048"]}]},{"name":"National Natural Science Foundation of Hainan","award":["2018CXTD003"],"award-info":[{"award-number":["2018CXTD003"]}]},{"name":"Hainan University Doctor Start Fund Project","award":["kyqd1328"],"award-info":[{"award-number":["kyqd1328"]}]},{"name":"Hainan University Youth Fund Project","award":["qnjj1444"],"award-info":[{"award-number":["qnjj1444"]}]},{"name":"National innovation and entrepreneurship training program for College Students","award":["201610589022"],"award-info":[{"award-number":["201610589022"]}]},{"name":"National innovation and entrepreneurship training program for College Students","award":["201610589002"],"award-info":[{"award-number":["201610589002"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7,1]]},"DOI":"10.1093\/comjnl\/bxy025","type":"journal-article","created":{"date-parts":[[2018,3,17]],"date-time":"2018-03-17T20:08:23Z","timestamp":1521317303000},"page":"959-970","source":"Crossref","is-referenced-by-count":19,"title":["A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence"],"prefix":"10.1093","volume":"61","author":[{"given":"Jieren","family":"Cheng","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Hainan University, Haikou, China"},{"name":"State Key Laboratory of Marine Resource Utilization in South China Sea, Haikou, China"}]},{"given":"Jinghe","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Hainan University, Haikou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2922-3518","authenticated-orcid":false,"given":"Qiang","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha, China"}]},{"given":"Xiangyan","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Hainan University, Haikou, China"}]},{"given":"Yanxiang","family":"Guo","sequence":"additional","affiliation":[{"name":"Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen China"},{"name":"Chinese University of Hong Kong, Hong Kong, China"}]}],"member":"286","published-online":{"date-parts":[[2018,3,24]]},"reference":[{"key":"key\n\t\t\t\t20180702082806_bxy025C1","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.ins.2017.08.063","article-title":"Social network security: issues, challenges, threats, and solutions","volume":"421","author":"Rathore","year":"2017","journal-title":"Inf. Sci."},{"key":"key\n\t\t\t\t20180702082806_bxy025C2","doi-asserted-by":"crossref","first-page":"5978636","DOI":"10.1155\/2018\/5978636","article-title":"Security and privacy in the medical Internet of things","volume":"2018","author":"Sun","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"key\n\t\t\t\t20180702082806_bxy025C3","first-page":"1","article-title":"A cooperative quality-aware service access system for social Internet of vehicles","volume":"PP","author":"Ning","year":"2017","journal-title":"IEEE IoT J."},{"key":"key\n\t\t\t\t20180702082806_bxy025C4","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MCOM.2017.1600263","article-title":"Vehicular social networks: enabling smart mobility","volume":"55","author":"Ning","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"key\n\t\t\t\t20180702082806_bxy025C5","first-page":"1","article-title":"Energy-latency trade-off for energy-aware offloading in mobile edge computing networks","volume":"PP","author":"Zhang","year":"2017","journal-title":"IEEE IoT J."},{"key":"key\n\t\t\t\t20180702082806_bxy025C6","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1109\/TC.2011.255","article-title":"A distributed TCAM coprocessor architecture for integrated longest prefix matching, policy filtering, and content filtering","volume":"62","author":"Cai","year":"2013","journal-title":"IEEE Trans. Comput."},{"key":"key\n\t\t\t\t20180702082806_bxy025C7","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1080\/02564602.2016.1192964","article-title":"ICMPv6-based DoS and DDoSs and defense mechanisms: review","volume":"34","author":"Elejla","year":"2016","journal-title":"IETE Tech. Rev."},{"key":"key\n\t\t\t\t20180702082806_bxy025C8","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","article-title":"A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks","volume":"15","author":"Zargar","year":"2013","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"key\n\t\t\t\t20180702082806_bxy025C9","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.cose.2009.06.008","article-title":"A survey of coordinated attacks and collaborative intrusion detection","volume":"29","author":"Zhou","year":"2010","journal-title":"Comput. Secur."},{"key":"key\n\t\t\t\t20180702082806_bxy025C10","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.eswa.2017.05.054","article-title":"A privacy self-assessment framework for online social networks","volume":"86","author":"Pensa","year":"2017","journal-title":"Expert Syst. Appl."},{"key":"key\n\t\t\t\t20180702082806_bxy025C11","first-page":"1","article-title":"A novel subgraph K+-isomorphism method in social network based on graph similarity detection","volume":"21","author":"Rong","year":"2017","journal-title":"Soft Comput."},{"key":"key\n\t\t\t\t20180702082806_bxy025C12","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1016\/j.neucom.2016.05.020","article-title":"LED: a fast overlapping communities detection algorithm based on structural clustering","volume":"207","author":"Ma","year":"2016","journal-title":"Neurocomputing"},{"key":"key\n\t\t\t\t20180702082806_bxy025C13","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1007\/s11235-017-0299-y","article-title":"ESSPR: an efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network","volume":"66","author":"Ferrag","year":"2017","journal-title":"Telecommun. Syst."},{"key":"key\n\t\t\t\t20180702082806_bxy025C14","doi-asserted-by":"crossref","first-page":"2402","DOI":"10.1109\/TIFS.2017.2705620","article-title":"An efficient public auditing protocol with novel dynamic structure for cloud data","volume":"12","author":"Shen","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"key\n\t\t\t\t20180702082806_bxy025C15","doi-asserted-by":"crossref","first-page":"956","DOI":"10.1016\/j.future.2016.11.033","article-title":"A lightweight multi-layer authentication protocol for wireless body area networks","volume":"78","author":"Shen","year":"2016","journal-title":"Future Generation Comput. Syst."},{"key":"key\n\t\t\t\t20180702082806_bxy025C16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2017\/4184196","article-title":"Network intrusion detection through stacking dilated convolutional autoencoders","volume":"2017","author":"Yu","year":"2017","journal-title":"Secur. Commun. Netw."},{"key":"key\n\t\t\t\t20180702082806_bxy025C17","doi-asserted-by":"crossref","first-page":"1241","DOI":"10.1109\/TNNLS.2016.2527796","article-title":"A robust regularization path algorithm for \u03bd-support vector classification","volume":"28","author":"Gu","year":"2017","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"key\n\t\t\t\t20180702082806_bxy025C18","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1109\/TNNLS.2016.2544779","article-title":"Structural","volume":"28","author":"Gu","year":"2017","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"key\n\t\t\t\t20180702082806_bxy025C19","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","article-title":"Incremental support vector learning for ordinal regression","volume":"26","author":"Gu","year":"2017","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"key\n\t\t\t\t20180702082806_bxy025C20","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1109\/TIFS.2017.2758754","article-title":"Skyshield: a sketch-based defense system against application layer ddos attacks","volume":"13","author":"Wang","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"key\n\t\t\t\t20180702082806_bxy025C21","doi-asserted-by":"crossref","first-page":"3417","DOI":"10.1016\/j.comnet.2012.07.003","article-title":"Flow level detection and filtering of low-rate ddos","volume":"56","author":"Zhang","year":"2012","journal-title":"Comput. Netw."},{"key":"key\n\t\t\t\t20180702082806_bxy025C22","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.procs.2015.04.007","article-title":"DDoS detection using fast entropy approach on flow-based network traffic","volume":"50","author":"David","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"key\n\t\t\t\t20180702082806_bxy025C23","first-page":"128","article-title":"Detecting DDoS with hurst parameter of marginal spectrum","volume":"34","author":"Zheng","year":"2011","journal-title":"J. Beijing Univ. Posts Telecomm."},{"key":"key\n\t\t\t\t20180702082806_bxy025C24","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1016\/j.camwa.2011.08.020","article-title":"Detection of DDoSs using optimized traffic matrix","volume":"63","author":"Sang","year":"2012","journal-title":"Comput. Math. Appl."},{"key":"key\n\t\t\t\t20180702082806_bxy025C25","author":"Karnwal","year":"2012"},{"key":"key\n\t\t\t\t20180702082806_bxy025C26","first-page":"3739","article-title":"Data mining techniques in DoS\/DDoS detection: a literature review","volume":"18","author":"Tama","year":"2015","journal-title":"Spec. Sect. Inf. Commun. Syst. Secur."},{"key":"key\n\t\t\t\t20180702082806_bxy025C27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2015\/260594","article-title":"EVFDT: an enhanced very fast decision tree algorithm for detecting distributed denial of service attack in cloud-assisted wireless body area network","volume":"2015","author":"Latif","year":"2015","journal-title":"Mobile Inf. Syst."},{"key":"key\n\t\t\t\t20180702082806_bxy025C28","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.engappai.2010.09.007","article-title":"A review on time series data mining","volume":"24","author":"Fu","year":"2011","journal-title":"Eng. Appl. Artif. Intell."},{"key":"key\n\t\t\t\t20180702082806_bxy025C29","doi-asserted-by":"crossref","first-page":"606","DOI":"10.1007\/s10618-016-0483-9","article-title":"The great time series classification bake off: a review and experimental evaluation of recent algorithmic advances","volume":"31","author":"Bagnall","year":"2017","journal-title":"Data Min. Knowl. Discov."},{"key":"key\n\t\t\t\t20180702082806_bxy025C30","doi-asserted-by":"crossref","first-page":"700","DOI":"10.1109\/LCOMM.2016.2517622","article-title":"A novel DoS and DDoSs detection algorithm using ARIMA time series model and chaotic system in computer networks","volume":"20","author":"Nezhad","year":"2016","journal-title":"IEEE Commun. Lett."},{"key":"key\n\t\t\t\t20180702082806_bxy025C31","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1515\/ipc-2015-0027","article-title":"A DDoSs detection based on conditional heteroscedastic time series models","volume":"20","author":"Andrysiak","year":"2015","journal-title":"Image Process. Commun."},{"key":"key\n\t\t\t\t20180702082806_bxy025C32","author":"MIT Lincoln Laboratory","year":"2000"},{"key":"key\n\t\t\t\t20180702082806_bxy025C33","author":"The Cooperative Association for Internet Data Analysis","year":"2007"},{"key":"key\n\t\t\t\t20180702082806_bxy025C34","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/TNET.2008.925628","article-title":"Monitoring the application-layer DDoSs for popular websites","volume":"17","author":"Xie","year":"2009","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"key\n\t\t\t\t20180702082806_bxy025C35","first-page":"1","article-title":"Utilizing the enhanced risk assessment equation to determine the apparent risk due to user datagram protocol (UDP) flooding attack","volume":"9","author":"Rosli","year":"2017","journal-title":"Int. J. Mobile Comput. Multimed. Commun."},{"key":"key\n\t\t\t\t20180702082806_bxy025C36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17485\/ijst\/2016\/v9i17\/76802","article-title":"Identifying and blocking high and low rate DDOS ICMP flooding","volume":"8","author":"Kumar","year":"2015","journal-title":"Indian J. Sci. Technol."},{"key":"key\n\t\t\t\t20180702082806_bxy025C37","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1109\/TNNLS.2016.2544779","article-title":"Structural minimax probability machine","volume":"28","author":"Gu","year":"2017","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"key\n\t\t\t\t20180702082806_bxy025C38","author":"Lin","year":"2016"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/7\/959\/25113799\/bxy025.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,29]],"date-time":"2020-10-29T12:16:01Z","timestamp":1603973761000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/7\/959\/4953373"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,24]]},"references-count":38,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2018,3,24]]},"published-print":{"date-parts":[[2018,7,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy025","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,7]]},"published":{"date-parts":[[2018,3,24]]}}}