{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T03:40:08Z","timestamp":1774669208477,"version":"3.50.1"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/access.2017.2688460","type":"journal-article","created":{"date-parts":[[2017,4,6]],"date-time":"2017-04-06T19:21:36Z","timestamp":1491506496000},"page":"1-1","source":"Crossref","is-referenced-by-count":54,"title":["An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3176-3310","authenticated-orcid":false,"given":"Aqeel","family":"Sahi","sequence":"first","affiliation":[]},{"given":"David","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Diykh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"338","article-title":"Estimating continuous distributions in Bayesian classifiers","author":"john","year":"1995","journal-title":"Proc 11th Conf Uncertainty Artif Intell"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018628609742"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2010.12010"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/978-3-319-32699-3_10","author":"al-shaer","year":"2016","journal-title":"Agile Virtual Infrastructure For Cyber Deception Against Stealthy DDoS Attacks in Cyber Deception Building the Scientific Foundation"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.03.022"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2014.07.019"},{"key":"ref37","year":"2016","journal-title":"Quick Sequence Diagram Editor"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.07.006"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/978-3-319-32699-3_8","author":"albanese","year":"2016","journal-title":"Deceiving Attackers by Creating a Virtual Attack Surface in Cyber Deception Building the Scientific Foundation"},{"key":"ref34","year":"2016","journal-title":"Wireshark Analyzer 2 0 0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.4236\/ijcns.2009.27067"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2171057"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"ref2","author":"cashell","year":"2004","journal-title":"The Economic Impact of Cyber Attacks"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32467-8_34"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.147"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.12.011"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2011.122011.110151"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.01.040"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.09.018"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.08.008"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.06.004"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1111\/j.2517-6161.1974.tb00994.x","article-title":"Cross-validatory choice and assessment of statistical predictions","volume":"36","author":"stone","year":"1974","journal-title":"J Roy Statist Soc Series B (Methodol )"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1975.10479865"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2016.09.003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2015.7124683"},{"key":"ref40","author":"duda","year":"1973","journal-title":"Pattern Classification and Scene Analysis"},{"key":"ref12","article-title":"Parallel encryption mode for probabilistic scheme to secure data in the cloud","author":"sahi","year":"2015","journal-title":"Proc 10th Int Conf Inf Technol Appl (ICITA)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.10.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.10.013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.121912.122257"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.877136"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818807"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.56"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2008.60"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2487361"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/computers3010001"},{"key":"ref5","author":"balding","year":"2012","journal-title":"What Everyone Ought to Know About Cloud Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.02.022"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.02.026"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1974.10489157"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2014.2356616"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31979-5_17"},{"key":"ref45","first-page":"1","article-title":"A neural network based system for intrusion detection and classification of attacks","author":"moradi","year":"2004","journal-title":"Proc IEEE Int Conf Adv Intell Syst -Theory Appl"},{"key":"ref48","volume":"422","author":"mclachlan","year":"2005","journal-title":"Analyzing Microarray Gene Expression Data"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/863965.863966"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MASSP.1987.1165576"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-008-9158-4"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1002\/sim.1180"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/81.340848"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/6514899\/07893798.pdf?arnumber=7893798","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,23]],"date-time":"2024-06-23T13:12:17Z","timestamp":1719148337000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7893798\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2688460","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}