{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T12:49:12Z","timestamp":1770986952431,"version":"3.50.1"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["02190022117021"],"award-info":[{"award-number":["02190022117021"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2873291","type":"journal-article","created":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T18:56:23Z","timestamp":1539284183000},"page":"64801-64816","source":"Crossref","is-referenced-by-count":14,"title":["Using Intuitionistic Fuzzy Set for Anomaly Detection of Network Traffic From Flow Interaction"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5196-178X","authenticated-orcid":false,"given":"Jinfa","family":"Wang","sequence":"first","affiliation":[]},{"given":"Hai","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jiuqiang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Hequn","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hongsong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Shuai","family":"Chao","sequence":"additional","affiliation":[]},{"given":"Chunyang","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"8","article-title":"Neighborhood formation and anomaly detection in bipartite graphs","author":"sun","year":"2005","journal-title":"Proc 15th IEEE Int Conf Data Mining"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.37"},{"key":"ref33","first-page":"2158","article-title":"Internet traffic classification based on hosts behavior analysis","volume":"36","author":"ye","year":"2014","journal-title":"J Electron Inf Technol"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IIAI-AAI.2013.78"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICBNMT.2013.6823923"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-013-0282-8"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.95"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2007.91"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.167"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/34.790431"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2066970"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029214"},{"key":"ref29","first-page":"341","article-title":"Using graph to detect network traffic anomaly","author":"zhou","year":"2009","journal-title":"Proc Int Conf Commun Circuits Syst"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2336610"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref20","first-page":"99","article-title":"Emerging intuitionistic fuzzy classifiers for intrusion detection system","volume":"2","author":"kavitha","year":"2011","journal-title":"J Adv Inf Technol"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/03081070600574353"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799210"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2804925"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2828864"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2685182"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(94)90084-1"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(98)00271-1"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2000.877441"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/TSMCB.2007.914695","article-title":"AdaBoost-based algorithm for network intrusion detection","volume":"38","author":"hu","year":"2008","journal-title":"IEEE Trans Syst Man Cybern B Cybern"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.44"},{"key":"ref56","author":"meeker","year":"1998","journal-title":"Statistical Methods for Reliability Data"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.60.2721"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.15"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.011"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2011.5971980"},{"key":"ref10","first-page":"1","article-title":"Internet anomaly detection based on complex network path","volume":"101","author":"wang","year":"2018","journal-title":"IEICE Trans Commun"},{"key":"ref11","first-page":"824","article-title":"Vital signs of IPv4\/IPv6 macroscopic Internet topologies","volume":"53","author":"xiao","year":"2016","journal-title":"J Comput Res Develop"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.69"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298349"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2264634"},{"key":"ref14","author":"wang","year":"2018","journal-title":"Using complex network theory for temporal locality in network traffic flows"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2890508"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"78902","DOI":"10.1088\/1674-1056\/22\/7\/078902","article-title":"Evolution of IPv6 Internet topology with unusual sudden changes","volume":"22","author":"jun","year":"2013","journal-title":"Chin Phys B"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1088\/0256-307X\/24\/7\/099"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2722483"},{"key":"ref4","article-title":"Midyear cybersecurity report","year":"2017","journal-title":"Cisco"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2612242"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2842069"},{"key":"ref8","first-page":"1254","article-title":"Analysis method of network science based on forestry pest big data","volume":"37","author":"liu","year":"2016","journal-title":"J Northeast Univ"},{"key":"ref7","first-page":"1700","article-title":"Construction of pest relationship network based on space influence domain and its analysis","volume":"37","author":"wang","year":"2016","journal-title":"Journal of Northeastern University Natural Science"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(96)84611-2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CEWIT.2013.6713749"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(00)00032-8"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/52325.52338"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.05.005"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2752200"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2069216.2069227"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.124"},{"key":"ref44","first-page":"1","article-title":"Detecting anomalous traffic using communication graphs","author":"ishibashi","year":"2010","journal-title":"Proc Infrastruct 21st Century Telecommun"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E94.B.2239"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08489858.pdf?arnumber=8489858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T03:00:08Z","timestamp":1643252408000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8489858\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2873291","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}