{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T00:44:18Z","timestamp":1744937058154,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/aiccsa.2005.1387011","type":"proceedings-article","created":{"date-parts":[[2005,4,1]],"date-time":"2005-04-01T15:16:50Z","timestamp":1112368610000},"page":"17-22","source":"Crossref","is-referenced-by-count":3,"title":["Multivariate statistical analysis for network attacks detection"],"prefix":"10.1109","author":[{"family":"Guangzhi Qu","sequence":"first","affiliation":[]},{"given":"S.","family":"Hariri","sequence":"additional","affiliation":[]},{"given":"M.","family":"Yousif","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"13","DOI":"10.1023\/A:1011248925750"},{"year":"2002","journal-title":"Womrs Threat Aanlysed","key":"11"},{"year":"2004","journal-title":"News New Worm Spreading Rapidly Across Internet","key":"12"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/MSECP.2003.1236235"},{"key":"2","article-title":"AUTONOMIA: An autonomic computing environment","author":"hariri","year":"2003","journal-title":"Performance Computing and Communications Conference"},{"year":"2003","journal-title":"The SQL Slammer Worm Incident","key":"1"},{"year":"2000","journal-title":"Wired News Was Yahoo Smurfed or Trinooed?","key":"10"},{"key":"7","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/DISCEX.2000.821506","article-title":"Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation","volume":"2","author":"lippmann","year":"2000","journal-title":"Proc 2000 DARPA Information Survivability Conference and Exposition (DISCEX 00)"},{"year":"2000","author":"montgomery","journal-title":"Design and Analysis of Experiments 6th Edition","key":"6"},{"year":"2000","journal-title":"Quantifying Vulnerabilities in the Networked Environment Methods and Uses Char Sample","key":"5"},{"year":"2003","author":"gaudin","journal-title":"2003 Worst Year Ever for Viruses Worms","key":"4"},{"year":"2000","journal-title":"Wired News A Frenzy of Hacking Attacks","key":"9"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1137\/1.9781611972733.3"}],"event":{"name":"The 3rd ACS\/IEEE International Conference onComputer Systems and Applications, 2005.","location":"Cairo, Egypt"},"container-title":["The 3rd ACS\/IEEE International Conference onComputer Systems and Applications, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9525\/30191\/01387011.pdf?arnumber=1387011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T13:53:11Z","timestamp":1497621191000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1387011\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2005.1387011","relation":{},"subject":[]}}