{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T04:32:04Z","timestamp":1752985924937,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/ceec.2016.7835914","type":"proceedings-article","created":{"date-parts":[[2017,1,30]],"date-time":"2017-01-30T16:56:10Z","timestamp":1485795370000},"page":"204-209","source":"Crossref","is-referenced-by-count":18,"title":["Change-point cloud DDoS detection using packet inter-arrival time"],"prefix":"10.1109","author":[{"given":"Opeyemi","family":"Osanaiye","sequence":"first","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]},{"given":"Mqhele","family":"Dlodlo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Change-Point Analyzer 2 0 Shareware Program","year":"2000","author":"taylor","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0623-3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2011.5928950"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2015.11.001"},{"key":"ref13","first-page":"77","article-title":"Security as a service for a cloud federation","author":"macdermott","year":"0"},{"key":"ref14","first-page":"276","article-title":"Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection","volume":"15","author":"fragkiadakis","year":"2015","journal-title":"Wireless Communications and Mobile Computing"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2012.2233713"},{"key":"ref16","first-page":"771","article-title":"Proactively detecting distributed denial of service attacks using source ip address monitoring","author":"peng","year":"2004","journal-title":"International Conference on Research in Networking"},{"journal-title":"Application and Analyses of Cumulative Sum to Detect Highly Distributed Denial of Service Attacks Using Different Attack Traffic Patterns","year":"2004","author":"takada","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5755\/j01.eee.20.3.6683"},{"journal-title":"CAIDA (2000) DDoS Attack","year":"2007","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.08.009"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.5120\/1083-1399"},{"key":"ref3","first-page":"147","article-title":"Distributed denial of service (ddos) resilience in cloud: Review and conceptual cloud {DDoS} mitigation framework","volume":"67","author":"osanaiye","year":"2016","journal-title":"Journal of Network and ComputerApplications"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41407-7_10"},{"journal-title":"WITS (2003) Waikato Internet Traffic Storage Auckland VIII trace","year":"0","key":"ref29"},{"key":"ref5","first-page":"bxt031","article-title":"Detecting distributed denial of service attacks: methods, tools and future directions","author":"bhuyan","year":"2013","journal-title":"The ComputerJ"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.027"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.08.004"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.08.005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.02.026"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1201\/9781439806173"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963024"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.02.006"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EMS.2011.34"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/BF02926025"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11009-011-9256-5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.01.022"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0919-5_18"}],"event":{"name":"2016 8th Computer Science and Electronic Engineering (CEEC)","start":{"date-parts":[[2016,9,28]]},"location":"Colchester, United Kingdom","end":{"date-parts":[[2016,9,30]]}},"container-title":["2016 8th Computer Science and Electronic Engineering (CEEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7827233\/7835874\/07835914.pdf?arnumber=7835914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T14:59:44Z","timestamp":1513177184000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7835914\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/ceec.2016.7835914","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}