{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:09:57Z","timestamp":1771697397234,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1109\/cicybs.2009.4925084","type":"proceedings-article","created":{"date-parts":[[2009,5,19]],"date-time":"2009-05-19T15:53:08Z","timestamp":1242748388000},"page":"13-18","source":"Crossref","is-referenced-by-count":3,"title":["A case study: Using architectural features to improve sophisticated denial-of-service attack detections"],"prefix":"10.1109","author":[{"given":"Ran","family":"Tao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Li","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lu","family":"Peng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bin","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alma","family":"Cemerlic","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","author":"wagner","year":"2002","journal-title":"Mimicry Attacks on Host-Based Inrusion Detection Systems CCS'02"},{"key":"22","first-page":"1205","article-title":"efficient feature selection via analysis of relevance and redundancy","volume":"5","author":"yu","year":"2004","journal-title":"Journal of Machine Learning Research"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1145\/347059.347560","article-title":"practical network support for ip traceback","author":"savage","year":"2000","journal-title":"Proceedings of ACM SIGCOMM"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAT.2006.011994"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383060"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.21236\/ADA400003","article-title":"voelker and stefan savage","author":"moore","year":"2001","journal-title":"Inferring Internet Denial-of-Service Activity USENIX"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1042031.1042036"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1364194"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.66"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081891"},{"key":"12","author":"lee","year":"1998","journal-title":"Data Mining Approaches for Intrusion Detection Proceedings of the 7th USENIX Security Symposium"},{"key":"21","author":"woo","year":"2007","journal-title":"Analyzing Performance Vulnerability due to Resource Denial-of-Service Attack on Chip Multiprocessors CMP-MSI"},{"key":"3","article-title":"collaborative defense against periodic","author":"chen","year":"2005","journal-title":"Shrew DDoS Attacks in Frequency Domain TISSEC"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.34"},{"key":"2","article-title":"improving attack detection in host-based ids by learning properties of system call arguments","author":"chaturvedi","year":"2006","journal-title":"Proceedings of the IEEE Symposium on Security and Privacy"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/762476.762477"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.880180"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.890133"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863968"},{"key":"5","article-title":"network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics","author":"handley","year":"2001","journal-title":"USENIX Security Symposium"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013203451"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945467"},{"key":"8","article-title":"on a new class of pulsing denial- of-service attacks and the defense","author":"jin","year":"2005","journal-title":"NDSS"}],"event":{"name":"2009 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","location":"Nashville, TN, USA","start":{"date-parts":[[2009,3,30]]},"end":{"date-parts":[[2009,4,2]]}},"container-title":["2009 IEEE Symposium on Computational Intelligence in Cyber Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4910763\/4925076\/04925084.pdf?arnumber=4925084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T02:52:04Z","timestamp":1558320724000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4925084\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2009.4925084","relation":{},"subject":[],"published":{"date-parts":[[2009,3]]}}}