{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:57:54Z","timestamp":1729630674559,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,7]]},"DOI":"10.1109\/cisda.2009.5356521","type":"proceedings-article","created":{"date-parts":[[2009,12,24]],"date-time":"2009-12-24T18:27:59Z","timestamp":1261679279000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Detection &amp;#x00026; study of DDoS attacks via entropy in data network models"],"prefix":"10.1109","author":[{"given":"Anna T.","family":"Lawniczak","sequence":"first","affiliation":[]},{"given":"Bruno N.","family":"Di Stefano","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2003.1226164"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1063\/1.1985388","volume":"776","author":"lawniczak","year":"2005","journal-title":"AIP Conference Proc"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2003.1226080"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HPCS.2005.35"},{"journal-title":"Communication Networks Fundamental Concepts and Key Architectures","year":"2000","author":"leon-garcia","key":"ref14"},{"key":"ref15","article-title":"Network Event Detection with T-Entropy","author":"eimann","year":"2005","journal-title":"CDMTCS Research Report Series Centre for Discrete Mathematics and Theoretical Computer Science CDMTCS-266"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330148"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77048-0_35"},{"year":"0","key":"ref4"},{"year":"0","key":"ref3"},{"year":"0","key":"ref6"},{"year":"0","key":"ref5"},{"key":"ref8","first-page":"43","author":"nucci","year":"2007","journal-title":"Controlled Chaos December 2007 IEEE Spectrum"},{"key":"ref7","first-page":"1","article-title":"Monitoring the Macroscopic Effect of DDoS Flooding Attacks","volume":"2","author":"yuan","year":"2005","journal-title":"In IEEE Transactions on Dependable and Secure Computing"},{"journal-title":"The Economist","article-title":"Cyberwarfare is becoming scarier","year":"2007","key":"ref2"},{"key":"ref1","article-title":"Russia accused of unleashing cyberwar to disable Estonia","author":"traynor","year":"2007","journal-title":"The Guardian"},{"key":"ref9","first-page":"573","author":"lawniczak","year":"2008","journal-title":"DDoS attack detection using entropy of packet traffic in CA like data communication network model"}],"event":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","start":{"date-parts":[[2009,7,8]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2009,7,10]]}},"container-title":["2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5351161\/5356514\/05356521.pdf?arnumber=5356521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T03:13:11Z","timestamp":1497841991000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5356521\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cisda.2009.5356521","relation":{},"subject":[],"published":{"date-parts":[[2009,7]]}}}