{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:21:43Z","timestamp":1730211703421,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679430","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"101-106","source":"Crossref","is-referenced-by-count":0,"title":["Use of Visibility Graphs for the Early Detection of DoS Attacks"],"prefix":"10.1109","author":[{"given":"Jo\u00e3o","family":"Lopes","sequence":"first","affiliation":[{"name":"Instituto Polit&#x00E9;cnico de Viana do Castelo,ADiT-Lab,Viana do Castelo,Portugal"}]},{"given":"Pedro","family":"Pinto","sequence":"additional","affiliation":[{"name":"Instituto Polit&#x00E9;cnico de Viana do Castelo,ADiT-Lab,Viana do Castelo,Portugal"}]},{"given":"Alberto","family":"Partida","sequence":"additional","affiliation":[{"name":"Data, Complex Networks and Cybersecurity Sciences Technological Institute, Rey Juan Carlos University,Madrid,Spain"}]},{"given":"Ant\u00f3nio","family":"Pinto","sequence":"additional","affiliation":[{"name":"INESC TEC,Porto,Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/s13278-018-0490-5","article-title":"Utilizing the average node degree to assess the temporal growth rate of Twitter","volume":"8.1","author":"Antonakaki","year":"2018","journal-title":"Social Network Analysis and Mining"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.3390\/su131910743"},{"key":"ref3","first-page":"1736","author":"Biggs","year":"1986","journal-title":"Graph Theory"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.physrep.2005.10.009","article-title":"Complex networks: Structure and dynamics","volume":"424.4","author":"Boccaletti","year":"2006","journal-title":"Physics Reports"},{"volume-title":"Global Cybersecurity Outlook 2023","year":"2023","author":"Cin","key":"ref5"},{"volume-title":"Cloudflare DDoS threat report for 2022 Q4","year":"2023","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.2478\/s11600-012-0032-x"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.3390\/sym14112388"},{"volume-title":"Security Information and Event Management (SIEM) Implementation","year":"2010","author":"Harper","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.comcom.2017.05.015"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/infocom.2018.8486257"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1073\/pnas.0709247105"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1016\/j.physa.2019.122952","article-title":"Visibility graph analysis of Bitcoin price series","volume-title":"Physica A: Statistical Mechanics and its Applications","author":"Liu","year":"2020"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/978-3-031-53025-8_19","article-title":"On the Use of VGs for Feature Selection in Supervised Machine Learning - A Use Case to Detect Distributed DoS Attacks","volume-title":"Optimization, Learning Algorithms and Applications","author":"Lopes","year":"2024"},{"key":"ref15","volume-title":"Intrusion Detection Systems","volume":"38","author":"Mancini","year":"2008"},{"volume-title":"Lumen Quarterly DDoS Report - Q4 2022","year":"2022","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1103\/physreve.80.046103"},{"volume-title":"The growing importance of the technology economy","year":"2016","author":"Marco","key":"ref18"},{"volume-title":"Cyber threats to the financial system are growing, and the global community must cooperate to protect it","year":"2021","author":"MAURER","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/s00500-021-06608-1"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/iciiet55458.2022.9967650"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1137\/s003614450342480"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/CISIS.2010.53"},{"key":"ref24","article-title":"Visibility Graph Analysis of IOTA and IoTeX Price Series: An Intentional Risk-Based Strategy to Use 5G for IoI","volume":"10.18","author":"Partida","year":"2021","journal-title":"Electronics"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"112806","DOI":"10.1016\/j.chaos.2022.112806","article-title":"The chaotic, self-similar and hierarchical patterns in Bitcoin and Ethereum price series","volume":"165","author":"Partida","year":"2022","journal-title":"Chaos, Solitons & Fractals"},{"key":"ref26","article-title":"Carbon emissions and large neural network training","author":"Patterson","year":"2021","journal-title":"arXiv preprint"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.33448\/rsd-v9i8.5759"},{"year":"2022","author":"Reed","journal-title":"HTTP DoS Dataset in PCAP format for Wireshark","key":"ref28"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/ICICES.2013.6508250"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/DSAA.2019.00049"},{"key":"ref31","first-page":"175","article-title":"Multiscale Vulnerability of Complex Networks","volume":"17.4","author":"Stefano","year":"2007","journal-title":"AIP Publishing"},{"volume-title":"What is a DDoS attack and how to prevent them. 2021","author":"Stone","key":"ref32"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.18653\/v1\/P19-1355"},{"volume-title":"2022 Data Breach Investigations Report","year":"2023","key":"ref34"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/iadcc.2013.6514334"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1016\/j.joule.2023.09.004"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/icaiic54071.2022.9722661"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2024,9,2]]},"location":"London, United Kingdom","end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679430.pdf?arnumber=10679430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T04:58:53Z","timestamp":1727240333000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679430\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679430","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}