{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T13:27:33Z","timestamp":1774358853004,"version":"3.50.1"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/dessert50317.2020.9125016","type":"proceedings-article","created":{"date-parts":[[2020,6,25]],"date-time":"2020-06-25T20:46:07Z","timestamp":1593117967000},"page":"127-132","source":"Crossref","is-referenced-by-count":15,"title":["A Cyberattacks Detection Technique Based on Evolutionary Algorithms"],"prefix":"10.1109","author":[{"given":"Sergii","family":"Lysenko","sequence":"first","affiliation":[]},{"given":"Kira","family":"Bobrovnikova","sequence":"additional","affiliation":[]},{"given":"Roman","family":"Shchuka","sequence":"additional","affiliation":[]},{"given":"Oleg","family":"Savenko","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/DT.2013.6566310"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1615\/JAutomatInfScien.v51.i3.20"},{"key":"ref32","author":"simon","year":"2013","journal-title":"Evolutionary Optimization Algorithms Biologically Inspired and Population-based Approaches to Computer Intelligence"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/9781119136507"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21952-9_10"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2017.8095220"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19216-1_37"},{"key":"ref35","article-title":"Canadian Institute for Cybersecurity. Botnet dataset","year":"2020"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1615\/JAutomatInfScien.v51.i12.40"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45402-2_74"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170802"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DESSERT.2018.8409096"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2855563"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1504\/IJDET.2019.097849","article-title":"Systematic literature review and taxonomy for DDoS attack detection and prediction","volume":"1","author":"yusof","year":"2019","journal-title":"Int J of Digital Enterprise Technology"},{"key":"ref15","first-page":"95","article-title":"An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment","volume":"55","author":"cheng","year":"2018","journal-title":"Computers Materials & Continua"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.01.002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54978-1_19"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3497"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2815442"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19419-6_12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-0408-8_21"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2015.7340777"},{"key":"ref3","article-title":"Cyber Crime","year":"0"},{"key":"ref6","first-page":"476","article-title":"Features of Hidden Fault Detection in Pipeline Digital Components of Safety-Related Systems","author":"drozd","year":"2015","journal-title":"ICTERI"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39207-3_8"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.7148\/2017-0605"},{"key":"ref8","first-page":"507","article-title":"Computer's Analysis Method and Reliability Assessment of Fault-Tolerance Operation of Information Systems","volume":"1356","author":"atamanyuk","year":"2015","journal-title":"ICT in Education Research and Industrial Applications Integration Harmonization and Knowledge Transfer Proceedings of the 11th International Conference ICTERI-2015"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EWDTS.2010.5742075"},{"key":"ref2","article-title":"Security Informed Safety Assessment of Industrial FPGA-Based Systems","author":"kharchenko","year":"2014"},{"key":"ref9","first-page":"375","article-title":"Metamorphic Viruses Detection Technique Based on the Modified Emulators","volume":"1614","author":"pomorova","year":"2016","journal-title":"CEUR Workshop Proceedings"},{"key":"ref1","article-title":"The 2020 Cyber Security Report","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BigComp.2018.00044"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2967478"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.017"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-018-3236-9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2365-y"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31217-5_19"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21952-9_10"}],"event":{"name":"2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)","location":"Kyiv, Ukraine","start":{"date-parts":[[2020,5,14]]},"end":{"date-parts":[[2020,5,18]]}},"container-title":["2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9122248\/9124995\/09125016.pdf?arnumber=9125016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:55:18Z","timestamp":1656345318000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9125016\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/dessert50317.2020.9125016","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}