{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:16:14Z","timestamp":1729646174554,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/discex.2003.1194978","type":"proceedings-article","created":{"date-parts":[[2004,3,22]],"date-time":"2004-03-22T14:34:28Z","timestamp":1079966068000},"page":"277-282","source":"Crossref","is-referenced-by-count":2,"title":["A summary of detection of denial-of-QoS attacks on DiffServ networks"],"prefix":"10.1109","volume":"2","author":[{"family":"Xiaoyong Wu","sequence":"first","affiliation":[]},{"given":"V.A.","family":"Mahadik","sequence":"additional","affiliation":[]},{"given":"D.S.","family":"Reeves","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/32.372146"},{"journal-title":"NIST\/SEMATECH e-Handbook of Statistical Methods","year":"2002","key":"ref3"},{"article-title":"Statistical anomaly detection for link-state routing protocols","year":"1998","author":"qu","key":"ref10"},{"key":"ref6","first-page":"69","article-title":"Design and implementation of a scalable intrusion detection system for the protection of network infrastructure","volume":"2","author":"jou","year":"2000","journal-title":"Proceedings 2000 DARPA Information Survivability Conference and Exposition"},{"journal-title":"Statistical Method from the Viewpoint of Quality Control","year":"1939","author":"shewhart","key":"ref11"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1080\/00224065.1986.11979014","article-title":"The exponentially weighted moving average","volume":"18","author":"stuart","year":"1986","journal-title":"Quality Technology"},{"key":"ref12","article-title":"Security issues in a differentiated services Internet","author":"striegel","year":"2001","journal-title":"tutorial at CERT'2001"},{"article-title":"Detection of Denial of QoS Attacks on Diff-Serv Networks","year":"2002","author":"mahadik","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/167954.166255"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00017-6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/90.392383"},{"key":"ref1","article-title":"Detecting unusual program behavior using the statistical components of NIDE S","author":"anderson","year":"1995","journal-title":"Technical Report SRI-CSL-98 SRI International Computer Science Laboratory"}],"event":{"name":"DARPA Information Survivability Conference and Exposition","acronym":"DISCEX-03","location":"Washington, DC, USA"},"container-title":["Proceedings DARPA Information Survivability Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8503\/26876\/01194978.pdf?arnumber=1194978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,25]],"date-time":"2018-04-25T01:53:47Z","timestamp":1524621227000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1194978\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/discex.2003.1194978","relation":{},"subject":[]}}