{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:42:26Z","timestamp":1761597746540,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/dsmp.2016.7583504","type":"proceedings-article","created":{"date-parts":[[2016,10,6]],"date-time":"2016-10-06T21:54:27Z","timestamp":1475790867000},"page":"42-47","source":"Crossref","is-referenced-by-count":5,"title":["Fuzzy logic inference for unsupervised anomaly detection"],"prefix":"10.1109","author":[{"given":"Tetiana","family":"Gladkykh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Taras","family":"Hnot","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Volodymyr","family":"Solskyy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24230-9_3"},{"key":"ref11","first-page":"184","article-title":"Anomaly detection &#x2013; unsupervised approach","volume":"1","author":"gladkikh","year":"2016","journal-title":"Measuring and Computing Devices in Technological Process"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/9781119994374"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"209","DOI":"10.3233\/IFS-1994-2301","article-title":"Generation of Fuzzy Rules by Mountain Clustering","volume":"2","author":"yager","year":"1994","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-0085-4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"journal-title":"Netflow and Security Cisco","year":"0","key":"ref3"},{"key":"ref6","first-page":"42","article-title":"Self-adaptive Detection Method for DDoS Attack Based on Fractional Fourier Transform and Self-similarity","volume":"58","author":"chen","year":"2012","journal-title":"Proceedings of International Conference on Signal Processing Systems (ICSPS 2012) IPCSIT"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2498\/cit.1002007"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-855-0.ch010"},{"key":"ref7","first-page":"345","article-title":"SelfSimilarity and long-range dependence through the wavelet lens","author":"ably","year":"2002","journal-title":"Theory and Applications of Long Range Dependence"},{"journal-title":"Information Security trends","year":"0","key":"ref2"},{"journal-title":"The Year in Cyberattacks","year":"2014","key":"ref1"},{"key":"ref9","first-page":"85","article-title":"Hide: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification","author":"zhang","year":"2001","journal-title":"IEEE Workshop on Information Assurance and Security"}],"event":{"name":"2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP)","start":{"date-parts":[[2016,8,23]]},"location":"Lviv, Ukraine","end":{"date-parts":[[2016,8,27]]}},"container-title":["2016 IEEE First International Conference on Data Stream Mining &amp; Processing (DSMP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7578909\/7583485\/07583504.pdf?arnumber=7583504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T21:30:17Z","timestamp":1657402217000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7583504\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/dsmp.2016.7583504","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}