{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:53:11Z","timestamp":1729662791488,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/fuzz-ieee.2015.7337991","type":"proceedings-article","created":{"date-parts":[[2015,11,30]],"date-time":"2015-11-30T21:54:50Z","timestamp":1448920490000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Network attack detection and classification by the F-transform"],"prefix":"10.1109","author":[{"given":"Petr","family":"Hurtik","sequence":"first","affiliation":[]},{"given":"Petra","family":"Hodakova","sequence":"additional","affiliation":[]},{"given":"Irina","family":"Perfilieva","sequence":"additional","affiliation":[]},{"given":"Martins","family":"Liberts","sequence":"additional","affiliation":[]},{"given":"Julija","family":"Asmuss","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/1177010131"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/49.400651"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/269790.269792"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30483-8_12"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1137\/1010093","article-title":"Fractional Brownian motions, fractional noises and applications","volume":"10","author":"mandelbro","year":"1968","journal-title":"SIAM Review"},{"journal-title":"R Core Team R A Language and Environment for Statistical Computing R Foundation for Statistical Computing Vienna Austria","year":"2014","key":"ref15"},{"journal-title":"fArma ARMA Time Series Modelling","year":"2013","author":"wuertz","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2005.11.012"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2010.11.002"},{"key":"ref19","article-title":"F-transform","author":"perfilieva","year":"2014","journal-title":"Handbook of Computational Intelligence"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.10.003"},{"journal-title":"Computer Emergency Response Team (CERT-EU) DDoS overview and incident response guide","year":"2014","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.01.040"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-006-8295-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/03081070903552965"},{"key":"ref7","first-page":"497","article-title":"Enhancing DDoS flood attack detection via intelligent fuzzy logic","volume":"34","author":"xia","year":"2010","journal-title":"Informatica"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.11.007"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.12.007"},{"key":"ref9","first-page":"2211","article-title":"The use of higher-order F-transform in time series analysis","author":"perfilieva","year":"2011","journal-title":"World Congress IFSA 2011 and AFSS 2011"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2014.6891848"}],"event":{"name":"2015 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2015,8,2]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2015,8,5]]}},"container-title":["2015 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7329077\/7337796\/07337991.pdf?arnumber=7337991","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T00:44:11Z","timestamp":1498265051000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7337991\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/fuzz-ieee.2015.7337991","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}