{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T14:56:59Z","timestamp":1725721019054},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/fuzz-ieee.2016.7737764","type":"proceedings-article","created":{"date-parts":[[2016,11,16]],"date-time":"2016-11-16T18:19:22Z","timestamp":1479320362000},"page":"759-766","source":"Crossref","is-referenced-by-count":24,"title":["Fuzzy reasoning based Windows Firewall for preventing denial of service attack"],"prefix":"10.1109","author":[{"given":"Nitin","family":"Naik","sequence":"first","affiliation":[]},{"given":"Paul","family":"Jenkins","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.306"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/UKCI.2012.6335756"},{"journal-title":"Dynamic Fuzzy Rule Interpolation","year":"2015","author":"naik","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(75)80002-2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1985.6313399"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2013.6622404"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2014.6891816"},{"first-page":"1","article-title":"Choice of effective fitness functions for genetic algorithm-aided dynamic fuzzy rule interpolation","year":"0","key":"ref18"},{"journal-title":"Next-Generation Firewalls For Dummies","year":"2011","author":"miller","key":"ref19"},{"journal-title":"Firewall software blade","year":"1994","key":"ref4"},{"journal-title":"ICMP Usage in Scanning","year":"2000","author":"arkin","key":"ref27"},{"article-title":"Firewalls and internet security","year":"1999","author":"avolio","key":"ref3"},{"journal-title":"Network firewalls routers and switches","year":"2014","key":"ref6"},{"journal-title":"Types of firewalls to protect a business network","year":"2014","author":"hamlett","key":"ref5"},{"journal-title":"Distributed denial-of-service attacks and you","year":"2006","author":"robichaux","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039856"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2013.7.6.36"},{"journal-title":"Os platform statistics and trends","year":"2015","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.7763\/JACN.2015.V3.144"},{"journal-title":"Overview of windows firewall with advanced security","year":"2009","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1201\/b13098"},{"journal-title":"Udp flooding How to kick a local user off the network","year":"2012","author":"long","key":"ref21"},{"journal-title":"DDoS definitions - DDoSPedia","year":"2016","key":"ref24"},{"journal-title":"Honeypots for Windows","year":"2005","author":"grimes","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5426"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4884"}],"event":{"name":"2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2016,7,24]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2016,7,29]]}},"container-title":["2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7694773\/7737658\/07737764.pdf?arnumber=7737764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T07:07:00Z","timestamp":1480489620000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7737764\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/fuzz-ieee.2016.7737764","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}