{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:29:15Z","timestamp":1729657755900,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/glocomw.2013.6824989","type":"proceedings-article","created":{"date-parts":[[2014,6,16]],"date-time":"2014-06-16T21:53:24Z","timestamp":1402955604000},"page":"217-222","source":"Crossref","is-referenced-by-count":4,"title":["Detection of application layer DDoS attack with clustering and likelihood analysis"],"prefix":"10.1109","author":[{"given":"Pawel","family":"Chwalinski","sequence":"first","affiliation":[]},{"given":"Roman","family":"Belavkin","sequence":"additional","affiliation":[]},{"given":"Xiaochun","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1377488.1377489"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-012-9497-8"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.926503"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/IMSCCS.2006.159"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb00917.x"},{"key":"24","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/TNET.2008.925628","article-title":"Monitoring the application-layer DDoS attacks for popular websites","volume":"17","author":"xie","year":"2009","journal-title":"IEEE\/ ACM Trans Netw"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2010.5687169"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199191"},{"key":"13","first-page":"130","article-title":"Information-theoretic measures for anomaly detection","author":"lee","year":"2001","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015404"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/9780470544341"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2011-50"},{"key":"21","article-title":"Detection of malicious and non-malicious website visitors using unsupervised neural network learning","author":"stevanovic","year":"2012","journal-title":"Applied Soft Computing"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35416-8_19"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2011.07.018"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/584887.584888"},{"key":"1","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1145\/233013.233034","article-title":"Web server workload characterization: The search for invariants","author":"arlitt","year":"1996","journal-title":"Proceedings of the 1996 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/511483.511485"},{"key":"7","article-title":"Detecting denial of service by modelling web-server behaviour","author":"giralte","year":"2012","journal-title":"Computers and Electrical Engineering (0)"},{"key":"6","first-page":"1858","article-title":"A new metric for probability distributions. Information Theory","volume":"49","author":"endres","year":"2003","journal-title":"IEEE Transactions on"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5315991"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2009.156"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1950.tb00463.x"}],"event":{"name":"2013 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2013,12,9]]},"location":"Atlanta, GA","end":{"date-parts":[[2013,12,13]]}},"container-title":["2013 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6820092\/6824917\/06824989.pdf?arnumber=6824989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T10:59:21Z","timestamp":1498129161000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6824989\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2013.6824989","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}