{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T12:53:33Z","timestamp":1760100813842,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/icci-cc.2015.7259368","type":"proceedings-article","created":{"date-parts":[[2015,9,14]],"date-time":"2015-09-14T21:20:07Z","timestamp":1442265607000},"page":"76-83","source":"Crossref","is-referenced-by-count":4,"title":["A cognitive multifractal approach to characterize complexity of non-stationary and malicious DNS data traffic using adaptive sliding window"],"prefix":"10.1109","author":[{"given":"Muhammad Salman","family":"Khan","sequence":"first","affiliation":[]},{"given":"Ken","family":"Ferens","sequence":"additional","affiliation":[]},{"given":"Witold","family":"Kinsner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","article-title":"Comparison between Haar and Daubechies Wavelet Transformions on FPGA Technology","author":"mahmoud","year":"2007","journal-title":"Proceedings of World Academy of Science Engineering and Technology"},{"article-title":"Attractor","year":"0","author":"minor","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/WESCAN.1997.627159"},{"key":"ref10","article-title":"Costationarity of Locally Stationary Time Series","author":"cardinali","year":"2010","journal-title":"Journal of Time Series Econometrics"},{"year":"2004","author":"kantz","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4018\/IJCINI.2014070104"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCI-CC.2014.6921448"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/978-3-642-16083-7_14","volume":"323","author":"wang","year":"2010","journal-title":"Advances in Cognitive Informatics and Cognitive Computing"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2003.1226323"},{"year":"2002","author":"embrechts","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.1990.117957"},{"journal-title":"Probability Random Variables and Stochastic Processes 2 ed McGraw-Hill","year":"1984","author":"papoulis","key":"ref18"},{"journal-title":"Discrete-Time Signal Processing Prentice Hall","year":"1999","author":"oppenheim","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2012.07.002"},{"key":"ref4","article-title":"A procedure to estimate the fracal dimension of waveforms","volume":"5","author":"sevcik","year":"1998","journal-title":"Complexity International"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0623-9_63"},{"journal-title":"Fractal Geometry Mathematical Foundations and Applications","year":"1990","author":"falconer","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1143\/JPSJ.62.4233"},{"article-title":"Attractors: Nonstrange to Chaotic","year":"2005","author":"taylor","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1063\/1.166141"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3150\/08-BEJ137"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4018\/jcini.2010100101"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4018\/jcini.2007100103"},{"journal-title":"ICASSP","article-title":"Locally Stationary Vector Processes and Adaptive Multivariate Modeling","year":"2013","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218348X14500030"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-4149(99)00023-X"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1029\/2001WR000509"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1214\/14-AOAS782"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COGINF.2002.1039280"},{"year":"2013","key":"ref23","article-title":"Scrambled Internet Measurement, PREDICT ID USC-Lander\/ DoS_DNS_amplification-20130617 (2013&#x2013;06-17) to (2013&#x2013;06-17) provided by the USC\/Lander Project"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","article-title":"The use of computational intelligence in intrusion detection systems: A review","volume":"10","author":"xiaonan wu","year":"2010","journal-title":"Applied Soft Computing"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/978-3-642-24712-5_18","article-title":"On Detecting Abrupt Changes in Network Entropy Time Series, 1","volume":"7025","author":"winter","year":"2011","journal-title":"Communication and Multimedia Security Lecture Notes in Computer Science"}],"event":{"name":"2015 IEEE 14th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","start":{"date-parts":[[2015,7,6]]},"location":"Beijing, China","end":{"date-parts":[[2015,7,8]]}},"container-title":["2015 IEEE 14th International Conference on Cognitive Informatics &amp; Cognitive Computing (ICCI*CC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7235859\/7259359\/07259368.pdf?arnumber=7259368","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T19:31:21Z","timestamp":1498246281000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7259368\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icci-cc.2015.7259368","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}