{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:10:51Z","timestamp":1761581451650,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/iccomm.2016.7528307","type":"proceedings-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T14:27:58Z","timestamp":1470407278000},"page":"9-14","source":"Crossref","is-referenced-by-count":6,"title":["Multiple time series fisher periodicity test for the detection of the distributed new shrew attacks"],"prefix":"10.1109","author":[{"given":"Paul","family":"Cotae","sequence":"first","affiliation":[]},{"given":"Myong","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Velazquez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-246X.1967.tb03132.x"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1980.10477474"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/79.2.438"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/0471722235"},{"journal-title":"The Statistical Analysis of Time Series","year":"1971","author":"anderson","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883403"},{"key":"ref16","first-page":"75","article-title":"Low rate-Targeted Denial of Service Attacks (The Shrew vs. Mice and Elephants)","author":"kuzmanovic","year":"2003","journal-title":"SIGCOMM 2003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2321034"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.9.10.2674-2681"},{"key":"ref19","first-page":"1203","article-title":"TCP flow Analysis for Defense against Shrew DDoS Attacks","author":"yu","year":"0","journal-title":"IEEE ICC 2007"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1186\/1471-2105-6-117","article-title":"Robust Detection of Periodic Time Series Measured from Biological Systems","volume":"6","author":"ahdesmaki","year":"2005","journal-title":"BMC Bioinformatics"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/03610920903564743"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/GENSIPS.2007.4365817"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btg364"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.4304\/jnw.9.10.2674-2681","article-title":"A New Detection Method based on AEWMA Algorithm for LDoS attacks","volume":"9","author":"tang","year":"2014","journal-title":"Journal of Networks"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.09.022"},{"key":"ref2","first-page":"249","article-title":"Detecting Periodic Components in White Gaussian Time Series","volume":"51","author":"shean","year":"1989","journal-title":"JR Statistic Soc B(1989)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1929.0151"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511622762"},{"key":"ref20","article-title":"Spectral Analysis of Bottleneck Traffic","author":"he","year":"2005","journal-title":"Technical Report USC-CSD-TR-05-854"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/61.1.57"},{"key":"ref21","volume":"1","author":"feller","year":"1968","journal-title":"An Introduction to Probability Theory and Applications"},{"key":"ref24","first-page":"130","article-title":"Siegel test for periodic components in multiple time series and its application in engineering practice","volume":"24","author":"jaruskova","year":"1988","journal-title":"Kybernetica"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/64.3.495"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/52.1-2.167"}],"event":{"name":"2016 International Conference on Communications (COMM)","start":{"date-parts":[[2016,6,9]]},"location":"Bucharest, Romania","end":{"date-parts":[[2016,6,10]]}},"container-title":["2016 International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7522608\/7528195\/07528307.pdf?arnumber=7528307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T16:05:15Z","timestamp":1498320315000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7528307\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iccomm.2016.7528307","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}