{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:14:15Z","timestamp":1725621255688},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/icdim.2010.5664238","type":"proceedings-article","created":{"date-parts":[[2010,12,14]],"date-time":"2010-12-14T15:28:00Z","timestamp":1292340480000},"page":"404-411","source":"Crossref","is-referenced-by-count":3,"title":["Fibonacci sequence and EWMA for intrusion forecasting system"],"prefix":"10.1109","author":[{"given":"Elvis","family":"Pontes","sequence":"first","affiliation":[]},{"given":"Wagner L.","family":"Zucchi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Calculating Security Return on Investment","year":"2007","author":"don","key":"ref39"},{"key":"ref38","article-title":"Cost-benefit analysis for network intrusion detection system","author":"wei","year":"2001","journal-title":"CSI 28th Computer Security Conference CSI"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.2307\/1266443"},{"journal-title":"E-Handbook of Statistical Methods","year":"2009","key":"ref32"},{"key":"ref31","first-page":"4370","article-title":"A new IDS method based on behavioral model","author":"yin","year":"2004","journal-title":"IEEE WCICA"},{"year":"1998","key":"ref30"},{"key":"ref37","first-page":"73","article-title":"A storage model of network flow for traffic analysis and security","author":"correa","year":"2008","journal-title":"VIII SBSEG"},{"article-title":"The Behavior of Markets: A Fractal view of risk, ruin and reward","year":"2006","author":"mandelbrot","key":"ref36"},{"key":"ref35","first-page":"45","article-title":"Elliott Wave Principles","author":"prechter","year":"2002"},{"article-title":"Reconstruction of the Elliott Wave Principle","year":"1982","author":"elliot","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.2005.1517323"},{"year":"2004","key":"ref40","article-title":"A Guide for Government Agencies Calculating Return on Security Investment"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CISW.2007.4425547"},{"key":"ref12","first-page":"9","article-title":"Quickprop neural network ensemble forecasting framework for database intrusion prediction system","author":"ramasubramanian","year":"2004","journal-title":"Springer 7th ICAISC"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378401"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ADCOM.2006.4289880"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128835"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2008.107"},{"article-title":"Principles of Forecasting: A Handbook for Researchers and Practitioners","year":"2002","author":"armstrong","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SENSORCOMM.2007.4394965"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2005.1549778"},{"key":"ref28","first-page":"75","article-title":"Computer intrusion detection through EWMA for autocorrelated and uncorrelated data","author":"ye","year":"2003","journal-title":"IEEE Transactions on Reliability"},{"key":"ref4","first-page":"203","article-title":"Forecasting for return on security information investment: new approach on trends in intrusion detection and unwanted traffic","author":"pontes","year":"2008","journal-title":"IEEE VII 12TS"},{"key":"ref27","first-page":"266","article-title":"Probabilistic techniques for IDS based on computer audit data","author":"ye","year":"2001","journal-title":"IEEE Transactions on Systems Man and Cybernetics"},{"key":"ref3","first-page":"253","article-title":"Analise de tendencias futuras para eventos de seguranca da informacao em IDS","author":"pontes","year":"2008","journal-title":"VIII SBSEG"},{"key":"ref6","article-title":"Third generation for intrusion detection: applying forecasts and ROSI to cope with unwanted traffic","author":"pontes","year":"2009","journal-title":"IEEE ICITST"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.05.005"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIM.2009.5356772"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICTTA.2006.1684901"},{"key":"ref7","article-title":"Design of on-line intrusion forecast system with a weather forecasting model","author":"chung","year":"2006","journal-title":"Springer ICCSA"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/UKSIM.2008.30"},{"key":"ref9","article-title":"IFTS: intrusion forecast and traceback based on union defense environment","author":"leu","year":"2005","journal-title":"IEEE ICPADS"},{"year":"2009","key":"ref1","article-title":"Guide to Intrusion Detection and Prevention Systems (IDPS)"},{"key":"ref20","first-page":"91","article-title":"Unwanted internet traffic: concepts, characterization and solutions","author":"feitosa","year":"2008","journal-title":"VIII SBSEG"},{"article-title":"Identifying and Modeling Unwanted Traffic on the Internet","year":"2005","author":"soto","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028794"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/INES.2007.4283671"},{"key":"ref24","article-title":"Report from the IAB workshop on Unwanted Traffic March 9&#x2013;10, 2006","author":"andersson","year":"2007","journal-title":"RFC 4948 IETF"},{"year":"2009","key":"ref41"},{"journal-title":"IAB workshop on Unwanted Traffic","year":"2008","key":"ref23"},{"article-title":"Worldwide Infrastructure Sec. Report","year":"0","author":"mcpherson","key":"ref26"},{"year":"2008","key":"ref25","article-title":"2008 Internet Crime Report"}],"event":{"name":"2010 Fifth International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2010,7,5]]},"location":"Thunder Bay, ON, Canada","end":{"date-parts":[[2010,7,8]]}},"container-title":["2010 Fifth International Conference on Digital Information Management (ICDIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5644872\/5662242\/05664238.pdf?arnumber=5664238","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T05:55:00Z","timestamp":1490075700000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5664238\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/icdim.2010.5664238","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}