{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:09:16Z","timestamp":1738818556650,"version":"3.37.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1109\/icnp61940.2024.10858563","type":"proceedings-article","created":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T18:29:45Z","timestamp":1738693785000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["DoS-Dam: a Hierarchical Method for Identifying and Mitigating DDoS Attacks in High-Speed Network Traffic"],"prefix":"10.1109","author":[{"given":"Yihang","family":"Hao","sequence":"first","affiliation":[{"name":"China Telecom Network Security Technology Co. Ltd,Beijing,China"}]},{"given":"Liyuan","family":"Chang","sequence":"additional","affiliation":[{"name":"China Telecom Network Security Technology Co. Ltd,Beijing,China"}]},{"given":"Wei","family":"Guo","sequence":"additional","affiliation":[{"name":"China Telecom Network Security Technology Co. Ltd,Beijing,China"}]},{"given":"Haizhen","family":"Qi","sequence":"additional","affiliation":[{"name":"China Telecom Network Security Technology Co. Ltd,Beijing,China"}]},{"given":"Gang","family":"Yang","sequence":"additional","affiliation":[{"name":"China Telecom Network Security Technology Co. Ltd,Beijing,China"}]},{"given":"Jin\u2019ao","family":"Cuil","sequence":"additional","affiliation":[{"name":"China Telecom Network Security Technology Co. Ltd,Beijing,China"}]},{"given":"Gen","family":"Li","sequence":"additional","affiliation":[{"name":"China Telecom Network Security Technology Co. Ltd,Beijing,China"}]},{"given":"Yue","family":"Song","sequence":"additional","affiliation":[{"name":"China Telecom Network Security Technology Co. Ltd,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/s23156850"},{"article-title":"Ddos threat report for 2024 q1","year":"2024","author":"Omer Yoachimik","key":"ref2"},{"volume-title":"2023 nsfocus global ddos landscape report","year":"2024","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP52444.2021.9651929"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-9491-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3038911"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100279"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2013.26"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2020.1722296"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685794"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.877136"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.33"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.19101\/IJATEE.2021.874021"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3615080"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS60453.2023.00300"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1394","DOI":"10.1109\/ICDE.2019.00126","article-title":"Finding Significant Items in Data Streams","volume-title":"2019 IEEE 35th International Conference on Data Engineering (ICDE)","author":"Yang","year":"2019"},{"key":"ref18","article-title":"Catboost: unbiased boosting with categorical features","volume-title":"Advances in Neural Information Processing Systems","volume":"31","author":"Prokhorenkova","year":"2018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"journal-title":"Cic-ddos2019 dataset","year":"2019","author":"Sharafaldin","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C51114.2020.00072"},{"volume-title":"Ldos attack detection method based on traffic time-frequency characteristics","year":"2022","author":"Fu","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2993782"}],"event":{"name":"2024 IEEE 32nd International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2024,10,28]]},"location":"Charleroi, Belgium","end":{"date-parts":[[2024,10,31]]}},"container-title":["2024 IEEE 32nd International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10858485\/10858498\/10858563.pdf?arnumber=10858563","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T06:04:59Z","timestamp":1738735499000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10858563\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icnp61940.2024.10858563","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]}}}