{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T23:37:47Z","timestamp":1725406667946},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/iscc.2014.6912624","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T16:37:54Z","timestamp":1412095074000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Measuring the Internet's threat level: A global-local approach"],"prefix":"10.1109","author":[{"given":"Spyridon","family":"Kollias","sequence":"first","affiliation":[]},{"given":"Vasileios","family":"Vlachos","sequence":"additional","affiliation":[]},{"given":"Alexandros","family":"Papanikolaou","sequence":"additional","affiliation":[]},{"given":"Periklis","family":"Chatzimisios","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Ilioudis","sequence":"additional","affiliation":[]},{"given":"Kostas","family":"Metaxiotis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Encyclopedia of Chart Patterns","year":"2005","author":"bulkowski","key":"17"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1088\/1469-7688\/1\/2\/304"},{"key":"16","article-title":"Analysis of high frequency financial data","author":"engle","year":"2009","journal-title":"Handbook of Financial Econometrics Tools and Techniques 1st Ed Ser Handbooks in Finance"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"journal-title":"Quantitative Methods in Finance","year":"1997","author":"watsham","key":"14"},{"year":"0","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2011.101"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/948134.948136"},{"journal-title":"Fridge Sends Spam Emails As Attack Hits Smart Gadgets","year":"2014","key":"2"},{"journal-title":"Russia Hidden Chips 'Launch Spam Attacks from Irons","year":"2013","key":"1"},{"year":"0","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.01.002"},{"key":"6","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1117\/12.500849","article-title":"Using sensor networks and data fusion for early detection of active worms","author":"berk","year":"2003","journal-title":"Sensors and Command Control Communications and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement II"},{"journal-title":"The EarlyBird System for the Real-Time Detection of Unknown Worms","year":"2003","author":"singh","key":"5"},{"key":"4","first-page":"211","article-title":"DIDS (distributed intrusion detection system)-motivation, architecture, and an early prototype","author":"snapp","year":"1997","journal-title":"Internet Besieged Countering Cyberspace Scofflaws"},{"year":"0","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1108\/09685220710817815"}],"event":{"name":"2014 IEEE Symposium on Computers and Communication (ISCC)","start":{"date-parts":[[2014,6,23]]},"location":"Funchal, Madeira, Portugal","end":{"date-parts":[[2014,6,26]]}},"container-title":["2014 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6892194\/6912618\/06912624.pdf?arnumber=6912624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T17:31:44Z","timestamp":1498152704000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6912624\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iscc.2014.6912624","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}