{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T14:52:41Z","timestamp":1774536761276,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/isncc.2015.7238570","type":"proceedings-article","created":{"date-parts":[[2015,9,7]],"date-time":"2015-09-07T17:36:37Z","timestamp":1441647397000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["Network-based mimicry anomaly detection using divergence measures"],"prefix":"10.1109","author":[{"given":"Sirikarn","family":"Pukkawanna","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Youki","family":"Kadobayashi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Suguru","family":"Yamaguchi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISABEL.2008.4712573"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.302"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-0-387-77322-3_5","article-title":"A survey of insider attack detection research","volume":"39","author":"salem","year":"2008","journal-title":"Insider Attack and Cyber Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/78.492555"},{"key":"ref15","article-title":"Detecting UDP attacks in high speed networks using packet symmetry with only flow data","author":"van der sanden","year":"2008"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1368436.1368476"},{"key":"ref17","first-page":"614","article-title":"Scan surveillance in internet networks","volume":"5550","author":"houerbi","year":"2009","journal-title":"Networking LNCS"},{"key":"ref18","year":"0","journal-title":"Tcpreplay"},{"key":"ref19","year":"0","journal-title":"Rand()-generate pseudo-random bytes"},{"key":"ref4","article-title":"Anomalous payload-based worm detection and signature generation","author":"wang","year":"2005","journal-title":"Proceedings of RAID"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-3-540-30143-1_11","article-title":"Anomalous payload-based network intrusion detection","volume":"3224","author":"wang","year":"2004","journal-title":"Recent Advances in Intrusion Detection"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195714"},{"key":"ref5","first-page":"319","article-title":"Information theory based detection against network behavior mimicking ddos attacks","volume":"12","author":"yu","year":"2008","journal-title":"IEEE Communication Letter"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2009.090615"},{"key":"ref7","first-page":"1","article-title":"Fool me if you can: mimicking attacks and anti-attacks in cyberspace","volume":"1","author":"yu","year":"2013","journal-title":"IEEE Transactions on Computers"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/508791.508835"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330148"},{"key":"ref20","year":"0","journal-title":"MAWI working group traffic archive"}],"event":{"name":"2015 International Symposium on Networks, Computers and Communications (ISNCC)","location":"Hammamet","start":{"date-parts":[[2015,5,13]]},"end":{"date-parts":[[2015,5,15]]}},"container-title":["2015 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7210261\/7238567\/07238570.pdf?arnumber=7238570","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T15:06:15Z","timestamp":1498230375000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7238570\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/isncc.2015.7238570","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}