{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:29:56Z","timestamp":1730280596115,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/lcn.2015.7366308","type":"proceedings-article","created":{"date-parts":[[2016,1,7]],"date-time":"2016-01-07T22:15:34Z","timestamp":1452204934000},"page":"209-212","source":"Crossref","is-referenced-by-count":10,"title":["Viterbi algorithm for detecting DDoS attacks"],"prefix":"10.1109","author":[{"given":"Wilson","family":"Bongiovanni","sequence":"first","affiliation":[]},{"given":"Adilson E.","family":"Guelfi","sequence":"additional","affiliation":[]},{"given":"Elvis","family":"Pontes","sequence":"additional","affiliation":[]},{"given":"A. A. A.","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Fen","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Sergio Takeo","family":"Kofuji","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"100","article-title":"Intrusion Detection by Time Series Analyzes with ARMAX\/GARCH Models","author":"forain","year":"2013","journal-title":"SBSeg B C Society Ed"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/UKSIM.2008.30"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"ref13","first-page":"513","article-title":"Dynamic programming: an overview","volume":"35","author":"sniedovich","year":"2006","journal-title":"Control and Cybernetics"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029211"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11590316_30"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.08.016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-003-0132-7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/3468.935043"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"year":"2010","key":"ref4","article-title":"Title 18 - Crimes and Criminal Procedure Part I - Crimes - Chapter 47 - Fraud and False Statements"},{"journal-title":"Technical Report Internet Activities Board","article-title":"RFC 1087 - Ethics and the Internet","year":"1989","key":"ref3"},{"key":"ref6","article-title":"Breaking the ddos attack chain","author":"harris","year":"2013","journal-title":"Institute of Software Research"},{"year":"1990","key":"ref5","article-title":"Office of the Queen's Printer for Scot&#x2013; &#x2013; land &#x2013;Computer Misuse Act 1990 - Section 3"},{"key":"ref8","first-page":"94","article-title":"Guide to Intrusion Detection and Prevention Systems (lDPS)","volume":"800","author":"scarfone","year":"2007","journal-title":"NIST Special Pub"},{"key":"ref7","first-page":"600","article-title":"Denial-of-Service detection in 6LoWPAN based internet of things","author":"kasinathan","year":"2013","journal-title":"WiMob IEEE"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.032210.00054"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2007.15"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.3"},{"article-title":"Detec&#x00E7;&#x00E3;o de fraudes em transa&#x00E7;&#x00F5;es financeiras via internet em tempo real","year":"2012","author":"kovach","key":"ref22"},{"key":"ref21","article-title":"Intrusion detection based on distance combination","author":"beauquier","year":"2007","journal-title":"CESSE"}],"event":{"name":"2015 IEEE 40th Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2015,10,26]]},"location":"Clearwater Beach, FL","end":{"date-parts":[[2015,10,29]]}},"container-title":["2015 IEEE 40th Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7360816\/7366232\/07366308.pdf?arnumber=7366308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T04:15:10Z","timestamp":1490415310000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7366308\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/lcn.2015.7366308","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}