{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:19:10Z","timestamp":1756383550838,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/lcnw.2015.7365905","type":"proceedings-article","created":{"date-parts":[[2015,12,28]],"date-time":"2015-12-28T21:30:27Z","timestamp":1451338227000},"page":"611-618","source":"Crossref","is-referenced-by-count":24,"title":["Feature selection for robust backscatter DDoS detection"],"prefix":"10.1109","author":[{"given":"Eray","family":"Balkanli","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]},{"given":"Malcolm I.","family":"Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The CAIDA UCSD Anonymized Internet Traces","year":"2014","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1162666.1162675"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2567561.2567568"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-68768-1_1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194894"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2012.6289291"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2014.23"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1656274.1656278","article-title":"The WEKA data mining software: an update","volume":"11","author":"mark","year":"2009","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2014.6927719"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2015.7208635"},{"article-title":"Telegram suffers from outage in Asia after DoS attack","year":"2015","author":"nambiar","key":"ref4"},{"journal-title":"The CAIDA UCSD Network Telescope Educational Dataset","year":"0","key":"ref28"},{"journal-title":"Dataset","article-title":"The CAIDA UCSD - DDoS Attack","year":"2007","key":"ref27"},{"key":"ref3","article-title":"The state of the internet","author":"akamai","year":"2013","journal-title":"report v 6 n 2"},{"key":"ref6","first-page":"1496","author":"michael","year":"2006","journal-title":"Practical Darknet Measurement"},{"journal-title":"Prolexic Technologies","article-title":"Prolexic Quarterly Global Ddos Attack Report Q1 2013","year":"2013","key":"ref5"},{"journal-title":"The CAIDA UCSD Anonymized Internet Traces","year":"2008","key":"ref29"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879149"},{"key":"ref7","article-title":"Characteristics of internet background radiation","author":"ruoming","year":"2004","journal-title":"Proceedings of the 4th ACM SIGCOMM conference on Internet Measurement"},{"journal-title":"NSFOCUS Ltd","article-title":"Mid-Year DDoS Threat Report 2013","year":"2013","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140320"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2014.7013367"},{"key":"ref22","article-title":"A comparative study on feature selection in text categorization","volume":"97","author":"yiming","year":"1997","journal-title":"ICML"},{"journal-title":"The UCSD Network Telescope","year":"0","key":"ref21"},{"article-title":"Correlation-based feature selection for machine learning. Diss","year":"1999","author":"hall","key":"ref24"},{"article-title":"ChiSquare Distribution","year":"2005","author":"henry oliver","key":"ref23"},{"journal-title":"The Caida Ucsd Backscatter-2008 Dataset","year":"2008","key":"ref26"},{"journal-title":"Circos","year":"0","key":"ref25"}],"event":{"name":"2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops)","start":{"date-parts":[[2015,10,26]]},"location":"Clearwater Beach, FL","end":{"date-parts":[[2015,10,29]]}},"container-title":["2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7360341\/7365758\/07365905.pdf?arnumber=7365905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T02:36:27Z","timestamp":1498271787000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7365905\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/lcnw.2015.7365905","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}