{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:12:47Z","timestamp":1740100367328,"version":"3.37.3"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,6]]},"DOI":"10.1109\/nof52522.2021.9609918","type":"proceedings-article","created":{"date-parts":[[2021,11,18]],"date-time":"2021-11-18T01:10:06Z","timestamp":1637197806000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["AnubisFlow: A Feature Extractor for Distributed Denial of Service Attack Classification"],"prefix":"10.1109","author":[{"given":"Alan","family":"Barzilay","sequence":"first","affiliation":[]},{"given":"Caio L.","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Nogueira","sequence":"additional","affiliation":[]},{"given":"Daniel M.","family":"Batista","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Hirata","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"journal-title":"Anubis A Tool for Feature Extraction and DDoS Attack Classification","year":"0","author":"barzilay","key":"ref11"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"5344e","DOI":"10.1002\/cpe.5344","article-title":"Toward a Monitoring and Threat Detection System based on Stream Processing as a Virtual Network Function for Big Data","volume":"31","author":"andreoni lopez","year":"2019","journal-title":"Concurrency and Computation Practice and Experience"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974293"},{"key":"ref14","article-title":"DARPA-2009 Intrusion Detection Dataset Report","author":"gharaibeh","year":"2014","journal-title":"Tech Rep"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INCOS.2009.34"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2002.1189011"},{"key":"ref17","first-page":"1530","article-title":"Detecting SYN Flooding Attacks","author":"wang","year":"2002","journal-title":"Proceedings Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies"},{"key":"ref18","first-page":"1659","article-title":"DDoS Attack Detection Method using Cluster Analysis. Expert Systems with Applications","volume":"34","author":"lee","year":"2008"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258459"},{"article-title":"DDoS Attack that Disrupted Internet was Largest of its Kind in History, Experts Say","year":"0","author":"woolf","key":"ref4"},{"journal-title":"Dyn Analysis Summary of Friday October 21 Attack","year":"0","author":"hilton","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2018.8554590"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CINE.2015.47"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480542"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2018.8436643"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3020507"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref20","article-title":"SCAPY-A Powerful Interactive Packet Manipulation Program","author":"rohith","year":"2018","journal-title":"2018 International Conference on Networking Embedded and Wireless Systems (ICNEWS)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000104"},{"key":"ref21","first-page":"2825","article-title":"Scikit-learn: Machine Learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"}],"event":{"name":"2021 12th International Conference on Network of the Future (NoF)","start":{"date-parts":[[2021,10,6]]},"location":"Coimbra, Portugal","end":{"date-parts":[[2021,10,8]]}},"container-title":["2021 12th International Conference on Network of the Future (NoF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9609799\/9609700\/09609918.pdf?arnumber=9609918","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:51:57Z","timestamp":1652201517000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9609918\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/nof52522.2021.9609918","relation":{},"subject":[],"published":{"date-parts":[[2021,10,6]]}}}