{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T22:44:28Z","timestamp":1746139468888,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/ssci.2017.8285203","type":"proceedings-article","created":{"date-parts":[[2018,2,12]],"date-time":"2018-02-12T17:52:06Z","timestamp":1518457926000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["Evolving cauchy possibilistic clustering and its application to large-scale cyberattack monitoring"],"prefix":"10.1109","author":[{"given":"Igor","family":"Skrjanc","sequence":"first","affiliation":[]},{"given":"Seiichi","family":"Ozawa","sequence":"additional","affiliation":[]},{"given":"Dejan","family":"Dovzan","sequence":"additional","affiliation":[]},{"given":"Ban","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Junji","family":"Nakazato","sequence":"additional","affiliation":[]},{"given":"Jumpei","family":"Shimamura","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2004.840099"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2003.11.009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WAC.2006.376056"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IS.2010.5548369"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EAIS.2011.5945926"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/9780470569962.ch2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISIC.2014.6967642"},{"key":"ref17","first-page":"173","article-title":"Problems of identification of cloud-based fuzzy evolving systems","author":"blazic","year":"2016","journal-title":"Artificial Intelligence and Soft Computing LNCS"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.06.044"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2014.2379252"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2010.5584088"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2003.817053"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2008.06.019"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/EALS.2014.7009498"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18087-3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2014.2379252"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s12530-010-9025-7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/91.227387"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470569962.ch12"},{"key":"ref20","first-page":"62","article-title":"DDoS detection system based on data mining","volume":"79","author":"zhong","year":"2010","journal-title":"Proceedings of the Second International Symposium on Networking and Network Security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E92.D.787"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330135"},{"key":"ref24","article-title":"Network telescopes: Technical report","author":"moore","year":"2004","journal-title":"Technical Report from Cooperative Association for Internet Data Analysis"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35362-8_17"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2015.7280818"}],"event":{"name":"2017 IEEE Symposium Series on Computational Intelligence (SSCI)","start":{"date-parts":[[2017,11,27]]},"location":"Honolulu, HI","end":{"date-parts":[[2017,12,1]]}},"container-title":["2017 IEEE Symposium Series on Computational Intelligence (SSCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8267146\/8280782\/08285203.pdf?arnumber=8285203","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,16]],"date-time":"2018-03-16T12:02:07Z","timestamp":1521201727000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8285203\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ssci.2017.8285203","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}