{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T09:25:21Z","timestamp":1751448321835,"version":"3.38.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["111-2221-E-033-032-MY2,113-2221-E-033-056"],"award-info":[{"award-number":["111-2221-E-033-032-MY2,113-2221-E-033-056"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,1]]},"DOI":"10.1109\/tencon61640.2024.10902992","type":"proceedings-article","created":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T18:40:14Z","timestamp":1741200014000},"page":"632-635","source":"Crossref","is-referenced-by-count":1,"title":["Identification of DDoS Attacks Through SHAP-Based Feature Analysis and Transformer Models: A Multivariate Time Series Data Approach"],"prefix":"10.1109","author":[{"given":"Drixter Velayo","family":"Hernandez","sequence":"first","affiliation":[{"name":"Chung Yuan Christian University,Department of Electrical Engineering,Taoyuan,Taiwan"}]},{"given":"Meng-Ting","family":"Chen","sequence":"additional","affiliation":[{"name":"Chung Yuan Christian University,Department of Electrical Engineering,Taoyuan,Taiwan"}]},{"given":"Yu-Kuen","family":"Lai","sequence":"additional","affiliation":[{"name":"Chung Yuan Christian University,Department of Electrical Engineering,Taoyuan,Taiwan"}]}],"member":"263","reference":[{"key":"ref1","first-page":"109553","volume":"222","author":"De Neira","journal-title":"Distributed denial of service attack prediction: Challenges, open issues and opportunities"},{"key":"ref2","first-page":"103465","article-title":"Network intrusion detection based on the temporal convolutional model","volume":"135","author":"Lopes","journal-title":"vol"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/icp.2022.0605"},{"key":"ref4","first-page":"102587","article-title":"A DDoS attack detection and defense scheme using time-series analysis for SDN","volume":"54","author":"Fouladi","journal-title":"vol"},{"key":"ref5","first-page":"46 820","article-title":"Physical assessment of an SDN-based security framework for DDoS attack mitigation: Introducing the SDNSlowRate-DDoS dataset","volume":"11","author":"Yungaicela-Naula","journal-title":"vol"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10202500"},{"author":"Vaswani","key":"ref7","article-title":"Attention is all you need"},{"key":"ref8","first-page":"91","article-title":"Real time detection and classification of DDoS attacks using enhanced SVM with string kernels","volume-title":"2011 International Conference on Recent Trends in Information Technology (ICRTIT)","author":"Ramamoorthi"},{"key":"ref9","first-page":"161 908","article-title":"A new framework for DDoS attack detection and defense in SDN environment","volume":"8","author":"Tan","journal-title":"vol"},{"key":"ref10","first-page":"122666","article-title":"A comprehensive survey on applications of transformers for deep learning tasks","volume":"241","author":"Islam","journal-title":"vol"},{"key":"ref11","first-page":"1","article-title":"Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy","volume-title":"2019 International Carnahan Conference on Security Technology (ICCST)","author":"Sharafaldin"},{"author":"Lundberg","key":"ref12","article-title":"A unified approach to interpreting model predictions"}],"event":{"name":"TENCON 2024 - 2024 IEEE Region 10 Conference (TENCON)","start":{"date-parts":[[2024,12,1]]},"location":"Singapore, Singapore","end":{"date-parts":[[2024,12,4]]}},"container-title":["TENCON 2024 - 2024 IEEE Region 10 Conference (TENCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10902665\/10902666\/10902992.pdf?arnumber=10902992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T06:27:34Z","timestamp":1741242454000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10902992\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,1]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/tencon61640.2024.10902992","relation":{},"subject":[],"published":{"date-parts":[[2024,12,1]]}}}