{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T14:46:42Z","timestamp":1743778002003,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T00:00:00Z","timestamp":1702512000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T00:00:00Z","timestamp":1702512000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,14]]},"DOI":"10.1109\/wetice57085.2023.10501947","type":"proceedings-article","created":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T17:20:39Z","timestamp":1713460839000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["DDoS Detection Based on Hardware Performance Counters Selection"],"prefix":"10.1109","author":[{"given":"Camila","family":"Dantas","sequence":"first","affiliation":[{"name":"Universidade Federal de Pernambuco,Centro de Inform&#x00E1;tica,Recife,Brazil"}]},{"given":"Pablo","family":"Pessoa","sequence":"additional","affiliation":[{"name":"Universidade Federal de Pernambuco,Centro de Inform&#x00E1;tica,Recife,Brazil"}]},{"given":"Jo\u00e3o","family":"Ferreira","sequence":"additional","affiliation":[{"name":"Col&#x00E9;gio Agr&#x00ED;cola Dom Agostinho Ikas da Universidade Federal Rural de Pernambuco,Recife,Brazil"}]},{"given":"Paulo","family":"Maciel","sequence":"additional","affiliation":[{"name":"Universidade Federal de Pernambuco,Centro de Inform&#x00E1;tica,Recife,Brazil"}]},{"given":"Jamilson","family":"Dantas","sequence":"additional","affiliation":[{"name":"Universidade Federal de Pernambuco,Centro de Inform&#x00E1;tica,Recife,Brazil"}]}],"member":"263","reference":[{"year":"2023","key":"ref1","article-title":"Largest ddos attacks ever reported by google, cloudflare and aws"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA51294.2020.00101"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465828"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102434"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED51717.2021.9424330"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PMBS56514.2022.00011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS51385.2021.00041"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SIU55565.2022.9864872"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS48704.2020.9184684"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2019.00130"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009733"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3149745"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2924549"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474053"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER49012.2020.00015"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3203217.3203264"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00251"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700556"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0623-3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud-EdgeCom49738.2020.00019"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3005781"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS52814.2021.9486701"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1237\/3\/032040"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8012568"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2016.115"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2021.3063338"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485970"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056070"},{"key":"ref29","first-page":"3","article-title":"Ensemble learning for low-level hardware-supported malware detection","volume-title":"Proceedings of the 18th International Symposium on Research in Attacks, Intrusions, and Defenses - Volume 9404, ser. RAID 2015","author":"Khasawneh"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HOST49136.2021.9702291"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICICyTA57421.2022.10038126"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS48704.2020.9184539"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2014.6799664"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2019.8854399"},{"key":"ref35","first-page":"3739","article-title":"Data mining techniques in dos\/ddos attack detection: A literature review","volume":"18","author":"Adhi Tama","year":"2015","journal-title":"INFORMATION"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS50870.2020.9159708"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2020.3001564"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49033.2022.9700569"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917532"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0623-3"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2019.8685519"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2019.00090"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3173149"}],"event":{"name":"2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","start":{"date-parts":[[2023,12,14]]},"location":"Paris, France","end":{"date-parts":[[2023,12,16]]}},"container-title":["2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10477677\/10477776\/10501947.pdf?arnumber=10501947","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T05:02:20Z","timestamp":1726203740000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10501947\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,14]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/wetice57085.2023.10501947","relation":{},"subject":[],"published":{"date-parts":[[2023,12,14]]}}}