{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:51:43Z","timestamp":1761061903416,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,26]]},"DOI":"10.1109\/wincom59760.2023.10322885","type":"proceedings-article","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T19:07:27Z","timestamp":1700680047000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Usage of Machine Learning in DDOS Attack Detection"],"prefix":"10.1109","author":[{"given":"Adilzhan","family":"Slyamkhanov","sequence":"first","affiliation":[{"name":"Astana IT University,Department of Intelligent Systems and Cybersecurity,Astana,Kazakhstan"}]},{"given":"Zhanybek","family":"Bozbayev","sequence":"additional","affiliation":[{"name":"Astana IT University,Department of Intelligent Systems and Cybersecurity,Astana,Kazakhstan"}]},{"given":"Ayym","family":"Alzhanova","sequence":"additional","affiliation":[{"name":"Astana IT University,Department of Intelligent Systems and Cybersecurity,Astana,Kazakhstan"}]},{"given":"Artur","family":"Pan","sequence":"additional","affiliation":[{"name":"Astana IT University,Department of Intelligent Systems and Cybersecurity,Astana,Kazakhstan"}]},{"given":"Temirlan","family":"Ramazan","sequence":"additional","affiliation":[{"name":"Astana IT University,Department of Intelligent Systems and Cybersecurity,Astana,Kazakhstan"}]},{"given":"Leila","family":"Rzayeva","sequence":"additional","affiliation":[{"name":"Astana IT University,Department of Intelligent Systems and Cybersecurity,Astana,Kazakhstan"}]}],"member":"263","reference":[{"volume":"2023","volume-title":"Q1 2023 in Review: DDoS Attacks Report by StormWall","year":"2023","key":"ref1"},{"volume":"2023","article-title":"What is a Botnet?","year":"2023","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.12700\/APH.19.7.2022.7.12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.03.025"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2011.5716474"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.08.137"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.06.002"},{"issue":"6","key":"ref8","first-page":"185","article-title":"DDOS Attack Detection Using Machine Learning","volume":"7","author":"Ashutosh Nath","year":"2020","journal-title":"International Journal of Emerging Technologies and Innovative Research"},{"key":"ref9","first-page":"16","article-title":"Machine Learning DDoS Detection Using Stochastic Gradient Boosting","volume-title":"2020 7th International Conference on Computing for Sustainable Global Development (INDIACom)","author":"Parvinder Singh"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/1574749"},{"issue":"7","key":"ref11","article-title":"Detection of DDoS Attack Using Machine Learning Algorithms","volume":"9","author":"Nalayini","year":"2022","journal-title":"JETIR"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.26438\/ijcse\/v7i4.157166"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8469-5_5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.36548\/jismac.2022.1.003"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5402"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.021669"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2014.2371999"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/i-span.2018.00036"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-007-5019-5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1038\/nbt1206-1565"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2021.100031"},{"issue":"3","key":"ref22","first-page":"246","article-title":"International Journal of Information and Decision Sciences","volume":"12","author":"Priyanka","year":"2020","journal-title":"Decision tree classifier: a detailed survey"}],"event":{"name":"2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM)","start":{"date-parts":[[2023,10,26]]},"location":"Istanbul, Turkiye","end":{"date-parts":[[2023,10,28]]}},"container-title":["2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10322877\/10322879\/10322885.pdf?arnumber=10322885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T21:41:43Z","timestamp":1709415703000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10322885\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,26]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/wincom59760.2023.10322885","relation":{},"subject":[],"published":{"date-parts":[[2023,10,26]]}}}