{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T21:02:02Z","timestamp":1763154122468,"version":"3.45.0"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/tdsc.2025.3590197","type":"journal-article","created":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T18:01:57Z","timestamp":1752775317000},"page":"6748-6766","source":"Crossref","is-referenced-by-count":0,"title":["Developing Attack Detection Models for Microservice Applications: A Comprehensive Framework and Its Illustration and Validation on DoS Attacks"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9984-8559","authenticated-orcid":false,"given":"Jessica","family":"Castro","sequence":"first","affiliation":[{"name":"University of Coimbra, CISUC\/LASI - Centre for Informatics and Systems of the University of Coimbra, Department of Informatics Engineering, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0011-9901","authenticated-orcid":false,"given":"Nuno","family":"Laranjeiro","sequence":"additional","affiliation":[{"name":"University of Coimbra, CISUC\/LASI - Centre for Informatics and Systems of the University of Coimbra, Department of Informatics Engineering, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4683-672X","authenticated-orcid":false,"given":"Katerina","family":"Goseva-Popstojanova","sequence":"additional","affiliation":[{"name":"Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5103-8541","authenticated-orcid":false,"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of North Carolina at Charlotte, Charlotte, NC, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3305687"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102728"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111061"},{"article-title":"DDoS threat report for 2023 Q4","year":"2024","author":"Pacheco","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3361525.3361543"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4603"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3543810"},{"issue":"323","key":"ref8","first-page":"1","article-title":"Oecd framework for the classification of AI EUR","volume-title":"OECD Digit. Economy Papers","volume":"2021","year":"2022"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2018.00030"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC50251.2020.00014"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3569902.3569916"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS60048.2023.00076"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3615366.3615377"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3380786.3391395"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05063-4_42"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9010064"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111917"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS55610.2022.00062"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-024-09918-1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2024.112142"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS53863.2021.00061"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS56106.2022.9919994"},{"key":"ref23","first-page":"323","article-title":"Benchmarking microservice systems for software engineering research","volume-title":"Proc. 40th Int. Conf. Softw. Eng.: Comput.","author":"Zhou"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2856127"},{"year":"2021","key":"ref25","article-title":"2021 DDoS threat landscape report"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09910-y"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111906"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CEC45853.2021.9504761"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2478\/cait-2019-0001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/1283472"},{"year":"2024","key":"ref31","article-title":"Pandas 2.2.2 documentation \u2014 pandas.dataframe.bfill"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00021"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/9781119256489"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11242243\/11082675.pdf?arnumber=11082675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T21:00:54Z","timestamp":1763154054000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11082675\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":33,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3590197","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}