{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:49:37Z","timestamp":1760597377208,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,4,13]],"date-time":"2009-04-13T00:00:00Z","timestamp":1239580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["IST-225407"],"award-info":[{"award-number":["IST-225407"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,4,13]]},"DOI":"10.1145\/1558607.1558628","type":"proceedings-article","created":{"date-parts":[[2009,6,30]],"date-time":"2009-06-30T13:10:54Z","timestamp":1246367454000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Defending financial infrastructures through early warning systems"],"prefix":"10.1145","author":[{"given":"Giorgia","family":"Lodi","sequence":"first","affiliation":[{"name":"Sapienza University of Rome"}]},{"given":"Leonardo","family":"Querzoni","sequence":"additional","affiliation":[{"name":"Sapienza University of Rome"}]},{"given":"Roberto","family":"Baldoni","sequence":"additional","affiliation":[{"name":"Sapienza University of Rome"}]},{"given":"Mirco","family":"Marchetti","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Modena e Reggio Emilia"}]},{"given":"Michele","family":"Colajanni","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Modena e Reggio Emilia"}]},{"given":"Vita","family":"Bortnikov","sequence":"additional","affiliation":[{"name":"IBM Haifa"}]},{"given":"Gregory","family":"Chockler","sequence":"additional","affiliation":[{"name":"IBM Haifa"}]},{"given":"Eliezer","family":"Dekel","sequence":"additional","affiliation":[{"name":"IBM Haifa"}]},{"given":"Gennady","family":"Laventman","sequence":"additional","affiliation":[{"name":"IBM Haifa"}]},{"given":"Alexey","family":"Roytman","sequence":"additional","affiliation":[{"name":"IBM Haifa"}]}],"member":"320","published-online":{"date-parts":[[2009,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/hadoop.apache.org\/  http:\/\/hadoop.apache.org\/"},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/www.comifin.eu\/  http:\/\/www.comifin.eu\/"},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/www.jaql.org\/  http:\/\/www.jaql.org\/"},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/www.json.org\/  http:\/\/www.json.org\/"},{"key":"e_1_3_2_1_5_1","unstructured":"System S http:\/\/domino.research.ibm.com\/comm\/research_projects.nsf\/pages\/esps.index.html  System S http:\/\/domino.research.ibm.com\/comm\/research_projects.nsf\/pages\/esps.index.html"},{"key":"e_1_3_2_1_6_1","unstructured":"AT&T \"Protect your business by preventing Internet attacks\" September 2004 http:\/\/www.corp.att.com\/emea\/docs\/pb\/internet_protect.pdf  AT&T \"Protect your business by preventing Internet attacks\" September 2004 http:\/\/www.corp.att.com\/emea\/docs\/pb\/internet_protect.pdf"},{"key":"e_1_3_2_1_7_1","unstructured":"ChronoPay Suffers DDoS Attack http:\/\/www.kommersant.com\/p876309\/r_500\/electronic_payment_processing  ChronoPay Suffers DDoS Attack http:\/\/www.kommersant.com\/p876309\/r_500\/electronic_payment_processing"},{"key":"e_1_3_2_1_8_1","unstructured":"FBI investigates 9 Million ATM scam http:\/\/www.myfoxny.com\/dpp\/news\/090202_FBI_Investigates_9_Million_ATM_Scam  FBI investigates 9 Million ATM scam http:\/\/www.myfoxny.com\/dpp\/news\/090202_FBI_Investigates_9_Million_ATM_Scam"},{"key":"e_1_3_2_1_9_1","unstructured":"Liberty Reserve is down under DDoS attack http:\/\/www.ecommerce-journal.com\/news\/libertyreserve_what_is_going_on  Liberty Reserve is down under DDoS attack http:\/\/www.ecommerce-journal.com\/news\/libertyreserve_what_is_going_on"},{"key":"e_1_3_2_1_10_1","unstructured":"National Australia Bank hit by DDoS attack http:\/\/www.zdnet.com.au\/news\/security\/soa\/National-Australia-Bank-hit-by-DDoS-attack\/0 130061744 339271790 00.htm  National Australia Bank hit by DDoS attack http:\/\/www.zdnet.com.au\/news\/security\/soa\/National-Australia-Bank-hit-by-DDoS-attack\/0 130061744 339271790 00.htm"},{"key":"e_1_3_2_1_11_1","unstructured":"Netcraft Payment Gateway StormPay Battling Sustained DDoS Attack http:\/\/news.netcraft.com\/ 10th February 2006  Netcraft Payment Gateway StormPay Battling Sustained DDoS Attack http:\/\/news.netcraft.com\/ 10th February 2006"},{"key":"e_1_3_2_1_12_1","unstructured":"Update: Credit card firm hit by DDoS attack http:\/\/www.computerworld.com\/securitytopics\/security\/story\/0 10801 96099 00.html  Update: Credit card firm hit by DDoS attack http:\/\/www.computerworld.com\/securitytopics\/security\/story\/0 10801 96099 00.html"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266894.1266898"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2008.15"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"N. Bansal R. Bhagwan N. Jain Y. Park D. S. Turaga C. Venkaramani \"Towards Optimal Operator Placement in Partial-Fault Tolerant Applications\" IEEE Infocom 2008 April Phoenix AZ  N. Bansal R. Bhagwan N. Jain Y. Park D. S. Turaga C. Venkaramani \"Towards Optimal Operator Placement in Partial-Fault Tolerant Applications\" IEEE Infocom 2008 April Phoenix AZ","DOI":"10.1109\/INFOCOM.2008.189"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. 46th Annual Allerton Conference on Communication, Control, and Computing","author":"Bickson D.","year":"2008","unstructured":"D. Bickson , Y. Tock , O. Shental , D. Dolev , \"Polynomial Linear Programming with Gaussian Belief Propagation\" , In Proc. 46th Annual Allerton Conference on Communication, Control, and Computing , Monticello, IL, USA , September 2008 . D. Bickson, Y. Tock, O. Shental, D. Dolev, \"Polynomial Linear Programming with Gaussian Belief Propagation\", In Proc. 46th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, September 2008."},{"key":"e_1_3_2_1_17_1","volume-title":"LADIS","author":"Chockler G.","year":"2008","unstructured":"G. Chockler , R. Melamed , Y. Tock , R. Vitenberg \" SpiderCast : An Interest-Aware Unstructured Overlay for Topic-Based Publish\/Subscribe \", LADIS 2008 . G. Chockler, R. Melamed, Y. Tock, R. Vitenberg \"SpiderCast: An Interest-Aware Unstructured Overlay for Topic-Based Publish\/Subscribe\", LADIS 2008."},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of ICASSP","author":"Fu F.","year":"2007","unstructured":"F. Fu , D. S. Turaga , O. Verscheure , M. Van der Schaar, and L. Amini, \"Configuring networked classifiers in distributed and resource constrained stream processing systems \", In Proc. of ICASSP 2007 . F. Fu, D. S. Turaga, O. Verscheure, M. Van der Schaar, and L. Amini, \"Configuring networked classifiers in distributed and resource constrained stream processing systems\", In Proc. of ICASSP 2007."},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. of DEBS'08 (fast abstract)","author":"Chockler G.","year":"2008","unstructured":"Girdzijauskas, G. Chockler , Melamed, Y. Tock . \"Gravity : An Interest-Aware Publish\/Subscribe System Based on Structured Overlays \". In Proc. of DEBS'08 (fast abstract) , Rome , July 2008 . Girdzijauskas, G. Chockler, Melamed, Y. Tock. \"Gravity: An Interest-Aware Publish\/Subscribe System Based on Structured Overlays\". In Proc. of DEBS'08 (fast abstract), Rome, July 2008."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2008.07.011"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. of HOTNETS '08","author":"Vigfusson Y.","year":"2008","unstructured":"Y. Vigfusson , H. Abu-Libdeh , M. Balakrishnan , K. Birman , Y. Tock , \" Dr. Multicast : Rx for Datacenter Communication Scalability \", In Proc. of HOTNETS '08 2008 . Y. Vigfusson, H. Abu-Libdeh, M. Balakrishnan, K. Birman, Y. Tock, \"Dr. Multicast: Rx for Datacenter Communication Scalability\", In Proc. of HOTNETS '08 2008."}],"event":{"name":"CSIIRW '09: Fifth Cyber Security and Information Intelligence Research Workshop","acronym":"CSIIRW '09","location":"Oak Ridge Tennessee USA"},"container-title":["Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1558607.1558628","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1558607.1558628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:57Z","timestamp":1750253397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1558607.1558628"}},"subtitle":["the intelligence cloud approach"],"short-title":[],"issued":{"date-parts":[[2009,4,13]]},"references-count":21,"alternative-id":["10.1145\/1558607.1558628","10.1145\/1558607"],"URL":"https:\/\/doi.org\/10.1145\/1558607.1558628","relation":{},"subject":[],"published":{"date-parts":[[2009,4,13]]},"assertion":[{"value":"2009-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}