{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:41Z","timestamp":1750307681445,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,21]],"date-time":"2009-06-21T00:00:00Z","timestamp":1245542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002855","name":"Ministry of Science and Technology of the People's Republic of China","doi-asserted-by":"publisher","award":["2007AA01Z210"],"award-info":[{"award-number":["2007AA01Z210"]}],"id":[{"id":"10.13039\/501100002855","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,21]]},"DOI":"10.1145\/1582379.1582403","type":"proceedings-article","created":{"date-parts":[[2009,8,4]],"date-time":"2009-08-04T13:38:06Z","timestamp":1249393086000},"page":"106-110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["A prediction-based detection algorithm against distributed denial-of-service attacks"],"prefix":"10.1145","author":[{"given":"Guoxing","family":"Zhang","sequence":"first","affiliation":[{"name":"South China University of Technology, China"}]},{"given":"Shengming","family":"Jiang","sequence":"additional","affiliation":[{"name":"University of Glamorgan, UK and South China University of Technology, China"}]},{"given":"Gang","family":"Wei","sequence":"additional","affiliation":[{"name":"South China University of Technology, China"}]},{"given":"Quansheng","family":"Guan","sequence":"additional","affiliation":[{"name":"South China University of Technology"}]}],"member":"320","published-online":{"date-parts":[[2009,6,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.10"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2007.157"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"P. Ferguson and D. Senie \"Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing \" IRFC 2267 January 1998.   P. Ferguson and D. Senie \"Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing \" IRFC 2267 January 1998.","DOI":"10.17487\/rfc2267"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2005.99"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571724"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"J. Mirkovic and P. Reiher \"D-WARD: A Source-End Defence against Flooding Denial-of-Service Attacks \" IEEE Computer Society Jury 2005.  J. Mirkovic and P. Reiher \"D-WARD: A Source-End Defence against Flooding Denial-of-Service Attacks \" IEEE Computer Society Jury 2005.","DOI":"10.1109\/TDSC.2005.35"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.34"},{"key":"e_1_3_2_1_9_1","unstructured":"Y. Kim W. C. Lau and M. C. Chauah \"Packet Score: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks \" IEEE Computer Society May 2006.  Y. Kim W. C. Lau and M. C. Chauah \"Packet Score: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks \" IEEE Computer Society May 2006."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383060"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.5"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.880180"},{"key":"e_1_3_2_1_13_1","unstructured":"G. E. P. Box G. M. Jenkins and G. C. Reinsel \"Time Series Analysis: Forecasting and Control(edition 3) \" POSTS and TELECOM PRESSS 2005.   G. E. P. Box G. M. Jenkins and G. C. Reinsel \"Time Series Analysis: Forecasting and Control(edition 3) \" POSTS and TELECOM PRESSS 2005."},{"key":"e_1_3_2_1_14_1","unstructured":"\"The Network Simulator NS-2 \" \"http:\/\/www.isi.edu\/nsnam\/ns\/.\"  \"The Network Simulator NS-2 \" \"http:\/\/www.isi.edu\/nsnam\/ns\/.\""}],"event":{"name":"IWCMC '09: 2009 International Wireless Communications and Mobile Computing Conference","sponsor":["ACM Association for Computing Machinery","Wiley-Blackwell","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGDOC ACM Special Interest Group for Design of Communications"],"location":"Leipzig Germany","acronym":"IWCMC '09"},"container-title":["Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1582379.1582403","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1582379.1582403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:46Z","timestamp":1750253386000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1582379.1582403"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,21]]},"references-count":14,"alternative-id":["10.1145\/1582379.1582403","10.1145\/1582379"],"URL":"https:\/\/doi.org\/10.1145\/1582379.1582403","relation":{},"subject":[],"published":{"date-parts":[[2009,6,21]]},"assertion":[{"value":"2009-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}