{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:18Z","timestamp":1750306278339,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905159","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Denial of Service Attack Detection using Multivariate Correlation Analysis"],"prefix":"10.1145","author":[{"given":"N","family":"Hoque","sequence":"first","affiliation":[{"name":"Department of CSE, Tezpur University, Napaam, Assam"}]},{"given":"D. K.","family":"Bhattacharyya","sequence":"additional","affiliation":[{"name":"Department of CSE, Tezpur University, Napaam, Assam"}]},{"given":"J. K.","family":"Kalita","sequence":"additional","affiliation":[{"name":"Department of Computer Science, UCCS, University of Colorado, Colorado Springs"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.79"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2505468"},{"key":"e_1_3_2_1_3_1","unstructured":"K. Cup. Data. knowledge discovery in databases darpa archive 1999.  K. Cup. Data. knowledge discovery in databases darpa archive 1999."},{"key":"e_1_3_2_1_4_1","unstructured":"F. Cuppens F. Autrel A. Miege and S. Benferhat. Correlation in an intrusion detection process. In internet security communication workshop (SECI'02) pages 153--172 2002.  F. Cuppens F. Autrel A. Miege and S. Benferhat. Correlation in an intrusion detection process. In internet security communication workshop (SECI'02) pages 153--172 2002."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194894"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32129-0_34"},{"key":"e_1_3_2_1_7_1","unstructured":"P. Hick E. Aben K. Claffy and J. Polterock. The caida ddos attack 2007 dataset 2007.  P. Hick E. Aben K. Claffy and J. Polterock. The caida ddos attack 2007 dataset 2007."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.04.019"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2457491"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1460"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.08.001"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393216.2393249"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.09.010"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/3477.931536"},{"key":"e_1_3_2_1_15_1","first-page":"130","volume-title":"Security and Privacy, 2001. S&P 2001. Proceedings. 2001 IEEE Symposium on","author":"Lee W.","year":"2001"},{"volume-title":"The Internet Encyclopedia","year":"2003","author":"Ning P.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CONIELECOMP.2012.6189887"},{"volume-title":"DTIC Document","year":"2003","author":"Shyu M.-L.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00196-4"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.146"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2070845"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1017701"},{"key":"e_1_3_2_1_23_1","first-page":"856","volume-title":"ICML","volume":"3","author":"Yu L.","year":"2003"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905159","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905159","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:49Z","timestamp":1750221529000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905159"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":23,"alternative-id":["10.1145\/2905055.2905159","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905159","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}