{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:03Z","timestamp":1750306383344,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,7,20]],"date-time":"2016-07-20T00:00:00Z","timestamp":1468972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,7,20]]},"DOI":"10.1145\/2947626.2951956","type":"proceedings-article","created":{"date-parts":[[2016,7,12]],"date-time":"2016-07-12T12:11:05Z","timestamp":1468325465000},"page":"176-177","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Criteria and Indices of Computer Network Protection"],"prefix":"10.1145","author":[{"given":"Vladimir","family":"Vorobiev","sequence":"first","affiliation":[{"name":"SPIIRAS, St. Petersburg, Russia"}]},{"given":"Elena","family":"Evnevich","sequence":"additional","affiliation":[{"name":"SPIIRAS, St. Petersburg, Russia"}]},{"given":"Roza","family":"Fatkieva","sequence":"additional","affiliation":[{"name":"SPIIRAS, St. Petersburg, Russia"}]},{"given":"Ludmila","family":"Fedorchenko","sequence":"additional","affiliation":[{"name":"SPIIRAS, St. Petersburg, Russia"}]},{"given":"Dmitriy","family":"Levonevskiy","sequence":"additional","affiliation":[{"name":"SPIIRAS, St. Petersburg, Russia"}]}],"member":"320","published-online":{"date-parts":[[2016,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"et al","author":"Atiskov A.Yu.","year":"2012","unstructured":"Atiskov A.Yu. , Vorobiev V.I. , Fedorchenko L.N. et al . 2012 . Theory and Practice of Cryptography Solutions for Secure Information Systems. IGI Global, 701 E. Chocolate Ave. Hershey, PA 17033, USA. 402 p. (2012), 101--130. Atiskov A.Yu., Vorobiev V.I., Fedorchenko L.N. et al. 2012. Theory and Practice of Cryptography Solutions for Secure Information Systems. IGI Global, 701 E. Chocolate Ave. Hershey, PA 17033, USA. 402 p. (2012), 101--130."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2009.35"},{"volume-title":"An unsupervised approach for detecting DDoS attacks based on traffic-based metrics. Department of Electrical and Computer Engineering","author":"Lu W.","key":"e_1_3_2_1_3_1","unstructured":"Lu W. , Traore I. An unsupervised approach for detecting DDoS attacks based on traffic-based metrics. Department of Electrical and Computer Engineering , University of Victoria . Lu W., Traore I. An unsupervised approach for detecting DDoS attacks based on traffic-based metrics. Department of Electrical and Computer Engineering, University of Victoria."},{"key":"e_1_3_2_1_4_1","volume-title":"Oct.","author":"Babenko G.V.","year":"2011","unstructured":"Babenko G.V. , Belov S.V. TCP\/IP traffic analysis by means of the admissible threshold and deviation method as a means of detecting information security incidents. Web journal \"Technologies of technosphere security\", #5 (39) , Oct. 2011 . Babenko G.V., Belov S.V. TCP\/IP traffic analysis by means of the admissible threshold and deviation method as a means of detecting information security incidents. Web journal \"Technologies of technosphere security\", #5 (39), Oct. 2011."},{"volume-title":"Detection of application layer DDoS attacks using information theory based metrics. Department of Information Science and Technology","author":"Renuka Devi S.","key":"e_1_3_2_1_5_1","unstructured":"Renuka Devi S. , Yogesh P. Detection of application layer DDoS attacks using information theory based metrics. Department of Information Science and Technology , College of Engg. Guindy, Anna University , Chennai, India. Renuka Devi S., Yogesh P. Detection of application layer DDoS attacks using information theory based metrics. Department of Information Science and Technology, College of Engg. Guindy, Anna University, Chennai, India."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the IV Intern Research and Practice Conference European Science and Technology.","volume":"1","author":"Levonevskiy D.K.","year":"2013","unstructured":"Levonevskiy D.K. , Fatkieva R.R. Statistical research of traffic-based metrics for the purpose of DDoS attack detection . In Proceedings of the IV Intern Research and Practice Conference European Science and Technology. Vol. 1 , (Munich, April 10 th-11th , 2013 ). Vela Verlag Waldkraiburg, Munich, Germany, 259--268. Levonevskiy D.K., Fatkieva R.R. Statistical research of traffic-based metrics for the purpose of DDoS attack detection. In Proceedings of the IV Intern Research and Practice Conference European Science and Technology. Vol. 1, (Munich, April 10th-11th, 2013). Vela Verlag Waldkraiburg, Munich, Germany, 259--268."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the IV All Russian Conference on Mathematical Modeling and Computer Technologies in Interdisciplinary Research","author":"Evnevich E.L.","year":"2014","unstructured":"Evnevich E.L. , Levonevskiy D.K. , Fatkieva R.R. Traffic control under abnormal network performance . In Proceedings of the IV All Russian Conference on Mathematical Modeling and Computer Technologies in Interdisciplinary Research ( Irkutsk, Russia, June 30-- July 04, 2014 ), 28. Evnevich E.L., Levonevskiy D.K., Fatkieva R.R. Traffic control under abnormal network performance. In Proceedings of the IV All Russian Conference on Mathematical Modeling and Computer Technologies in Interdisciplinary Research (Irkutsk, Russia, June 30--July 04, 2014), 28."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of UGATU","author":"Tishina N.A.","year":"2010","unstructured":"Tishina N.A. , Dvorovoy I.G. , Soloviev N.A. Intrusion detection by means of wavelet analysis of network traffic . Proceedings of UGATU , Ufa , 2010 . Tishina N.A., Dvorovoy I.G., Soloviev N.A. Intrusion detection by means of wavelet analysis of network traffic. Proceedings of UGATU, Ufa, 2010."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Levonevskiy D.K. Fatkieva R.R. Research of combined DDoS attacks. Procs of SPIIRAS &numero; 1 (32) 199--209.  Levonevskiy D.K. Fatkieva R.R. Research of combined DDoS attacks. Procs of SPIIRAS &numero; 1 (32) 199--209.","DOI":"10.15622\/sp.32.12"},{"key":"e_1_3_2_1_10_1","volume-title":"Application of Daubechies wavelets for network anomaly detection. \/\/ Vestnik Buryatskogo gosudarstvennogo universiteta {Bull. of Buryat State Univ}","author":"Fatkieva R.R.","year":"2013","unstructured":"Fatkieva R.R. Application of Daubechies wavelets for network anomaly detection. \/\/ Vestnik Buryatskogo gosudarstvennogo universiteta {Bull. of Buryat State Univ} , 2013 . Fatkieva R.R. Application of Daubechies wavelets for network anomaly detection. \/\/ Vestnik Buryatskogo gosudarstvennogo universiteta {Bull. of Buryat State Univ}, 2013."}],"event":{"name":"SIN '16: 9th International Conference on Security of Information and Networks","acronym":"SIN '16","location":"Newark NJ USA"},"container-title":["Proceedings of the 9th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2947626.2951956","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2947626.2951956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:03Z","timestamp":1750223223000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2947626.2951956"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,20]]},"references-count":10,"alternative-id":["10.1145\/2947626.2951956","10.1145\/2947626"],"URL":"https:\/\/doi.org\/10.1145\/2947626.2951956","relation":{},"subject":[],"published":{"date-parts":[[2016,7,20]]},"assertion":[{"value":"2016-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}