{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:16Z","timestamp":1750306096484,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T00:00:00Z","timestamp":1512604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12,7]]},"DOI":"10.1145\/3155133.3155173","type":"proceedings-article","created":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T13:26:53Z","timestamp":1512998813000},"page":"278-285","source":"Crossref","is-referenced-by-count":3,"title":["FDDA"],"prefix":"10.1145","author":[{"given":"Tran Manh","family":"Thang","sequence":"first","affiliation":[{"name":"School of ICT, Hanoi University of Sci. and Tech"}]},{"given":"Khanh-Van","family":"Nguyen","sequence":"additional","affiliation":[{"name":"School of ICT, Hanoi Univeristy of Sci. and Tech"}]}],"member":"320","published-online":{"date-parts":[[2017,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"Information and Control (ICICIC), 2009 Fourth International Conference on. IEEE","author":"Jiang Wei","year":"2009"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDSO.2004.7"},{"key":"e_1_3_2_1_3_1","first-page":"229","article-title":"A survey of bots used for distributed denial of service attacks, New Approaches for Security, Privacy and Trust in Complex Environments","author":"Vrizlynn","year":"2007","journal-title":"Springer US"},{"journal-title":"Inc.","first-page":"2012","year":"2009","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Zhu Xiaojin and Andrew B. Goldberg. \"Introduction to semi-supervised learning.\" Synthesis lectures on artificial intelligence and machine learning 3.1. 2009 pp. 1--130.   Zhu Xiaojin and Andrew B. Goldberg. \"Introduction to semi-supervised learning.\" Synthesis lectures on artificial intelligence and machine learning 3.1. 2009 pp. 1--130.","DOI":"10.2200\/S00196ED1V01Y200906AIM006"},{"issue":"10","key":"e_1_3_2_1_6_1","first-page":"1901","article-title":"(2014). \"Predicting Application Layer DDoS Attacks Using Machine Learning Algorithms","volume":"8","author":"Umarani S.","journal-title":"International Scholarly and Scientific Research & Innovation"},{"first-page":"512","volume-title":"Jiawei Han and MichelineKamber, \"Data Mining Concepts and Techniques\".","year":"2006","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.08.008"},{"key":"e_1_3_2_1_9_1","unstructured":"S. Apale R. Kamble M. Ghodekar H. Nemade and R. Waghmode Defense mechanism for ddos attack through machine learning 2319-1163 pISSN: 2321-7308. Vol 03 Ocotber 2014.  S. Apale R. Kamble M. Ghodekar H. Nemade and R. Waghmode Defense mechanism for ddos attack through machine learning 2319-1163 pISSN: 2321-7308. Vol 03 Ocotber 2014."},{"key":"e_1_3_2_1_10_1","unstructured":"KDD Cup 1999. Online: http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html Ocotber 2007.  KDD Cup 1999. Online: http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html Ocotber 2007."},{"volume":"2","volume-title":"IAES International Journal of Artificial Intelligence (IJ-AI)","author":"Waguih Hoda","key":"e_1_3_2_1_11_1"},{"volume-title":"International Journal of Computer, Electrical. Automation, Control and Information Engineering, Vol:4, No:3","year":"2010","author":"Farid Dewan Md.","key":"e_1_3_2_1_12_1"},{"issue":"37","key":"e_1_3_2_1_13_1","article-title":"Research Document Search using Elastic Search","volume":"9","author":"Vadivu R.","year":"2016","journal-title":"Indian Journal of Science and Technology"},{"key":"e_1_3_2_1_14_1","first-page":"226","volume-title":"Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining","author":"Ester M.","year":"1996"},{"key":"e_1_3_2_1_15_1","first-page":"487","volume-title":"Proc. 1994 Int'l Conf. VLDB","author":"Srikant R.","year":"1994"}],"event":{"name":"SoICT 2017: The Eighth International Symposium on Information and Communication Technology","sponsor":["SOICT School of Information and Communication Technology - HUST","NAFOSTED The National Foundation for Science and Technology Development"],"location":"Nha Trang City Viet Nam","acronym":"SoICT 2017"},"container-title":["Proceedings of the Eighth International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3155133.3155173","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3155133.3155173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:28Z","timestamp":1750217428000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3155133.3155173"}},"subtitle":["A Framework For Fast Detecting Source Attack In Web Application DDoS Attack"],"short-title":[],"issued":{"date-parts":[[2017,12,7]]},"references-count":15,"alternative-id":["10.1145\/3155133.3155173","10.1145\/3155133"],"URL":"https:\/\/doi.org\/10.1145\/3155133.3155173","relation":{},"subject":[],"published":{"date-parts":[[2017,12,7]]}}}