{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T12:16:18Z","timestamp":1763036178517},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["EURASIP J. Adv. Signal Process."],"published-print":{"date-parts":[[2006,12]]},"DOI":"10.1155\/2007\/90312","type":"journal-article","created":{"date-parts":[[2006,11,16]],"date-time":"2006-11-16T07:14:30Z","timestamp":1163661270000},"source":"Crossref","is-referenced-by-count":6,"title":["Dynamic Modeling of Internet Traffic for Intrusion Detection"],"prefix":"10.1186","volume":"2007","author":[{"given":"Khushboo","family":"Shah","sequence":"first","affiliation":[]},{"given":"Edmond","family":"Jonckheere","sequence":"additional","affiliation":[]},{"given":"Stephan","family":"Bohacek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,10,19]]},"reference":[{"issue":"12","key":"2133_CR1","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/6.887597","volume":"37","author":"S Kent","year":"2000","unstructured":"Kent S: On the trail of intrusions into information systems. IEEE Spectrum 2000,37(12):52-56. 10.1109\/6.887597","journal-title":"IEEE Spectrum"},{"key":"2133_CR2","volume-title":"Proceedings of the 10th USENIX Security Symposium","author":"D Moore","year":"2001","unstructured":"Moore D, Voelker G, Savage S: Inferring internet denial of service activity. Proceedings of the 10th USENIX Security Symposium, August 2001, Washington, DC, USA"},{"issue":"23-24","key":"2133_CR3","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V Paxson","year":"1999","unstructured":"Paxson V: Bro: a system for detecting network intruders in real-time. IEEE Computer Networks 1999,31(23-24):2435-2463. 10.1016\/S1389-1286(99)00112-7","journal-title":"IEEE Computer Networks"},{"key":"2133_CR4","first-page":"229","volume-title":"Proceedings of the USENIX LISA Conference on System Administration","author":"M Roesch","year":"1999","unstructured":"Roesch M: Snort-lightweight intrusion detection for networks. Proceedings of the USENIX LISA Conference on System Administration, November 1999, Seattle, Wash, USA 229-238."},{"issue":"1-2","key":"2133_CR5","doi-asserted-by":"crossref","first-page":"105","DOI":"10.3233\/JCS-2002-101-205","volume":"10","author":"S Staniford","year":"2002","unstructured":"Staniford S, Hoagland JA, McAlerney JM: Practical automated detection of stealthy portscans. Journal of Computer Security 2002,10(1-2):105-136.","journal-title":"Journal of Computer Security"},{"key":"2133_CR6","volume-title":"Detection of Abrupt Changes: Theory and Application","author":"M Basseville","year":"1993","unstructured":"Basseville M, Nikiforov I: Detection of Abrupt Changes: Theory and Application. Prentice Hall, Englewood Cliffs, NJ, USA; 1993."},{"issue":"4","key":"2133_CR7","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1109\/TDSC.2004.34","volume":"1","author":"H Wang","year":"2004","unstructured":"Wang H, Zhang D, Shin KG: Change-point monitoring for the detection of DoS attacks. IEEE Transactions on Dependable and Secure Computing 2004,1(4):193-208. 10.1109\/TDSC.2004.34","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"2133_CR8","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1109\/GLOCOM.2004.1378372","volume":"4","author":"VA Siris","year":"2004","unstructured":"Siris VA, Papagalou F: Application of anomaly detection algorithms for detecting SYN flooding attacks. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '04), November-December 2004, Dallas, Tex, USA 4: 2050-2054.","journal-title":"Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '04), November-"},{"key":"2133_CR9","volume-title":"Proceedings of the ACM CCS Workshop on Rapid Malcode (WORM '04)","author":"C Wong","year":"2004","unstructured":"Wong C, Bielski S, McCune JM, Wang C: A study of mass-mailing worms. Proceedings of the ACM CCS Workshop on Rapid Malcode (WORM '04), October 2004, Washington, DC, USA"},{"key":"2133_CR10","volume-title":"Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS '05)","author":"D Whyte","year":"2005","unstructured":"Whyte D, Kranakis E, van Oorschot PC: DNS-based detection of scanning worms in an enterprise network. Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS '05), February 2005, San Diego, Calif, USA"},{"key":"2133_CR11","volume-title":"Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC '05)","author":"D Whyte","year":"2005","unstructured":"Whyte D, Kranakis E, van Oorschot PC: ARP-based detection of scanning worms within an enterprise network. Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC '05), December 2005, Tucson, Ariz, USA"},{"key":"2133_CR12","first-page":"312","volume-title":"Proceedings of the IEEE International Conference on Network Protocols (ICNP '02)","author":"J Mirkovic","year":"2002","unstructured":"Mirkovic J, Prier G, Reiher PL: Attacking DDoS at the source. Proceedings of the IEEE International Conference on Network Protocols (ICNP '02), November 2002, Paris, France 312-321."},{"key":"2133_CR13","first-page":"1619","volume":"2","author":"K Shah","year":"2003","unstructured":"Shah K, Bohacek S, Jonckheere E: On the predictability of data network traffic. Proceedings of the American Control Conference (ACC '03), June 2003, Denver, Colo, USA 2: 1619-1624.","journal-title":"Proceedings of the American Control Conference (ACC '03)"},{"issue":"4","key":"2133_CR14","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1093\/comjnl\/42.4.270","volume":"42","author":"CS Wallace","year":"1999","unstructured":"Wallace CS, Dowe DL: Minimum message length and Kolmogorov complexity. The Computer Journal 1999,42(4):270-283. 10.1093\/comjnl\/42.4.270","journal-title":"The Computer Journal"},{"issue":"12","key":"2133_CR15","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1109\/TAC.1985.1103864","volume":"30","author":"E Jonckheere","year":"1985","unstructured":"Jonckheere E, Helton J: Power spectrum reduction by optimal hankel norm approximation of the phase of the outer spectral factor. IEEE Transactions on Automatic Control 1985,30(12):1192-1201. 10.1109\/TAC.1985.1103864","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"6","key":"2133_CR16","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1070\/RM1970v025n06ABEH001269","volume":"25","author":"A Zvonkin","year":"1970","unstructured":"Zvonkin A, Levin L: The complexity of finite objects and the development of the concepts of information and randomness by means of the theory of algorithms. Russian Mathematical Surveys 1970,25(6):83-124. 10.1070\/RM1970v025n06ABEH001269","journal-title":"Russian Mathematical Surveys"},{"issue":"3","key":"2133_CR17","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1109\/TIT.2002.808135","volume":"49","author":"DM Sow","year":"2003","unstructured":"Sow DM, Eleftheriadis A: Complexity distortion theory. IEEE Transactions on Information Theory 2003,49(3):604-608. 10.1109\/TIT.2002.808135","journal-title":"IEEE Transactions on Information Theory"},{"key":"2133_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-4385-2","volume-title":"A Course in Mathematical Logic","author":"YI Manin","year":"1977","unstructured":"Manin YI: A Course in Mathematical Logic. Springer, New York, NY, USA; 1977."},{"issue":"1","key":"2133_CR19","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1137\/0313010","volume":"13","author":"H Akaike","year":"1975","unstructured":"Akaike H: Markovian representation of stochastic processes by canonical variables. SIAM Journal on Control 1975,13(1):162-173. 10.1137\/0313010","journal-title":"SIAM Journal on Control"},{"key":"2133_CR20","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1080\/01621459.1985.10478157","volume":"80","author":"L Breiman","year":"1985","unstructured":"Breiman L, Friedman JH: Estimating optimal transformations for multiple regression and correlation. Journal of the American Statistical Association 1985, 80: 580-619. 10.2307\/2288473","journal-title":"Journal of the American Statistical Association"},{"key":"2133_CR21","volume-title":"Introduction to the Theory of Computation","author":"M Sipser","year":"1997","unstructured":"Sipser M: Introduction to the Theory of Computation. PWS, Boston, Mass, USA; 1997."},{"key":"2133_CR22","volume-title":"Qualitative Theory of Differential Equations","author":"VV Nemytskii","year":"1989","unstructured":"Nemytskii VV, Stepanov VV: Qualitative Theory of Differential Equations. Dover, New York, NY, USA; 1989."},{"issue":"5","key":"2133_CR23","doi-asserted-by":"publisher","first-page":"1257","DOI":"10.1088\/0951-7715\/10\/5\/012","volume":"10","author":"F Brini","year":"1997","unstructured":"Brini F, Siboni S, Turchetti G, Vaienti S:Decay of correlations for the automorphism of the torus. Nonlinearity 1997,10(5):1257-1268. 10.1088\/0951-7715\/10\/5\/012","journal-title":"Nonlinearity"},{"key":"2133_CR24","unstructured":"Haydn N, Jonckheere EA: On mutual information. http:\/\/eudoxus.usc.edu\/CHAOS\/traffic.html"},{"key":"2133_CR25","volume-title":"High-Speed Networks TCP\/IP and ATM Design Principles","author":"W Stallings","year":"1998","unstructured":"Stallings W: High-Speed Networks TCP\/IP and ATM Design Principles. 1st edition. Prentice Hall, Englewood Cliffs, NJ, USA; 1998.","edition":"1"},{"issue":"6","key":"2133_CR26","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1109\/90.650143","volume":"5","author":"ME Crovella","year":"1997","unstructured":"Crovella ME, Bestavros A: Self-similarity in world wide web traffic: evidence and possible causes. IEEE\/ACM Transactions on Networking 1997,5(6):835-846. 10.1109\/90.650143","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"2133_CR27","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/285237.285256","volume-title":"Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '98), August-","author":"A Feldmann","year":"1998","unstructured":"Feldmann A, Gilbert AC, Willinger W: Data networks as cascades: investigating the multifractal nature of Internet WAN traffic. Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '98), August-September 1998, Vancouver, BC, Canada 42-55."},{"key":"2133_CR28","unstructured":"Liu NX, Baras JS: On scaling property of network traffic in small scales. submitted to Computer Networks"},{"key":"2133_CR29","unstructured":"http:\/\/www.isi.edu\/nsnam"},{"issue":"2","key":"2133_CR30","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"DE Denning","year":"1987","unstructured":"Denning DE: An intrusion detection model. IEEE Transactions on Software Engineering 1987,13(2):222-232.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"2133_CR31","first-page":"259","volume-title":"Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC '98), Decemeber","author":"A Ghosh","year":"1998","unstructured":"Ghosh A, Wanken J, Charron F: Detection anomalous and unknown intrusions agains programs. Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC '98), Decemeber 1998, Scottsdale, Ariz, USA 259-267."},{"key":"2133_CR32","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1109\/RISP.1991.130799","volume-title":"Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy","author":"HS Javitz","year":"1991","unstructured":"Javitz HS, Valdes A: The SRI IDES statistical anomaly detector. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, May 1991, Oakland, Calif, USA 316-326."},{"key":"2133_CR33","first-page":"175","volume-title":"Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy","author":"C Ko","year":"1997","unstructured":"Ko C, Ruschitzka M, Levitt K: Execution monitoring of security-critical programs in distributed systems: a specification-based approach. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, May 1997, Oakland, Calif, USA 175-187."},{"key":"2133_CR34","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1145\/288090.288122","volume-title":"Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS '98)","author":"T Lane","year":"1998","unstructured":"Lane T, Brodley CE: Temporal sequence learning and data reduction for anomaly detection. Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS '98), November 1998, San Francisco, Calif, USA 150-158."},{"key":"2133_CR35","volume-title":"Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"W Lee","year":"1999","unstructured":"Lee W, Stolfo S: A framework for constructing features and models for intrusion detection systems. Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 1999, San Diego, Calif, USA"},{"key":"2133_CR36","first-page":"120","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"S Forrest","year":"1996","unstructured":"Forrest S, Hofmeyr SA, Somayaji A, Longstaff TA: A sense of self for unix processes. Proceedings of the IEEE Symposium on Security and Privacy, May 1996, Oakland, Calif, USA 120-128."},{"key":"2133_CR37","volume-title":"Proceedings of the 1st International Workshop on the Recent Advances in Intrusion Detection (RAID '98)","author":"R Anderson","year":"1998","unstructured":"Anderson R, Khattak A: The use of information retrieval techniques for intrusion detection. Proceedings of the 1st International Workshop on the Recent Advances in Intrusion Detection (RAID '98), September 1998, Louvain-la-Neuve, Belgium"},{"key":"2133_CR38","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1109\/RISP.1990.63857","volume-title":"Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy","author":"HS Teng","year":"1990","unstructured":"Teng HS, Chen K, Lu SC-Y: Adaptive real-time anomaly detection using inductively generated sequential patterns. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, May 1990, Oakland, Calif, USA 278-284."},{"key":"2133_CR39","volume-title":"A real-time intrusion detection expert system (IDES)","author":"T Lunt","year":"1992","unstructured":"Lunt T, Tamaru A, Gilham F, et al.: A real-time intrusion detection expert system (IDES). Computer Science Laboratory, SRI International, Menlo Park, Calif, USA; 1992."},{"key":"2133_CR40","volume-title":"Proceedings of the 2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop","author":"RB Blazek","year":"2001","unstructured":"Blazek RB, Kim H, Rozovskii B, Tartakovsky A: A novel approach to detection of denial-of service attacks via adaptive sequential and batch sequential change-point detection methods. Proceedings of the 2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop, June 2001, New York, NY, USA"},{"key":"2133_CR41","first-page":"1530","volume":"3","author":"H Wang","year":"2002","unstructured":"Wang H, Zhang D, Shin K: Detecting SYN flooding attacks. Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '02), June 2002, New York, NY, USA 3: 1530-1539.","journal-title":"Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '02)"},{"issue":"6","key":"2133_CR42","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1049\/ip-com:20010659","volume":"148","author":"V Alarcon-Aquino","year":"2001","unstructured":"Alarcon-Aquino V, Barria JA: Anomaly detection in communication networks using wavelets. IEE Proceedings: Communications 2001,148(6):355-362. 10.1049\/ip-com:20010659","journal-title":"IEE Proceedings: Communications"},{"issue":"8","key":"2133_CR43","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1109\/TSP.2003.814797","volume":"51","author":"M Thottan","year":"2003","unstructured":"Thottan M, Ji C: Anomaly detection in IP networks. IEEE Transactions on Signal Processing 2003,51(8):2191-2204. 10.1109\/TSP.2003.814797","journal-title":"IEEE Transactions on Signal Processing"},{"key":"2133_CR44","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/637201.637210","volume-title":"Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop (IMW '02)","author":"P Barford","year":"2002","unstructured":"Barford P, Kline J, Plonka D, Ron A: A signal analysis of network traffic anomalies. Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop (IMW '02), November 2002, Marseille, France 71-82."},{"key":"2133_CR45","first-page":"2143","volume":"3","author":"C-M Cheng","year":"2002","unstructured":"Cheng C-M, Kung HT, Tan K-S: Use of spectral analysis in defense against DoS attacks. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '02), November 2002, Taipei, Taiwan 3: 2143-2148.","journal-title":"Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '02)"},{"key":"2133_CR46","first-page":"99","volume-title":"Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '03)","author":"A Hussain","year":"2003","unstructured":"Hussain A, Heidemann J, Papadopoulos C: A framework for classifying denial of service attacks. Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '03), August 2003, Karlsruhe, Germany 99-110."},{"key":"2133_CR47","volume-title":"Proceedings of the ACM Workshop on Wireless Security","author":"C Partridge","year":"2002","unstructured":"Partridge C, Cousins D, Jackson A, Krishnan R, Saxena T, Strayer WT: Using signal processing to analyze wireless data traffic. Proceedings of the ACM Workshop on Wireless Security, September 2002, Atlanta, Ga, USA"},{"key":"2133_CR48","first-page":"1826","volume":"3","author":"Z-L Zhang","year":"2003","unstructured":"Zhang Z-L, Ribeiro V, Moon S, Diot C: Small-time scaling behaviors of Internet backbone traffic: an empirical study. Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '03), March-April 2003, San Francisco, Calif, USA 3: 1826-1836.","journal-title":"Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '03), March-"},{"key":"2133_CR49","volume-title":"Proceedings of the 2nd DARPA Information Survivability Conference and Exposition II (DISCEX-II '01)","author":"S Evans","year":"2001","unstructured":"Evans S, Bush SF, Hershey J: Information assurance through Kolmogorov complexity. Proceedings of the 2nd DARPA Information Survivability Conference and Exposition II (DISCEX-II '01), June 2001, Anaheim, Calif, USA"},{"key":"2133_CR50","volume-title":"Stable Non-Gaussian Random Processes, Stochastic Models with Infinite Variance","author":"G Samoradnitsky","year":"1994","unstructured":"Samoradnitsky G, Taqqu MS: Stable Non-Gaussian Random Processes, Stochastic Models with Infinite Variance. Chapman & Hall, New York, NY, USA; 1994."},{"key":"2133_CR51","first-page":"2226","volume-title":"Proceedings of the IEEE Conference on Decision and Control","author":"E Jonckheere","year":"1992","unstructured":"Jonckheere E, Wu B-F: Mutual Kolmogorov-Sinai entropy approach to nonlinear estimation. Proceedings of the IEEE Conference on Decision and Control, December 1992, Tucson, Ariz, USA 2226-2232."},{"key":"2133_CR52","volume-title":"Information Theory and Statistics","author":"S Kullback","year":"1968","unstructured":"Kullback S: Information Theory and Statistics. Dover, New York, NY, USA; 1968."},{"key":"2133_CR53","unstructured":"Wu BF: Identification and control of chaotic processes\u2014the Kolmogorov-Sinai entropy approach, Ph.D. dissertation."},{"key":"2133_CR54","first-page":"283","volume-title":"Nonlinear Modeling and Forecasting, SFI Studies in the Sciences of Complexity","author":"WE Larimore","year":"1991","unstructured":"Larimore WE: Identification and filtering of nonlinear systems using canonical variate analysis. In Nonlinear Modeling and Forecasting, SFI Studies in the Sciences of Complexity. Volume 12. Addison-Wesley, Reading, Mass, USA; 1991:283-303."},{"issue":"1","key":"2133_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/90.282603","volume":"2","author":"W Leland","year":"1994","unstructured":"Leland W, Taqqu M, Willinger W, Wilson D: On the self-similar nature of Ethernet traffic (extended version). IEEE\/ACM Transactions on Networking 1994,2(1):1-15. 10.1109\/90.282603","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"2133_CR56","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/ICC.1995.525209","volume":"1","author":"P Pruthi","year":"1995","unstructured":"Pruthi P, Erramilli A: Heavy-tailed ON\/OFF source behavior and self-similar traffic. IEEE International Conference on Communications, June 1995, Seattle, Wash, USA 1: 445-450.","journal-title":"IEEE International Conference on Communications"},{"key":"2133_CR57","unstructured":"CERT : CERT advisory CA-96.01: UDP port denial-of-service attack. ftp:\/\/info.cert.org\/pub\/cert_advisories\/ca-96.01.udp_service_denial"},{"key":"2133_CR58","unstructured":"ERT Coordination Center : Overview of attack trends. http:\/\/www.cert.org\/archive\/pdf\/attacktrends.pdf"}],"container-title":["EURASIP Journal on Advances in Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1155\/2007\/90312.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,22]],"date-time":"2019-04-22T10:36:37Z","timestamp":1555929397000},"score":1,"resource":{"primary":{"URL":"https:\/\/asp-eurasipjournals.springeropen.com\/articles\/10.1155\/2007\/90312"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10,19]]},"references-count":58,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,12]]}},"alternative-id":["2133"],"URL":"https:\/\/doi.org\/10.1155\/2007\/90312","relation":{},"ISSN":["1687-6180"],"issn-type":[{"value":"1687-6180","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,10,19]]},"article-number":"090312"}}