{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:03:47Z","timestamp":1730343827678,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,2,7]]},"DOI":"10.23919\/icact51234.2021.9371008","type":"proceedings-article","created":{"date-parts":[[2021,3,10]],"date-time":"2021-03-10T21:59:49Z","timestamp":1615413589000},"page":"194-199","source":"Crossref","is-referenced-by-count":3,"title":["Early Detection of LDDoS Attacks in IOT Utilizing Locality Sensitive Incremental TSVM Method"],"prefix":"10.23919","author":[{"given":"ZengGuang","family":"Liu","sequence":"first","affiliation":[]},{"given":"XiaoChun","family":"Yin","sequence":"additional","affiliation":[]},{"given":"RuiPing","family":"Yang","sequence":"additional","affiliation":[]},{"given":"AnMing","family":"Dong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A new network flow grouping method for preventing periodic shrew DDoS attacks in cloud computing","author":"liu","year":"2016","journal-title":"presented at the 18th Int Conf on Advanced Comm Tech"},{"key":"ref11","article-title":"Identifying LDoS attack traffic based on wavelet energy spectrum and combined neural network","author":"yue","year":"2017","journal-title":"Int J Commun Syst"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2016.25"},{"key":"ref13","article-title":"Novel Approach of Intrusion Detection Classification Deeplearning Using SVM","author":"nagar","year":"2019","journal-title":"presented at the 1st Int Conf on Sust Tech for Comp Intel"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2019.00179"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SEGE.2019.8859950"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON47517.2019.8993021"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-019-00310-w"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.11.061"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-017-9579-5"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2413-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref6","article-title":"Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network","author":"zhang","year":"2015","journal-title":"presented at the 18th Symp on Comm & Net"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PDGC.2016.7913177"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.10315"},{"key":"ref2","article-title":"You Can Now Rent a Mirai Botnet of 400,000 Bots","author":"cimpanu","year":"2016","journal-title":"bleepingcomputer com"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443807"},{"key":"ref1","article-title":"Record-Breaking DDoS Reportedly Delivered by > 145K Hacked Cameras","author":"goodin","year":"2016","journal-title":"ARS Technica"},{"key":"ref20","article-title":"Transductive Support Vector Machine Algorithm Based on Cluster and Cooperative Labeling","volume":"35","author":"du","year":"2017","journal-title":"HeNan science"},{"key":"ref22","article-title":"Research on Hybird Intrusion Detection Model Based on DBN and TSVM","volume":"35","author":"zhang","year":"2018","journal-title":"Appl Softw Comput"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.12.006"},{"key":"ref24","article-title":"Building self-clustering RDF databases using Tunable-LSH","author":"alu\u00e7","year":"2018","journal-title":"The VLDB Journal"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973402.76"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s40009-019-00864-4"}],"event":{"name":"2021 23rd International Conference on Advanced Communication Technology (ICACT)","start":{"date-parts":[[2021,2,7]]},"location":"PyeongChang, Korea (South)","end":{"date-parts":[[2021,2,10]]}},"container-title":["2021 23rd International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9370342\/9370365\/09371008.pdf?arnumber=9371008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T21:23:58Z","timestamp":1620768238000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9371008\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.23919\/icact51234.2021.9371008","relation":{},"subject":[],"published":{"date-parts":[[2021,2,7]]}}}