{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T08:05:00Z","timestamp":1743840300310,"version":"3.37.3"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100009950","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100009950","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,13]]},"DOI":"10.23919\/icact53585.2022.9728838","type":"proceedings-article","created":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T20:27:02Z","timestamp":1647030422000},"page":"91-94","source":"Crossref","is-referenced-by-count":3,"title":["DDoS attacks detection in the cloud using K-medoids algorithm"],"prefix":"10.23919","author":[{"given":"SeongHo","family":"Yoon","sequence":"first","affiliation":[{"name":"Korea University,School of Cybersecurity,Seoul,Korea,02841"}]},{"given":"Miyoung","family":"Kang","sequence":"additional","affiliation":[{"name":"Korea University,School of Cybersecurity,Seoul,Korea,02841"}]}],"member":"263","reference":[{"journal-title":"February 28th ddos incident report","year":"0","key":"ref4"},{"journal-title":"Exponential growth in DDoS attack volumes","year":"0","key":"ref3"},{"key":"ref10","first-page":"507","volume":"78","author":"arora","year":"2016","journal-title":"Analysis of K-Means and K-Medoids Algorithm For Big Data Procedia Computer Science"},{"journal-title":"NIST Cloud Computing","year":"0","key":"ref6"},{"key":"ref11","first-page":"408","article-title":"Lightweight DDoS flooding attack detection using NOX\/OpenFlow","author":"braga","year":"2015","journal-title":"IEEE LCN 2010"},{"journal-title":"AWS Said it Mitigated a 2 3 Tbps DDoS Attack the Largest Ever","year":"0","key":"ref5"},{"journal-title":"A simple guide to building a confusion matrix","year":"0","key":"ref12"},{"journal-title":"Virtualization vs Cloud Computing What&#x2019;s the Difference","year":"0","key":"ref8"},{"journal-title":"SaaS vs PaaS vs IaaS What&#x2019;s The Difference & How To Choose","year":"0","key":"ref7"},{"journal-title":"Kaspersky Labs Global IT security risks survey 2014 - distributed denial of service (DDoS) attacks","year":"2014","key":"ref2"},{"journal-title":"What is a Cloud Hypervisor","year":"0","key":"ref9"},{"journal-title":"Understanding Denial of Service Attacks","year":"0","key":"ref1"}],"event":{"name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","start":{"date-parts":[[2022,2,13]]},"location":"PyeongChang Kwangwoon_Do, Korea, Republic of","end":{"date-parts":[[2022,2,16]]}},"container-title":["2022 24th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9728250\/9728768\/09728838.pdf?arnumber=9728838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T21:29:19Z","timestamp":1653341359000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9728838\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,13]]},"references-count":12,"URL":"https:\/\/doi.org\/10.23919\/icact53585.2022.9728838","relation":{},"subject":[],"published":{"date-parts":[[2022,2,13]]}}}