{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T09:29:36Z","timestamp":1648891776238},"reference-count":16,"publisher":"Faculty of Electrical Engineering and Computing, Univ. of Zagreb","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CIT"],"published-print":{"date-parts":[[2012]]},"DOI":"10.2498\/cit.1002007","type":"journal-article","created":{"date-parts":[[2012,12,17]],"date-time":"2012-12-17T04:47:54Z","timestamp":1355719674000},"source":"Crossref","is-referenced-by-count":1,"title":["Network Traffic Deviation Detection Based on Fractal Dimension"],"prefix":"10.20532","volume":"20","author":[{"given":"Afshin","family":"Shaabany","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fatemeh","family":"Jamshidi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"8460","reference":[{"key":"ref1","first-page":"108","article-title":"Adaptive Thresholding for Proactive Network Problem Detection","volume-title":"IEEE International Workshop on Systems Management","author":"Marina","year":"1998","unstructured":"[3] T. Marina, C. Ji, Adaptive Thresholding for Proactive Network Problem Detection, IEEE International Workshop on Systems Management, 5, 108\u2013116, (1998)."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2010.2048740"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2007.4381634"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/269790.269792"},{"key":"ref5","first-page":"49","article-title":"Anomaly Detection of Network Traffic based on Analytical Discrete Wavelet Transform","volume-title":"8th IEEE International Conference on Communications (COMM)","author":"Salagean","year":"2010","unstructured":"[7] M. Salagean, I. Firoiu, Anomaly Detection of Network Traffic based on Analytical Discrete Wavelet Transform, 8th IEEE International Conference on Communications (COMM), 49\u201352, (2010)."},{"key":"ref6","first-page":"435","article-title":"Ddos attack detection and wavelets","author":"Lan","year":"2005","unstructured":"[9] L. Lan, L. Gyungho, Ddos attack detection and wavelets, Telecommunication Systems, 435\u2013451, (2005).","journal-title":"Telecomm Syst","ISSN":"http:\/\/id.crossref.org\/issn\/1018-4864","issn-type":"print"},{"key":"ref7","volume-title":"Fourier and Wavelet Analysis","author":"Bachmann","year":"2002","unstructured":"[11] G.Bachmann, L.Narici, E.Beckenstein, Fourier and Wavelet Analysis, Springer, 2002."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-2544-7_17"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/0470013850"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.physd.2007.07.004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2007.12.004"},{"key":"ref12","first-page":"1004","article-title":"Endpoint detection in noisy environment using intricacy measure","volume-title":"Proc IEEE International Conference","author":"Li","year":"2007","unstructured":"[16] Y. Li, Y. Le Fan, Q. Ye Tong, Endpoint detection in noisy environment using intricacy measure, Proc. IEEE International Conference, 3, 1004\u20131007, (2007)."},{"key":"ref12","doi-asserted-by":"crossref","unstructured":"[1] X. Yao, P. Zhang, J. Gao, G. Hu, Detection of Network Traffic Anomaly Based on Instantaneous Parameters Analysis, International Conference on Communication Technology, ICCT '06., 1\u20134, (2006).","DOI":"10.1109\/ICCT.2006.341860"},{"key":"ref12","unstructured":"[2] D. Tran, W. Ma, D. Sharma, Network Anomaly Detection using Fuzzy Gaussian Mixture Models, International Journal of Future Generation Communication and Networking, 37\u201342, (2006)."},{"key":"ref12","doi-asserted-by":"crossref","unstructured":"[8] S. S. Kim, A. Reddy, Detecting traffic anomalies at the source through aggregate analysis of packet header data, Proceedings of Networking, (2004).","DOI":"10.1007\/978-3-540-24693-0_86"},{"key":"ref12","unstructured":"[10] M.Thangavel, P. Thangaraj, K. Saravanan, Defend versus Anomaly Intrusion Detection Using SWT Mechanism, International Journal of Innovation, Management and Technology, Vol. 1, No. 2, 209\u2013213, June (2010)."}],"container-title":["Journal of Computing and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/cit.fer.hr\/index.php\/CIT\/article\/view\/2007\/1522","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,7]],"date-time":"2019-07-07T03:43:26Z","timestamp":1562471006000},"score":1,"resource":{"primary":{"URL":"http:\/\/cit.srce.unizg.hr\/index.php\/CIT\/article\/view\/2007"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,3]]}},"URL":"https:\/\/doi.org\/10.2498\/cit.1002007","relation":{},"ISSN":["1330-1136"],"issn-type":[{"value":"1330-1136","type":"print"}],"subject":[],"published":{"date-parts":[[2012]]}}}