{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:29:48Z","timestamp":1725517788361},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540854999"},{"type":"electronic","value":"9783540855002"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85500-2_22","type":"book-chapter","created":{"date-parts":[[2008,8,24]],"date-time":"2008-08-24T02:40:18Z","timestamp":1219545618000},"page":"246-257","source":"Crossref","is-referenced-by-count":7,"title":["Application of Wavelet Packet Transform to Network Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Christian","family":"Callegari","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Giordano","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Pagano","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Barford, P., Kline, J., Plonka, D., Ron, A.: A signal analysis of network traffic anomalies. In: IMW 2002: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, pp. 71\u201382 (2002)","DOI":"10.1145\/637201.637210"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Huang, P., Feldmann, A., Willinger, W.: A non-instrusive, wavelet-based approach to detecting network performance problems. In: IMW 2001: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, pp. 213\u2013227 (2001)","DOI":"10.1145\/505202.505229"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Dainotti, A., Pescap\u00e8, A., Ventre, G.: Wavelet-based detection of DoS attacks. In: Proceedings of GLOBECOM 2006, pp. 1\u20136 (2006)","DOI":"10.1109\/GLOCOM.2006.279"},{"key":"22_CR4","series-title":"CBMS-NSF Series in Applied Mathematics","doi-asserted-by":"crossref","DOI":"10.1137\/1.9781611970104","volume-title":"Ten lectures on Wavelets","author":"I. Daubechies","year":"1992","unstructured":"Daubechies, I.: Ten lectures on Wavelets. CBMS-NSF Series in Applied Mathematics, vol.\u00a061. SIAM, Philadelphia (1992)"},{"key":"22_CR5","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.1109\/29.45554","volume":"37","author":"S. Mallat","year":"1989","unstructured":"Mallat, S.: Multifrequency channel decompositions of images and wavelet models. IEEE Transactions on Acoustics, Speech and Signal Processing\u00a037, 2091\u20132110 (1989)","journal-title":"IEEE Transactions on Acoustics, Speech and Signal Processing"},{"key":"22_CR6","unstructured":"Wickerhauser, M.: Lectures on wavelet packet algorithms, November 18 (1991)"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Hess-Nielsen, N., Wickerhauser, M.: Wavelets and time-frequency analysis. In: Proceedings of the IEEE, vol.\u00a084, pp.\u00a0523\u2013540 (April 1996)","DOI":"10.1109\/5.488698"},{"key":"22_CR8","unstructured":"MIT, Lincoln laboratory, DARPA evaluation intrusion detection(accessed on December 12, 2008) (2008), http:\/\/www.ll.mit.edu\/IST\/ideval\/"},{"issue":"4","key":"22_CR9","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/S1389-1286(00)00139-0","volume":"34","author":"R. Lippmann","year":"2000","unstructured":"Lippmann, R., Haines, J., Fried, D., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Computer Networks\u00a034(4), 579\u2013595 (2000)","journal-title":"Computer Networks"},{"key":"22_CR10","unstructured":"UCLA Data Traces, http:\/\/lever.cs.ucla.edu\/ddos\/traces"},{"key":"22_CR11","unstructured":"CERT Coordination Center. Denial-of-service tools - advisory, 1999-17, http:\/\/www.cert.org\/advisories\/CA-1999-17.html"},{"key":"22_CR12","unstructured":"CERT Coordination Center. DoS Developments - advisory ca-2000-01, http:\/\/www.cert.org\/advisories\/CA-2000-01.html"},{"issue":"4","key":"22_CR13","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1109\/TDSC.2005.50","volume":"2","author":"J. Yuan","year":"2005","unstructured":"Yuan, J., Mills, K.: Monitoring the macroscopic effect of DDoS flooding attacks. IEEE Trans. Dependable Secur. Comput.\u00a02(4), 324\u2013335 (2005)","journal-title":"IEEE Trans. Dependable Secur. Comput."}],"container-title":["Lecture Notes in Computer Science","Next Generation Teletraffic and Wired\/Wireless Advanced Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85500-2_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:25:43Z","timestamp":1606184743000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85500-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540854999","9783540855002"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85500-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}