{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:36:36Z","timestamp":1730208996251,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T00:00:00Z","timestamp":1688342400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T00:00:00Z","timestamp":1688342400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,3]]},"DOI":"10.1109\/codit58514.2023.10284093","type":"proceedings-article","created":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T17:46:12Z","timestamp":1698169572000},"page":"459-464","source":"Crossref","is-referenced-by-count":0,"title":["Comparison of Data Cleansing Methods for Network DDoS Attacks Mitigation"],"prefix":"10.1109","author":[{"given":"Adonis","family":"Jamal","sequence":"first","affiliation":[{"name":"Institut Polytechnique de Paris, Telecom Paris (INFRES), LTCI,France"}]},{"given":"Ali","family":"El Attar","sequence":"additional","affiliation":[{"name":"Institut Polytechnique de Paris, Telecom Paris (INFRES), LTCI,France"}]},{"given":"Fadlallah","family":"Chbib","sequence":"additional","affiliation":[{"name":"Institut Polytechnique de Paris, Telecom Paris (INFRES), LTCI,France"}]},{"given":"Rida","family":"Khatoun","sequence":"additional","affiliation":[{"name":"Institut Polytechnique de Paris, Telecom Paris (INFRES), LTCI,France"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC55528.2022.9912872"},{"key":"ref2","article-title":"Worldwide infrastructure security report","author":"Dobbins","year":"2010","journal-title":"Arbor networks an-nual survey"},{"key":"ref3","article-title":"Anonymous: The hacker collective that has declared cyberwar on russia","author":"Milmo","year":"2022","journal-title":"The Guardian"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME55909.2022.9987992"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103117"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2971776"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2861741"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3022799"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref10","first-page":"52","article-title":"Ddos attack detection using c5. 0 machine learning algorithm","volume":"1","author":"Hariharan","year":"2019","journal-title":"IJ Wireless and Microwave Technologies"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/proceedings2020063051"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9647-6_78"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140406"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2017.8167846"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925783"},{"key":"ref17","article-title":"Intelligent system to detect software defects in autonomous cars","author":"Tanwar","year":"2022","journal-title":"Authorea Preprints"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.oregeorev.2015.01.001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102107"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ASYU48272.2019.8946331"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK52708.2021.9558989"}],"event":{"name":"2023 9th International Conference on Control, Decision and Information Technologies (CoDIT)","start":{"date-parts":[[2023,7,3]]},"location":"Rome, Italy","end":{"date-parts":[[2023,7,6]]}},"container-title":["2023 9th International Conference on Control, Decision and Information Technologies (CoDIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10284032\/10284045\/10284093.pdf?arnumber=10284093","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T03:42:59Z","timestamp":1705030979000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10284093\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,3]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/codit58514.2023.10284093","relation":{},"subject":[],"published":{"date-parts":[[2023,7,3]]}}}