{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:36:50Z","timestamp":1729647410878,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/icacci.2014.6968282","type":"proceedings-article","created":{"date-parts":[[2014,12,2]],"date-time":"2014-12-02T17:33:17Z","timestamp":1417541597000},"page":"1234-1239","source":"Crossref","is-referenced-by-count":24,"title":["Statistical-based filtering system against DDOS attacks in cloud computing"],"prefix":"10.1109","author":[{"given":"Pourya","family":"Shamsolmoali","sequence":"first","affiliation":[]},{"given":"Masoumeh","family":"Zareapoor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","first-page":"341","article-title":"Uniform Coverage","author":"maxim","year":"2012","journal-title":"Physicomimetics"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.01.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2010\/570940"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2010.46"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.08.008"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.003"},{"journal-title":"Netwag Tool","year":"0","key":"ref17"},{"key":"ref18","first-page":"1275","article-title":"A DDOS threat in Collaborative environment-A survey on DDOS attack tools and Traceback mechanisms","author":"raj kumar","year":"2009","journal-title":"Proceedings of IEEE International Advance Computing Confrance (IACC'09)"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/j.comcom.2012.09.010","article-title":"Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems","volume":"36","author":"raj kumar","year":"2013","journal-title":"Computer Communications"},{"key":"ref28","first-page":"111","article-title":"Theory and Algorithms for Hop-Count-Based Localization with Random Geometric Graph Models of Dense Sensor Networks","volume":"8","author":"swaprava","year":"2012","journal-title":"ACM Transactions on Sensor Networks"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.06.004"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.11.003"},{"key":"ref3","first-page":"85","article-title":"Protecting Cloud Web Services from HX-DoS attacks using Decision Theory","author":"chonka","year":"0","journal-title":"First IEEE International Conference on Communications in China Advanced Internet and Cloud (AIC)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.09.009"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"43","DOI":"10.5815\/ijcnis.2014.09.06","article-title":"C2DF: High Rate DDOS filtering method in Cloud Computing, I.J","volume":"6","author":"pourya","year":"2014","journal-title":"Computer Network and Information Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.12.011"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.902685"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.01.006"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2009.090615"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.25"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2012.146"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.01.012"},{"key":"ref22","first-page":"543","article-title":"Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures","author":"specht","year":"2004","journal-title":"Proceedings of 17th International Conference on Parallel and Distributed Computing Systems 2004 International Workshop on Security in Parallel and Distributed Systems"},{"key":"ref21","first-page":"1","article-title":"M2KMIX: Identifying the Type of High Rate Flooding Attacks using a Mixture of Expert Systems, I. J","volume":"1","author":"raj kumar","year":"2012","journal-title":"Computer Network and Information Security"},{"volume":"29","first-page":"429","year":"2013","author":"varalakshmi","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCN.2007.350735"},{"year":"0","key":"ref26"},{"key":"ref25","first-page":"35","article-title":"An Analysis of Edge Detection by Using the Jensen-Shannon Divergence","author":"juan francisco","year":"2000","journal-title":"Journal of Mathematical Imaging and Vision"}],"event":{"name":"2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2014,9,24]]},"location":"Delhi, India","end":{"date-parts":[[2014,9,27]]}},"container-title":["2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6949764\/6968191\/06968282.pdf?arnumber=6968282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T21:22:28Z","timestamp":1498166548000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6968282\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icacci.2014.6968282","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}