{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T13:13:28Z","timestamp":1723036408634},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2015,9,1]]},"DOI":"10.1109\/tc.2014.2375218","type":"journal-article","created":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T20:54:54Z","timestamp":1417035294000},"page":"2519-2533","source":"Crossref","is-referenced-by-count":122,"title":["Detection of Denial-of-Service Attacks Based on Computer Vision Techniques"],"prefix":"10.1109","volume":"64","author":[{"given":"Zhiyuan","family":"Tan","sequence":"first","affiliation":[]},{"given":"Aruna","family":"Jamdagni","sequence":"additional","affiliation":[]},{"given":"Xiangjian","family":"He","sequence":"additional","affiliation":[]},{"given":"Priyadarsi","family":"Nanda","sequence":"additional","affiliation":[]},{"given":"Ren Ping","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73499-4_33"},{"key":"ref38","article-title":"Data mining methods for network intrusion detection","author":"brugger","year":"2004"},{"key":"ref33","author":"hillier","year":"1995","journal-title":"Introduction to Mathematical Programming"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/sapm1941201224"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026543900054"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.1998.710701"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.76"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.50"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.299"},{"key":"ref34","first-page":"-220i","article-title":"Fast contour matching using approximate earth mover’s distance","volume":"1","author":"grauman","year":"0","journal-title":"Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.814797"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015492"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.12.010"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.05.017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.146"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1058"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821515"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.33"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.01.040"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1016\/j.asoc.2008.06.001","article-title":"Intrusion detection using fuzzy association rules","volume":"9","author":"tajbakhsh","year":"2009","journal-title":"Appl Soft Comput"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1503370.1503377"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.10.003"},{"key":"ref27","first-page":"2056","article-title":"A study of analyzing network traffic as images in real-time","volume":"3","author":"soo","year":"0","journal-title":"Proc IEEE INFOCOM 24th Annu Joint Conf Compu Commun Soc"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5218-8_4"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2172456"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.877215"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2181411"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382232"},{"key":"ref2","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"ref1","year":"0"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/962185"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2004.01.003"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2014.53"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.34"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1007\/978-3-642-24965-5_85","article-title":"Denial-of-service attack detection based on multivariate correlation analysis","author":"tan","year":"2011","journal-title":"Neural Information Processing"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.09.018"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.neucom.2011.02.021","article-title":"Improved competitive learning neural networks for network intrusion and fraud detection","volume":"75","author":"z","year":"2012","journal-title":"Neurocomputing"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2070845"},{"key":"ref41","author":"knuth","year":"1973","journal-title":"The Art of Computer Programming Vol 1 Fundamental Algorithms"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/TNET.2007.902685","article-title":"Statistical techniques for detecting traffic anomalies through packet header data","volume":"16","author":"kim","year":"2008","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref44","first-page":"1","article-title":"A detailed analysis data set of the KDD Cup 99 Data Set","author":"tavallaee","year":"0","journal-title":"Proc Second IEEE Int Conf Comput Intell Secur Defense Appl"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.10.002"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"251","DOI":"10.3233\/IDA-2010-0466","article-title":"Exploring discrepancies in findings obtained with the KDD Cup ’99 data set","volume":"15","author":"engen","year":"2011","journal-title":"Intell Data Anal"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2005.843274"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/7180479\/06967763.pdf?arnumber=6967763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T11:01:02Z","timestamp":1650711662000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6967763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,1]]},"references-count":47,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tc.2014.2375218","relation":{},"ISSN":["0018-9340"],"issn-type":[{"value":"0018-9340","type":"print"}],"subject":[],"published":{"date-parts":[[2015,9,1]]}}}