{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:12:55Z","timestamp":1730301175247,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.38","type":"proceedings-article","created":{"date-parts":[[2013,12,18]],"date-time":"2013-12-18T00:46:29Z","timestamp":1387327589000},"page":"277-284","source":"Crossref","is-referenced-by-count":5,"title":["Visual Analytics Model for Intrusion Detection in Flood Attack"],"prefix":"10.1109","author":[{"given":"Jinson","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Mao Lin","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2004.1301348"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/IRI-05.2005.1506462"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029214"},{"key":"18","first-page":"445","article-title":"Redesign of gridbased enterprise information network through servers consolidation","author":"abdulgafer","year":"2010","journal-title":"Proc ICCIT 2010 5th International Conference on Computer Sciences and Convergence Information Technology"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029217"},{"key":"15","first-page":"183","article-title":"High-speed router filter for blocking tcp flooding under ddos attack","author":"kim","year":"2003","journal-title":"Proc 2003 IEEE International Performance Computing and Communications Conference"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029219"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2006.301961"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2008.4625672"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.7155\/jgaa.00029"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ivs.9500031"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"key":"21","first-page":"143","article-title":"Experimental study of ddos attacking of flood type based on ns2","volume":"1","author":"li","year":"2009","journal-title":"International Journal of Electronics and Computers"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.22"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.01.040"},{"key":"23","first-page":"434","article-title":"Netviewer: A visualization tool for network security events","author":"zhang","year":"2009","journal-title":"Proc NSWCTC '09 International Conference on Networks Security Wireless Communications and Trusted Computing"},{"journal-title":"KDD Cup 1999","year":"2010","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2000.839316"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/505659.505664"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029220"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181418"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016906"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN.2011.6076900"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2008.160"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039856"},{"key":"7","first-page":"401","article-title":"Collaborative change detection of ddos attacks on community and isp networks","author":"chen","year":"2006","journal-title":"Collaborative Technologies and Systems 2006 CTS 2006"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1108590.1108604"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICN.2008.57"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2011.180"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.842221"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2107320"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.877138"},{"key":"9","first-page":"344","article-title":"Detecting ddos attack in spam emails using density-weight model","author":"zhang","year":"2011","journal-title":"Proc ICITIS 2011 2011 2nd IEEE International Conference on Information Theory and Information Security Hangzhou China"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/IV.2011.41"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680852.pdf?arnumber=6680852","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T04:08:00Z","timestamp":1490242080000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680852\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.38","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}