{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:58:15Z","timestamp":1725555495700},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/ukci.2013.6651320","type":"proceedings-article","created":{"date-parts":[[2013,11,1]],"date-time":"2013-11-01T20:40:14Z","timestamp":1383338414000},"page":"299-304","source":"Crossref","is-referenced-by-count":0,"title":["Towards an autonomous resilience strategy the implementation of a self evolving rate limiter"],"prefix":"10.1109","author":[{"given":"Azman","family":"Ali","sequence":"first","affiliation":[]},{"given":"David","family":"Hutchison","sequence":"additional","affiliation":[]},{"given":"Plamen","family":"Angelov","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Smith","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/91.995117"},{"year":"0","key":"11"},{"journal-title":"BAE Systems Autonomous Systems","year":"0","author":"williams","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1080\/03081079.2011.634807"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1002\/9781118481769"},{"key":"10","article-title":"Justifying a Policy Based Approach for DDoS Remediation: A Case Study","author":"ali","year":"2010","journal-title":"11th Annual Conference on the Convergence of Telecommunications Networking &Broadcasting (PGNet 2010)"},{"journal-title":"A Practical Implementation of Self Evolving Cloud-based Control of A Pilot Plan","year":"2013","author":"costa","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.03.005"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2011.2112369"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN.2011.6076900"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2012.6251169"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13986-4_18"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/9780470569962"}],"event":{"name":"2013 13th UK Workshop on Computational Intelligence (UKCI)","start":{"date-parts":[[2013,9,9]]},"location":"Guildford, United Kingdom","end":{"date-parts":[[2013,9,11]]}},"container-title":["2013 13th UK Workshop on Computational Intelligence (UKCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6642156\/6651272\/06651320.pdf?arnumber=6651320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T21:29:40Z","timestamp":1490218180000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6651320\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ukci.2013.6651320","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}