{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T06:45:48Z","timestamp":1764053148819,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006,8]]},"DOI":"10.1109\/seccomw.2006.359584","type":"proceedings-article","created":{"date-parts":[[2007,5,30]],"date-time":"2007-05-30T20:33:00Z","timestamp":1180557180000},"page":"1-7","source":"Crossref","is-referenced-by-count":21,"title":["Wavelet-based Real Time Detection of Network Traffic Anomalies"],"prefix":"10.1109","author":[{"given":"Chin-Tser","family":"Huang","sequence":"first","affiliation":[]},{"given":"Sachin","family":"Thareja","sequence":"additional","affiliation":[]},{"given":"Yong-June","family":"Shin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/90.650143"},{"key":"ref11","article-title":"Framelets: MRA-based constructions of wavelet frames","author":"daubechies","year":"2001","journal-title":"preprint Ftp site"},{"key":"ref12","article-title":"The Art of Port Scanning","volume":"7","year":"1997","journal-title":"Phrack Magazine"},{"key":"ref13","article-title":"1999 DARPA intrusion detection system evaluation: Design and procedures","author":"haines","year":"2000","journal-title":"MIT Lincoln Laboratory Technical Report"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505229"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015500"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/90.282603"},{"key":"ref17","first-page":"49","article-title":"Port Scanning without the SYN flag","volume":"7","author":"maimon","year":"0","journal-title":"Phrack Magazine"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"journal-title":"NmapFree security scanner for network exploration & security audits","year":"0","key":"ref19"},{"journal-title":"LastWave 2 0","year":"0","author":"bacry","key":"ref4"},{"journal-title":"CERT Advisory CA-98 01","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505211"},{"key":"ref5","article-title":"Measuring time frequency information content using the R&#x00E9;nyi entropies","author":"baraniuk","year":"2001","journal-title":"IT-47"},{"key":"ref8","article-title":"Time series models for internet traffic","author":"basu","year":"1996","journal-title":"Technical Report GIT-CC-95&#x2013;27"},{"key":"ref7","article-title":"A signa l analysis of network traffic anomalies","author":"barford","year":"2002","journal-title":"Proc ACM Sigcomm Internet Measure Conf"},{"journal-title":"CERT Advisory CA-96 21","year":"0","key":"ref2"},{"journal-title":"CERT Advisory CRTAdisryC-9 01","year":"0","key":"ref1"},{"journal-title":"Bro Intrusion Detection System","year":"0","key":"ref9"},{"journal-title":"Rrd Tool","year":"0","author":"oetiker","key":"ref20"},{"key":"ref22","article-title":"Transmission Control Protocol","author":"postel","year":"1981","journal-title":"RFC 793"},{"key":"ref21","article-title":"FlowScan: A Network Traffic Flow Reporting and Visualization Tool","author":"plonka","year":"2000","journal-title":"Proceedings of the 14th Systems Administration Conference"},{"key":"ref24","article-title":"Cange-point monitoring for detection of DoS attacks","volume":"1","author":"wang","year":"2004","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"year":"0","key":"ref23"}],"event":{"name":"2006 Securecomm and Workshops","start":{"date-parts":[[2006,8,28]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2006,9,1]]}},"container-title":["2006 Securecomm and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4198788\/4198789\/04198844.pdf?arnumber=4198844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T20:17:45Z","timestamp":1489609065000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4198844\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,8]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/seccomw.2006.359584","relation":{},"subject":[],"published":{"date-parts":[[2006,8]]}}}