{"id":"https://openalex.org/W1513341660","doi":"https://doi.org/10.1007/11563952_30","title":"Intrusion Detection of DoS/DDoS and Probing Attacks for Web Services","display_name":"Intrusion Detection of DoS/DDoS and Probing Attacks for Web Services","publication_year":2005,"publication_date":"2005-01-01","ids":{"openalex":"https://openalex.org/W1513341660","doi":"https://doi.org/10.1007/11563952_30","mag":"1513341660"},"language":"en","primary_location":{"id":"doi:10.1007/11563952_30","is_oa":false,"landing_page_url":"https://doi.org/10.1007/11563952_30","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100783068","display_name":"Jun Zheng","orcid":"https://orcid.org/0000-0003-2131-6816"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jun Zheng","raw_affiliation_strings":["The Research Center of Computer Network and Information Security Technique, Harbin Institute of Technology, P.O.Box 320, Harbin, 150001, China","The Research Center of Computer Network and Information Security Technique, Harbin Institute of Technology, Harbin, China#TAB#"],"affiliations":[{"raw_affiliation_string":"The Research Center of Computer Network and Information Security Technique, Harbin Institute of Technology, P.O.Box 320, Harbin, 150001, China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"The Research Center of Computer Network and Information Security Technique, Harbin Institute of Technology, Harbin, China#TAB#","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112063437","display_name":"Mingzeng Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming-zeng Hu","raw_affiliation_strings":["The Research Center of Computer Network and Information Security Technique, Harbin Institute of Technology, P.O.Box 320, Harbin, 150001, China","The Research Center of Computer Network and Information Security Technique, Harbin Institute of Technology, Harbin, China#TAB#"],"affiliations":[{"raw_affiliation_string":"The Research Center of Computer Network and Information Security Technique, Harbin Institute of Technology, P.O.Box 320, Harbin, 150001, China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"The Research Center of Computer Network and Information Security Technique, Harbin Institute of Technology, Harbin, China#TAB#","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100783068"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.6591,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.68065173,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"333","last_page":"344"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8937828540802002},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8571537137031555},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.6489083766937256},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.581752598285675},{"id":"https://openalex.org/keywords/codebook","display_name":"Codebook","score":0.5661209225654602},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5075596570968628},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.4890166223049164},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.46049195528030396},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43616536259651184},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40120935440063477},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3787025213241577},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3114689886569977},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18518024682998657},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07788226008415222}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8937828540802002},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8571537137031555},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.6489083766937256},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.581752598285675},{"id":"https://openalex.org/C127759330","wikidata":"https://www.wikidata.org/wiki/Q637416","display_name":"Codebook","level":2,"score":0.5661209225654602},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5075596570968628},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.4890166223049164},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.46049195528030396},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43616536259651184},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40120935440063477},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3787025213241577},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3114689886569977},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18518024682998657},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07788226008415222}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/11563952_30","is_oa":false,"landing_page_url":"https://doi.org/10.1007/11563952_30","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1545302662","https://openalex.org/W1563061804","https://openalex.org/W1566480186","https://openalex.org/W1967354722","https://openalex.org/W1999427165","https://openalex.org/W2071386815","https://openalex.org/W2130676130","https://openalex.org/W2134383396","https://openalex.org/W2150847526","https://openalex.org/W2475472996","https://openalex.org/W4237222446","https://openalex.org/W4254197176"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2754163055","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":null,"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
