{"id":"https://openalex.org/W2103024672","doi":"https://doi.org/10.1109/tc.2014.2375218","title":"Detection of Denial-of-Service Attacks Based on Computer Vision Techniques","display_name":"Detection of Denial-of-Service Attacks Based on Computer Vision Techniques","publication_year":2014,"publication_date":"2014-11-26","ids":{"openalex":"https://openalex.org/W2103024672","doi":"https://doi.org/10.1109/tc.2014.2375218","mag":"2103024672"},"language":"en","primary_location":{"id":"doi:10.1109/tc.2014.2375218","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2014.2375218","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044811454","display_name":"Zhiyuan Tan","orcid":"https://orcid.org/0000-0001-5420-2554"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Zhiyuan Tan","raw_affiliation_strings":["Services, Cybersecurity and Safety Group, University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Services, Cybersecurity and Safety Group, University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061094309","display_name":"Aruna Jamdagni","orcid":null},"institutions":[{"id":"https://openalex.org/I63525965","display_name":"Western Sydney University","ror":"https://ror.org/03t52dk35","country_code":"AU","type":"education","lineage":["https://openalex.org/I63525965"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Aruna Jamdagni","raw_affiliation_strings":["School of Computing and Mathematics, University of Western Sydney, Parramatta, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Mathematics, University of Western Sydney, Parramatta, Australia","institution_ids":["https://openalex.org/I63525965"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006921134","display_name":"Xiangjian He","orcid":"https://orcid.org/0000-0001-8962-540X"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xiangjian He","raw_affiliation_strings":["Centre for Innovation in IT Services and Applications (iNEXT), University of Technology, Sydney, Australia","Centre for Innovation in IT Services and Applications (iNext), University of Technology, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Innovation in IT Services and Applications (iNEXT), University of Technology, Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"Centre for Innovation in IT Services and Applications (iNext), University of Technology, Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045431254","display_name":"Priyadarsi Nanda","orcid":"https://orcid.org/0000-0002-5748-155X"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Priyadarsi Nanda","raw_affiliation_strings":["Centre for Innovation in IT Services and Applications (iNEXT), University of Technology, Sydney, Australia","Centre for Innovation in IT Services and Applications (iNext), University of Technology, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Innovation in IT Services and Applications (iNEXT), University of Technology, Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"Centre for Innovation in IT Services and Applications (iNext), University of Technology, Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008974159","display_name":"Ren Ping Liu","orcid":"https://orcid.org/0000-0001-7001-6305"},"institutions":[{"id":"https://openalex.org/I4210128581","display_name":"Information and Communication Technologies Centre","ror":"https://ror.org/034x2fx50","country_code":"AU","type":"facility","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4210128581","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ren Ping Liu","raw_affiliation_strings":["Information and Communication Technologies (ICT) Centre, Commonwealth Scientific and Industrial Research Organisation (CSIRO), Marsfield, Australia"],"affiliations":[{"raw_affiliation_string":"Information and Communication Technologies (ICT) Centre, Commonwealth Scientific and Industrial Research Organisation (CSIRO), Marsfield, Australia","institution_ids":["https://openalex.org/I1292875679","https://openalex.org/I4210128581"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075234257","display_name":"Jiankun Hu","orcid":"https://orcid.org/0000-0003-0230-1432"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiankun Hu","raw_affiliation_strings":["Professor of Cyber Security at the Canberra Campus of the University of New South Wales"],"affiliations":[{"raw_affiliation_string":"Professor of Cyber Security at the Canberra Campus of the University of New South Wales","institution_ids":["https://openalex.org/I188329596","https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5044811454"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":null,"apc_paid":null,"fwci":6.5514,"has_fulltext":false,"cited_by_count":159,"citation_normalized_percentile":{"value":0.96961615,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"64","issue":"9","first_page":"2519","last_page":"2533"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7562687993049622},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6491011381149292},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5729045867919922},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47673025727272034},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4727288782596588},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.4351269006729126},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3954412639141083},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3227160573005676},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1192592978477478}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7562687993049622},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6491011381149292},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5729045867919922},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47673025727272034},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4727288782596588},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.4351269006729126},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3954412639141083},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3227160573005676},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1192592978477478},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1109/tc.2014.2375218","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2014.2375218","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/2a5bbe32-d4ed-424e-a779-2100dc89f86b","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/2a5bbe32-d4ed-424e-a779-2100dc89f86b","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Tan, Z, Jamdagni, A, He, X, Nanda, P, Liu, R P & Hu, J 2015, 'Detection of Denial-of-Service Attacks Based on Computer Vision Techniques', IEEE transactions on computers, vol. 64, no. 9, pp. 2519-2533. https://doi.org/10.1109/TC.2014.2375218","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:napier-surface.worktribe.com:424681","is_oa":false,"landing_page_url":"http://researchrepository.napier.ac.uk/Output/424681","pdf_url":null,"source":{"id":"https://openalex.org/S4306400544","display_name":"Research Output (Edinburgh Napier University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I251738","host_organization_name":"Edinburgh Napier University","host_organization_lineage":["https://openalex.org/I251738"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/24176","is_oa":false,"landing_page_url":"http://hdl.handle.net/10453/24176","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Thesis"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/35594","is_oa":false,"landing_page_url":"http://hdl.handle.net/10453/35594","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":111,"referenced_works":["https://openalex.org/W74712529","https://openalex.org/W158061484","https://openalex.org/W192498908","https://openalex.org/W433644524","https://openalex.org/W1480755073","https://openalex.org/W1492453133","https://openalex.org/W1499648394","https://openalex.org/W1502853115","https://openalex.org/W1516506771","https://openalex.org/W1525451939","https://openalex.org/W1566480186","https://openalex.org/W1598913253","https://openalex.org/W1601789105","https://openalex.org/W1605412737","https://openalex.org/W1608339372","https://openalex.org/W1674877186","https://openalex.org/W1687244664","https://openalex.org/W1840085141","https://openalex.org/W1867219652","https://openalex.org/W1890867917","https://openalex.org/W1962980066","https://openalex.org/W1978502884","https://openalex.org/W1981269189","https://openalex.org/W1988431020","https://openalex.org/W1988790447","https://openalex.org/W1991400162","https://openalex.org/W1993449345","https://openalex.org/W1997010614","https://openalex.org/W1998496248","https://openalex.org/W1999955156","https://openalex.org/W2007087405","https://openalex.org/W2010997912","https://openalex.org/W2011298258","https://openalex.org/W2014281271","https://openalex.org/W2017380649","https://openalex.org/W2025183498","https://openalex.org/W2031163547","https://openalex.org/W2033960944","https://openalex.org/W2034544215","https://openalex.org/W2048794438","https://openalex.org/W2054543351","https://openalex.org/W2057039461","https://openalex.org/W2068803497","https://openalex.org/W2087194253","https://openalex.org/W2087347434","https://openalex.org/W2089276145","https://openalex.org/W2096205677","https://openalex.org/W2096847629","https://openalex.org/W2098449509","https://openalex.org/W2099940443","https://openalex.org/W2100128827","https://openalex.org/W2101756295","https://openalex.org/W2103662262","https://openalex.org/W2105934885","https://openalex.org/W2107164534","https://openalex.org/W2109140440","https://openalex.org/W2110890874","https://openalex.org/W2111194889","https://openalex.org/W2111958600","https://openalex.org/W2114590627","https://openalex.org/W2115379950","https://openalex.org/W2115940646","https://openalex.org/W2117616929","https://openalex.org/W2117698408","https://openalex.org/W2123619513","https://openalex.org/W2125101937","https://openalex.org/W2128824222","https://openalex.org/W2130507939","https://openalex.org/W2131389289","https://openalex.org/W2131769415","https://openalex.org/W2132599705","https://openalex.org/W2132870739","https://openalex.org/W2133362393","https://openalex.org/W2139212933","https://openalex.org/W2139325411","https://openalex.org/W2139733965","https://openalex.org/W2142889610","https://openalex.org/W2142995284","https://openalex.org/W2143668817","https://openalex.org/W2145178600","https://openalex.org/W2145407176","https://openalex.org/W2145722235","https://openalex.org/W2146189323","https://openalex.org/W2146762449","https://openalex.org/W2149993684","https://openalex.org/W2150755264","https://openalex.org/W2150847526","https://openalex.org/W2155883880","https://openalex.org/W2157578436","https://openalex.org/W2157665255","https://openalex.org/W2157861429","https://openalex.org/W2160598920","https://openalex.org/W2163380389","https://openalex.org/W2164256494","https://openalex.org/W2164686665","https://openalex.org/W2167287136","https://openalex.org/W2167928197","https://openalex.org/W2168470593","https://openalex.org/W2170210941","https://openalex.org/W2170443772","https://openalex.org/W2170529556","https://openalex.org/W2170810185","https://openalex.org/W2328725012","https://openalex.org/W2340406763","https://openalex.org/W2532890539","https://openalex.org/W2752853835","https://openalex.org/W2792622858","https://openalex.org/W2913699766","https://openalex.org/W2989713547","https://openalex.org/W3161677312","https://openalex.org/W6679744984"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W2765763546","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2364419519","https://openalex.org/W2017948608","https://openalex.org/W2360767377","https://openalex.org/W2360951146"],"abstract_inverted_index":{"Detection":[0],"of":[1,12,43,75,85,220],"Denial-of-Service":[2],"(DoS)":[3],"attacks":[4,45,194],"has":[5,15],"attracted":[6],"researchers":[7],"since":[8],"1990s.":[9],"A":[10,51],"variety":[11],"detection":[13,42,90,153,160,188,199,209],"systems":[14],"been":[16],"proposed":[17,34,87,149,158],"to":[18,58,65],"achieve":[19],"this":[20],"task.":[21],"Unlike":[22],"the":[23,33,67,82,120,157,181],"existing":[24],"approaches":[25],"based":[26,95],"on":[27,96,119,201,211],"machine":[28],"learning":[29],"and":[30,41,64,113,138,171,195,206],"statistical":[31],"analysis,":[32],"system":[35,150,182,189],"treats":[36],"traffic":[37,62,77,223],"records":[38,63,68,78,224],"as":[39,46,81,131],"images":[40,74],"DoS":[44,88,193],"a":[47,97,115],"computer":[48],"vision":[49],"problem.":[50],"multivariate":[52],"correlation":[53],"analysis":[54],"approach":[55],"is":[56,93],"introduced":[57],"accurately":[59],"depict":[60],"network":[61,76],"convert":[66],"into":[69,111],"their":[70],"respective":[71],"images.":[72],"The":[73,177],"are":[79,164],"used":[80,99],"observed":[83],"objects":[84],"our":[86,148,187],"attack":[89],"system,":[91,161],"which":[92],"developed":[94],"widely":[98],"dissimilarity":[100,121,128],"measure,":[101],"namely":[102],"Earth":[103],"Mover's":[104],"Distance":[105],"(EMD).":[106],"EMD":[107],"takes":[108],"cross-bin":[109],"matching":[110],"account":[112],"provides":[114],"more":[116],"accurate":[117],"evaluation":[118,183,215],"between":[122],"distributions":[123],"than":[124],"some":[125],"other":[126],"well-known":[127],"measures,":[129],"such":[130],"Minkowski-form":[132],"distance":[133],"L":[134],"<sub":[135],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[136,141],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">p</sub>":[137],"X":[139],"<sup":[140],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>":[142],"statistics.":[143],"These":[144],"unique":[145],"merits":[146],"facilitate":[147],"with":[151,217],"effective":[152],"capabilities.":[154],"To":[155],"evaluate":[156],"EMD-based":[159],"ten-fold":[162],"cross-validations":[163],"conducted":[165],"using":[166],"KDD":[167,202],"Cup":[168,203],"99":[169,204],"dataset":[170,205,216],"ISCX":[172,212],"2012":[173,213],"IDS":[174,214],"Evaluation":[175],"dataset.":[176],"results":[178],"presented":[179],"in":[180],"section":[184],"illustrate":[185],"that":[186],"can":[190],"detect":[191],"unknown":[192],"achieves":[196],"99.95":[197],"percent":[198,208],"accuracy":[200,210],"90.12":[207],"processing":[218],"capability":[219],"approximately":[221],"59,000":[222],"per":[225],"second.":[226]},"counts_by_year":[{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":17},{"year":2021,"cited_by_count":21},{"year":2020,"cited_by_count":25},{"year":2019,"cited_by_count":27},{"year":2018,"cited_by_count":20},{"year":2017,"cited_by_count":14},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
