{“id”:“https://openalex.org/W3048151017“,”doi“:”https://doi.org/10.109/cns48642.2020.9162278“,”title“:“快速:稳健和自适应检测物联网的分布式拒绝服务流量”,”display_name“:“迅速:稳健和适应性检测物联网分布式拒绝服务流”,”publication_year“:2020,”publitation_date“:”2020-06-01“,”ids“:{”openalex“:”https://openalex.org/W3048151017“,”doi“:”https://doi.org/10.109/cns48642.2020.9162278“,”mag“:”3048151017“},”language“:”en“,”primary_location“:{”is_oa“:false,”landing_page_url“:”https://doi.org/10.109/cns48642.2020.9162278“,”pdf_url“:null,”source“:null,”license“:null',”licence_id“:null,”version“:nuller,”is_accepted“:false,”is_published“:false},”type“:”article“,”type_crossref“:“procesdings-article”,”indexed_in“:[”crossref“],”open_access“:{”is_oa“:false,”oa_status“:”closed“,”oa_url”:null“,”any_repository_has_fulltext“:false}”,”authorships“:[{”author_position“:”first“,”作者“:{”id“:”https://openalex.org/A5053483682“,”display_name“:”Samuel Mergendahl“,”orcid“:null},”institutions“:[{”id“:”https://openalex.org/I181233156“,”display_name“:”俄勒冈大学“,”ror“:”https://ror.org/0293rh119“,”country_code“:”US“,”type“:“教育”,”世系“:[”https://openalex.org/I181233156“]}],”国家“:[”美国“],”is_corresponding“:false,”raw_author_name“:”Samuel Mergendahl“,”raw关联字符串“:[“俄勒冈州大学,尤金OR#TAB#”]},{“author_position”:“last”,“author”:{“id”:“https://openalex.org/A5027835055“,”display_name“:”Jun Li“,”orcid“:”https://orcid.org/0000-0002-7172-7851},“机构”:[{“id”:https://openalex.org/I181233156“,”display_name“:”俄勒冈大学“,”ror“:”https://ror.org/0293rh119“,”country_code“:”US“,”type“:“教育”,”世系“:[”https://openalex.org/I181233156“]}],”国家“:[”美国“],”is_corresponding“:false,”raw_author_name“:”Jun Li“,”raw _affiliation_strings“:[“俄勒冈州大学,尤金OR#TAB#”]}],”countries_distict_count“:1,”institutions_disticenc_count“:l,”corresponding_author_ids“:[],”coresponding_institution_ids“引用_by_count”:6,“cited_by_percentile_year“:{“min”:84,“max”:85},“biblio”:{卷:null,“问题”:nullhttps://openalex.org/T10400“,”display_name“:”网络入侵检测和防御机制“,”score“:1.0,”subfield“:{”id“:”https://openalex.org/subfields/1705“,”display_name“:”计算机网络和通信“},”field“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},”主题“:[{”id“:”https://openalex.org/T10400“,”display_name“:”网络入侵检测和防御机制“,”score“:1.0,”subfield“:{”id“:”https://openalex.org/subfields/1705“,”display_name“:”计算机网络和通信“},”field“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},{”id“:”https://openalex.org/T11512“,”display_name“:”高维数据异常检测“,”score“:0.9996,”subfield“:{”id“:”https://openalex.org/subfields/s702“,”display_name“:”人工智能“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},{”id“:”https://openalex.org/T11598“,”“display_name”:“互联网流量分类的机器学习”,“score”:0.9976,“subfield”:{“id”:“https://openalex.org/subfields/s702“,”display_name“:”人工智能“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}}],”关键词“:[{”id“:”https://openalex.org/keywords/iot-security“,”display_name“:”物联网安全“,”score“:0.621172},{”id“:”https://openalex.org/keywords/ddos-attacks网站“,”display_name“:”DDoS攻击“,”score“:0.613817},{”id“:”https://openalex.org/keywords/iot-devices网站“,”display_name“:”物联网设备“,”score“:0.581314},{”id“:”https://openalex.org/keywords/outlier-detection“,”display_name“:”离群检测“,”score“:0.577803},{”id“:”https://openalex.org/keywords/intrusion-detection网站“,”display_name“:”入侵检测“,”score“:0.57383}],”concepts“:[{”id“:”https://openalex.org/C41008148,“wikidata”:https://www.wikidata.org/wiki/Q21198“,”display_name“:”计算机科学“,”level“:0,”score“:0.8129606},{”id“:”https://openalex.org/C38822068,“wikidata”:https://www.wikidata.org/wiki/Q131406“,”display_name“:”拒绝服务攻击“,”level“:3,”score“:0.8018718},{”id“:”https://openalex.org/C739882,“wikidata”:https://www.wikidata.org/wiki/Q3560506“,”display_name“:”异常检测“,”level“:2,”score“:0.73332745},{”id“:”https://openalex.org/C105339364,“wikidata”:https://www.wikidata.org/wiki/Q2297740“,”display_name“:”软件部署“,”级别“:2,”分数“:0.68894213},{”id“:”https://openalex.org/C153083717,“wikidata”:https://www.wikidata.org/wiki/Q6535263“,”display_name“:”杠杆(统计)“,”level“:2,”score“:0.5244132},{”id“:”https://openalex.org/C120865594,“wikidata”:https://www.wikidata.org/wiki/Q131406“,”“display_name”“:”应用层DDoS攻击“,”级别“:4,”分数“:0.45435348},{”id“:”https://openalex.org/C38652104,“wikidata”:https://www.wikidata.org/wiki/Q3510521“,”display_name“:”计算机安全“,”level“:1,”score“:0.43288288},{”id“:”https://openalex.org/C81860439,“wikidata”:https://www.wikidata.org/wiki/Q251212“,”display_name“:”物联网“,”level“:2,”score“:0.4101302},{”id“:”https://openalex.org/C120314980,“wikidata”:https://www.wikidata.org/wiki/Q180634网址“,”display_name“:”分布式计算“,”level“:1,”score“:0.37758237},{”id“:”https://openalex.org/C31258907,“wikidata”:https://www.wikidata.org/wiki/Q1301371“,”display_name“:”计算机网络“,”level“:1,”score“:0.37242544},{”id“:”https://openalex.org/C154945302,“wikidata”:https://www.wikidata.org/wiki/Q11660“,”display_name“:”人工智能“,”level“:1,”score“:0.3692491},{”id“:”https://openalex.org/C110875604,“wikidata”:https://www.wikidata.org/wiki/Q75“,”display_name“:”The Internet“,”level“:2,”score“:0.36505425},{”id“:”https://openalex.org/C111919701,“wikidata”:https://www.wikidata.org/wiki/Q9135“,”display_name“:”操作系统“,”level“:1,”score“:0.0},{”id“:”https://openalex.org/C136764020,“wikidata”:https://www.wikidata.org/wiki/Q466“,”display_name“:”万维网“,”level“:1,”score“:0.0}],”mesh“:[],”locations_count“:1.”locations“:[{”is_oa“:false,”landing_page_url“:”https://doi.org/10.109/cns48642.2020.9162278“,”pdf_url“:null,”source“:null,”license“:null:”license_id“:null,”version“:number,”is_accepted“:false,”is_published“:false}],”best_oa_location“:nul,”sustainable_development_goals“:[],”grants“:[],”datasets“:],”versions“:[]:”,“referenced_works_count”:33,“referrenced_works”:[”https://openalex.org/W1524600321","https://openalex.org/W1985987493","https://openalex.org/W2026453187","https://openalex.org/W2036455044","https://openalex.org/W2104593144","https://openalex.org/W2111542531","https://openalex.org/W2111942706","https://openalex.org/W2111958600","https://openalex.org/W2118429038","https://openalex.org/W2121511513","https://openalex.org/W2122217421","https://openalex.org/W2127273221","https://openalex.org/W2157733102","https://openalex.org/W2626967530","https://openalex.org/W2734858986","https://openalex.org/W2748868501","https://openalex.org/W2753352458","https://openalex.org/W2762390651","https://openalex.org/W2766702586","https://openalex.org/W2767094836","https://openalex.org/W2775542991","https://openalex.org/W2800094109","https://openalex.org/W2888505697","https://openalex.org/W2892556724","https://openalex.org/W2896424304","https://openalex.org/W2899670782","https://openalex.org/W2930144424","https://openalex.org/W2947969447","https://openalex.org/W2951626887","https://openalex.org/W2963197901","https://openalex.org/W3122864121","https://openalex.org/W3161677312","https://openalex.org/W4246071789“],”related_works“:[”https://openalex.org/W4376486703","https://openalex.org/W4225146958","https://openalex.org/W3026018975","https://openalex.org/W2376172429","https://openalex.org/W2372606455","https://openalex.org/W2360429410","https://openalex.org/W2189314507","https://openalex.org/W2105462833","https://openalex.org/W1484565796","https://openalex.org/W127772673“],”ngrams_url“:”https://api.openalex.org/works/W3048151017/ngrams“,”abstract_inverted_index“:{”The“:[0],”ubiquity“:[1],”of“:[2,5,40160],”The“:[3,34,38,41125157],”Internet“:[4],”Things“:[6],”(IoT)“:[7],”can“:[8,24239],”cause“:[9],“destroative”:[10],”distributed“:[11],”denial-of-service“:[12],”(DDoS)“:[13],”attacks.““In”:[15],“order”:[16133],“to”:[17102108134167207210],“thwart”:[18]物联网启用“:[19151],“DDoS”:[20,35152],“攻击”:[21],“网络”:[22,58128173212228],“运营商”:[23,59],“部署”:[25,61],“an”:[26],“异常”:[27,44,77144],“检测”:[28,45,78145179],“系统”:[29,73169216237],“that”:[30,63148201230],“探测”:[31150],“和”:[32115222],“缓解“:[33],”流量“:[36105],”近“:[37],”源“:[39],“攻击”:[42246],“不幸”:[43],“系统”:[46,62,79],“面”:[47],“冲突”:[48],“现实世界”:[49],“部署”:[50,88138],“挑战”:[51],“in”:[52,89220],“物联网”:[53,57,90137161172],“网络”:[54,91],“即”:[55],“多”:[56,83],“不能”:[60232],“需要”:[64],“手动”:[65215],“参数”:[66],“调谐”:[67],“或”:[68129],“标签”:[69],“但是”:[70154192],“没有”:[71214],“这样”:[72185],“维护”:[74],“以前”:[75],“建议”:[76],“显示”:[80],“远”:[81],“太”:[82],“假”:[84],“阳性”:[85],“对于”:[86],“可接受”:[87],“到”:[92],“恶化”:[93],“这个”:[94],“问题”:[95],“预培训”:[96],“机器”:[97182],“学习”:[98183199],“模型”:[99],“经常”:[100],“失败”:[101],“准确”:[103],“分类”:[104],“何时”:[106],“移植”:[107],“a”:[109142196],“新”:[110211],“环境”:[111],:[120],“数据”:[121],“刻苦”:[122],“收集”:[123],“来自”:[124171],“新”:[126],“部署”:[127],“展示”:[130],“差”:[131],“准确性。在:[132],“克服”:[135],“这些”:[136],“挑战”:[139],“我们”:[140225],“提议”:[141],“新颖”:[143197],“系统”,:[146],“快速”:[147],“成功”:[149],“攻击”:[153],“也”:[155],“满足”:[156],“精度”:[158],“需求”:[159],“低于”:[162],“偏移”:[164],“小”:[166],“否”:[168],“维护”:[170],“操作员”:[174],“快速”:[175194218],“初始”:[176],“提供”:[177],“健壮”:[178],“通过”:[180],“高级”:[181],“技术”:[184229],“as”:[186],“长”:[187],“短”:[188],“术语”:[189],“记忆”:[190],“(LSTM),”:[191],“进一步”:[193],“介绍”:[195],“活动”:[198],“技术”:[200],“交织”:[202],“紧密”:[203],“攻击”:[205],“缓解”:[206],“自动”:[208],“适应”:[209],“域”:[213],“维护”:[217],“操作”:[219],“实时”:[221],“偶数”:[223],“虽然”:[224],“杠杆”:[226],“神经”:[227],“典型”:[231],“解释”:[233],“他们的”:[234],“预测”:[235],“我们的”:[236],“架构”:[238],“提供”:[240],“诊断”:[241],“洞察”:[242],“进入”:[243],“任何”:[244],“检测到”:[245]},“引用_by_api_url”:“https://api.openalex.org/works?filter=cites:W3048151017“,”counts_by_year“:[{”年份“:2024,”cited_by_count“:1},{”年“:2023,”ciped_by_cunt“:3},”{“年份”:2021,“cited_by_count”:2}],”updated_date“:”2024-05-10T23:50:22.676815“,”created_date:“2020-08-13”}