<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Non-Linear Analytic Prediction of IP Addresses for Supporting Cyber Attack Detection and Analysis</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Alfredo</forename><surname>Cuzzocrea</surname></persName>
							<email>alfredo.cuzzocrea@unical.it</email>
							<affiliation key="aff0">
								<orgName type="laboratory">iDEA Lab</orgName>
								<orgName type="institution">University of Calabria</orgName>
								<address>
									<settlement>Rende</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Enzo</forename><surname>Mumolo</surname></persName>
							<email>mumolo@units.it</email>
							<affiliation key="aff1">
								<orgName type="institution">University of Trieste</orgName>
								<address>
									<settlement>Trieste</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Edoardo</forename><surname>Fadda</surname></persName>
							<email>edorardo.fadda@polito.it</email>
							<affiliation key="aff2">
								<orgName type="institution">Politecnico di Torino &amp; ISIRES</orgName>
								<address>
									<settlement>Torino</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Selim</forename><surname>Soufargi</surname></persName>
							<email>selim.soufargi@unical.it</email>
							<affiliation key="aff3">
								<orgName type="laboratory">iDEA Lab</orgName>
								<orgName type="institution">University of Calabria</orgName>
								<address>
									<settlement>Rende</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Carson</forename><forename type="middle">K</forename><surname>Leung</surname></persName>
							<email>kleung@cs.umanitoba.ca</email>
							<affiliation key="aff4">
								<orgName type="institution">University of Manitoba</orgName>
								<address>
									<settlement>Winnipeg</settlement>
									<region>MB</region>
									<country key="CA">Canada</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Non-Linear Analytic Prediction of IP Addresses for Supporting Cyber Attack Detection and Analysis</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">B46D1420337375827F3415F2E734DC46</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T02:53+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Cyber Attack</term>
					<term>Distributed Denial of Service</term>
					<term>Hammerstein Models</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Computer network systems are often subject to several types of attacks. For example the distributed Denial of Service (DDoS) attack introduces an excessive traffic load to a web server to make it unusable. A popular method for detecting attacks is to use the sequence of source IP addresses to detect possible anomalies. With the aim of predicting the next IP address, the Probability Density Function of the IP address sequence is estimated. Prediction of source IP address in the future access to the server is meant to detect anomalous requests. In this paper we consider the sequence of IP addresses as a numerical sequence and develop the nonlinear analysis of the numerical sequence. We used nonlinear analysis based on Volterra's Kernels and Hammerstein's models. The experiments carried out with datasets of source IP address sequences show that the prediction errors obtained with Hammerstein models are smaller than those obtained both with the Volterra Kernels and with the sequence clustering by means of the K-Means algorithm.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>User modeling is an important task for web applications dealing with large traffic flows. They can be used for a variety of applications such as to predict future situations or classify current states. Furthermore, user modeling can improve detection or mitigation of Distributed Denial of Service (DDoS) attack <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b2">3]</ref>, improve the quality of service (QoS) <ref type="bibr" target="#b3">[4]</ref>, individuate click fraud detection and optimize traffic management. In peer-to-peer (P2P) overlay networks, IP models can also be used for optimizing request routing <ref type="bibr" target="#b4">[5]</ref>. Those techniques are used by severs for deciding how to manage the actual traffic. In this context, also outlier detection methods are often used if only one class is known. If, for example, an Intrusion Prevention System wants to mitigate DDoS attacks, it usually has only seen the normal traffic class before and it has to detect the outlier class by its different behavior. In this paper we deal with the management of DDos because nowadays it has become a major threat in the internet. Those attacks are done by using a large scaled networks of infected PCs (bots or zombies) that combine their bandwidth and computational power in order to overload a publicly available service and denial it for legal users. Due to the open structure of the internet, all public servers are vulnerable to DDoS attacks. The bots are usually acquired automatically by hackers who use software tools to scan through the network, detecting vulnerabilities and exploiting the target machine. Furthermore, there is also a strong need to mitigate DDoS attacks near the target, which seems to be the only solution to the problem in the current internet infrastructure. The aim of such a protection system is to limit their destabilizing effect on the server through identifying malicious requests. There are multiple strategies with dealing with DDoS attacks. The most effective ones are the near-target filtering solutions. They estimates normal user behavior based on IP packet header information. Then, during an attack the access of outliers is denied. One parameter that all methods have in common is the source IP address of the users. It is the main discriminant for DDoS traffic classification. However, the methods of storing IP addresses and estimating their density in the huge IP address space, are different. In this paper, we present a novel approach based on system identification techniques and, in particular, on the Hammerstein models.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Non-Linear Analytic Prediction of IP Addresses</head><p>Data driven identification of mathematical models of physical systems (i.e. nonlinear) starts with representing the systems as a black box. In other terms, while we may have access to the inputs and outputs, the internal mechanisms are totally unknown to us. Once a model type is chosen to represent the system, its parameters are estimated through an optimization algorithm so that eventually the model mimics at a certain level of fidelity the inner mechanism of the nonlinear system or process using its inputs and outputs. These approach is, for instance, widely used in the related big data analytics area (e.g., <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b7">8,</ref><ref type="bibr" target="#b8">9,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b11">12,</ref><ref type="bibr" target="#b12">13,</ref><ref type="bibr" target="#b13">14]</ref>)</p><p>In this work, we consider a particular sub-class of nonlinear predictors: the Linear-in-theparameters (LIP) predictors. LIP predictors are characterized by a linear dependence of the predictor output on the predictor coefficients. Such predictors are inherently stable, and that they can converge to a globally minimum solution (in contrast to other types of nonlinear filters whose cost function may exhibit many local minima) avoiding the undesired possibility of getting stuck in a local minimum. Let us consider a causal, time-invariant, finite-memory,continuous nonlinear predictor as described in <ref type="bibr" target="#b0">(1)</ref>.</p><formula xml:id="formula_0">𝑠 ˆ(𝑛) = 𝑓 [𝑠(𝑛 − 1), . . . , 𝑠(𝑛 − 𝑁 )]<label>(1)</label></formula><p>where 𝑓 [•] is a continuous function, 𝑠(𝑛) is the input signal and 𝑠 ˆ(𝑛) is the predicted sample. We can expand 𝑓 [•] with a series of basis functions 𝑓 𝑖 (𝑛), as shown in <ref type="bibr" target="#b1">(2)</ref>.</p><formula xml:id="formula_1">𝑠 ˆ(𝑛) = ∞ ∑︁ 𝑖=1 ℎ(𝑖)𝑓 𝑖 [𝑠(𝑛 − 𝑖)]<label>(2)</label></formula><p>where ℎ(𝑖) a re proper coefficients. To make (2) realizable we truncate the series to the first 𝑁 terms, thus we obtain</p><formula xml:id="formula_2">𝑠 ˆ(𝑛) = 𝑁 ∑︁ 𝑖=1 ℎ(𝑖)𝑓 𝑖 [𝑠(𝑛 − 𝑖)]<label>(3)</label></formula><p>In the general case, a linear-in-the-parameters nonlinear predictor is described by the inputoutput relationship reported in <ref type="bibr" target="#b3">(4)</ref>.</p><formula xml:id="formula_3">𝑠 ˆ(𝑛) = 𝐻 ⃗ 𝑇 𝑋 ⃗ (𝑛)<label>(4)</label></formula><p>where 𝐻 ⃗ 𝑇 is a row vector containing predictor coefficients and 𝑋 ⃗ (𝑛) is the corresponding column vector whose elements are nonlinear combinations and/or expansions of the input samples.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Linear Predictor</head><p>Linear prediction is a well known technique with a long history <ref type="bibr" target="#b14">[15]</ref>. Given a time series 𝑋 ⃗ , linear prediction is the optimum approximation of sample 𝑥(𝑛) with a linear combination of the 𝑁 most recent samples. That means that the linear predictor is described as eq. ( <ref type="formula" target="#formula_4">5</ref>).</p><formula xml:id="formula_4">𝑠 ˆ(𝑛) = 𝑁 ∑︁ 𝑖=1 ℎ 1 (𝑖)𝑠(𝑛 − 𝑖)<label>(5)</label></formula><p>or in matrix form as</p><formula xml:id="formula_5">𝑠 ˆ(𝑛) = 𝐻 ⃗ 𝑇 𝑋 ⃗ (𝑛)<label>(6)</label></formula><p>where the coefficient and input vectors are reported in ( <ref type="formula" target="#formula_6">7</ref>) and <ref type="bibr" target="#b7">(8)</ref>.</p><formula xml:id="formula_6">𝐻 ⃗ 𝑇 = [︀ ℎ 1 (1) ℎ 1 (2) . . . ℎ 1 (𝑁 ) ]︀<label>(7)</label></formula><formula xml:id="formula_7">𝑋 ⃗ 𝑇 = [︀ 𝑠(𝑛 − 1) 𝑠(𝑛 − 2) . . . 𝑠(𝑛 − 𝑁 ) ]︀<label>(8)</label></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Non-Linear Predictor based on Volterra Series</head><p>As well as Linear Prediction, Non Linear Prediction is the optimum approximation of sample 𝑥(𝑛) with a non linear combination of the 𝑁 most recent samples. Popular nonlinear predictors are based on Volterra series <ref type="bibr" target="#b15">[16]</ref>. A Volterra predictor based on a Volterra series truncated to the second term is reported in <ref type="bibr" target="#b8">(9)</ref>.</p><formula xml:id="formula_8">𝑥 ˆ(𝑛) = 𝑁 1 ∑︁ 𝑖=1 ℎ 1 (𝑖)𝑥(𝑛 − 𝑖) + 𝑁 2 ∑︁ 𝑖=1 𝑁 2 ∑︁ 𝑗=𝑖 ℎ 2 (𝑖, 𝑗)𝑥(𝑛 − 𝑖)𝑥(𝑛 − 𝑗)<label>(9)</label></formula><p>where the symmetry of the Volterra kernel (the ℎ coefficients) is considered. In matrix terms, the Volterra predictor is represented in <ref type="bibr" target="#b9">(10)</ref>.</p><formula xml:id="formula_9">𝑠 ˆ(𝑛) = 𝐻 ⃗ 𝑇 𝑋 ⃗ (𝑛)<label>(10)</label></formula><p>where the coefficient and input vectors are reported in ( <ref type="formula" target="#formula_10">12</ref>) and <ref type="bibr" target="#b11">(12)</ref>.</p><formula xml:id="formula_10">𝐻 ⃗ 𝑇 = [︂ ℎ 1 (1) ℎ 1 (2) . . . ℎ 1 (𝑁 ) ℎ 2 (1, 1) ℎ 2 (1, 2) . . . ℎ 2 (𝑁 2 , 𝑁 2 ) ]︂ (11) 𝑋 ⃗ 𝑇 = [︂ 𝑠(𝑛 − 1) 𝑠(𝑛 − 2) . . . 𝑠(𝑛 − 𝑁 1 ) 𝑠 2 (𝑛 − 1) 𝑠(𝑛 − 1)𝑠(𝑛 − 2) . . . 𝑠 2 (𝑛 − 𝑁 2 ) ]︂<label>(12)</label></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Non-Linear Predictor based on Functional Link Artificial Neural Networks (FLANN)</head><p>FLANN is a single layer neural network without hidden layer. The nonlinear relationships between input and output are captured through function expansion of the input signal exploiting suitable orthogonal polynomials. Many authors used for examples trigonometric, Legendre and Chebyshev polynomials. However, the most frequently used basis function used in FLANN for function expansion are trigonometric polynomials <ref type="bibr" target="#b16">[17]</ref>. The FLANN predictor can be represented by eq.( <ref type="formula" target="#formula_11">13</ref>).</p><formula xml:id="formula_11">𝑠 ˆ(𝑛) = 𝑁 ∑︁ 𝑖=1 ℎ 1 (𝑖)𝑠(𝑛 − 𝑖) + 𝑁 ∑︁ 𝑖=1 𝑁 ∑︁ 𝑗=1 ℎ 2 (𝑖, 𝑗) cos[𝑖𝜋𝑠(𝑛 − 𝑗)]+ 𝑁 ∑︁ 𝑖=1 𝑁 ∑︁ 𝑗=1 ℎ 2 (𝑖, 𝑗) sin[𝑖𝜋𝑠(𝑛 − 𝑗)]<label>(13)</label></formula><p>Also in this case the Flann predictor can be represented using the matrix form reported in <ref type="bibr" target="#b9">(10)</ref>.</p><formula xml:id="formula_12">𝑠 ˆ(𝑛) = 𝐻 ⃗ 𝑇 𝑋 ⃗ (𝑛)<label>(14)</label></formula><p>where the coefficient and input vectors of FLANN predictors are reported in <ref type="bibr" target="#b21">(22)</ref> and (23).</p><formula xml:id="formula_13">𝐻 ⃗ 𝑇 = ⎡ ⎣ ℎ 1 (1) ℎ 1 (2) . . . ℎ 1 (𝑁 ) ℎ 2 (1, 1) ℎ 2 (1, 2) . . . ℎ 2 (𝑁 2 , 𝑁 2 ) ℎ 3 (1, 1) ℎ 3 (1, 2) . . . ℎ 3 (𝑁 2 , 𝑁 2 ) ⎤ ⎦ (15) 𝑋 ⃗ 𝑇 = ⎡ ⎣ 𝑠(𝑛 − 1) 𝑠(𝑛 − 2) . . . 𝑠(𝑛 − 𝑁 ) cos[𝜋𝑠(𝑛 − 1)] cos[𝜋𝑠(𝑛 − 2)] . . . . . . cos[𝑁 2 𝜋𝑠(𝑛 − 𝑁 2 )] sin[𝜋𝑠(𝑛 − 1)] sin[𝜋𝑠(𝑛 − 2)] . . . . . . sin[𝑁 2 𝜋𝑥(𝑠 − 𝑁 2 )] ⎤ ⎦<label>(16)</label></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4.">Non-Linear Predictors based on Hammerstein Models</head><p>Previous research <ref type="bibr" target="#b17">[18]</ref> shown that many real nonlinear systems, spanning from electromechanical systems to audio systems, can be modeled using a static non-linearity. These terms capture the system nonlinearities, in series with a linear function, which capture the system dynamics as shown in Figure <ref type="figure" target="#fig_0">1</ref>. Indeed, the front-end of the so called Hammerstein Model is formed by a nonlinear function whose input is the system input. Of course the type of non-linearity depends on the actual physical system to be modeled. The output of the nonlinear function is hidden and is fed as input of the linear function. In the following, we assume that the non-linearity is a finite polynomial expansion, and the linear dynamic is realized with a Finite Impulse Response (FIR) filter. Furthermore, in contrast with <ref type="bibr" target="#b17">[18]</ref>, we assume a mean error analysis and we postpone the analysis in the robust framework in future work. In other word,</p><formula xml:id="formula_14">x (n) 2 x (n) 3 x (n) m . . . + p m FIR x(n) y(n) p 2 p 3</formula><formula xml:id="formula_15">𝑧(𝑛) = 𝑝(2)𝑥 2 (𝑛) + 𝑝(3)𝑥 3 (𝑛) + . . . 𝑝(𝑚)𝑥 𝑚 (𝑛) = 𝑀 ∑︁ 𝑖=2 𝑝(𝑖)𝑥 𝑖 (𝑛)<label>(17)</label></formula><p>On the other hand, the output of the FIR filter is:</p><formula xml:id="formula_16">𝑦(𝑛) = ℎ 0 (1)𝑧(𝑛 − 1) + ℎ 0 (2)𝑧(𝑛 − 2) + . . . + ℎ 0 (𝑁 )𝑧(𝑛 − 𝑁 ) = = 𝑁 ∑︁ 𝑗=1 ℎ 0 (𝑗)𝑧(𝑛 − 𝑗)<label>(18)</label></formula><p>Substituting <ref type="bibr" target="#b16">(17)</ref> in <ref type="bibr" target="#b19">(20)</ref> we have:</p><formula xml:id="formula_17">𝑦(𝑛) = 𝑁 ∑︁ 𝑖=1 ℎ 0 (𝑖)𝑧(𝑛 − 𝑖) = 𝑁 ∑︁ 𝑗=1 ℎ 0 (𝑗) 𝑀 ∑︁ 𝑖=2 𝑝(𝑖)𝑥 𝑖 (𝑛 − 𝑗) = 𝑀 ∑︁ 𝑖=2 𝑁 ∑︁ 𝑗=1 ℎ 0 (𝑗)𝑝(𝑖)𝑥 𝑖 (𝑛 − 𝑗)<label>(19)</label></formula><p>Setting 𝑐(𝑖, 𝑗) = ℎ 0 (𝑗)𝑝(𝑖) we write</p><formula xml:id="formula_18">𝑦(𝑛) = 𝑀 ∑︁ 𝑖=2 𝑁 ∑︁ 𝑗=1 𝑐(𝑖, 𝑗)𝑥 𝑖 (𝑛 − 𝑗)<label>(20)</label></formula><p>This equation can be written in matrix form as</p><formula xml:id="formula_19">𝑠 ˆ(𝑛) = 𝐻 ⃗ 𝑇 𝑋 ⃗ (𝑛)<label>(21)</label></formula><p>where </p><formula xml:id="formula_20">𝐻 ⃗ 𝑇 = ⎡ ⎣ 𝑐(2,</formula><formula xml:id="formula_21">𝑋 ⃗ 𝑇 = ⎡ ⎣ 𝑠 2 (𝑛 − 2) 𝑠 2 (𝑛 − 3) . . . 𝑠 2 (𝑛 − 𝑁 ) 𝑠 3 (𝑛 − 2) 𝑠 3 (𝑛 − 3) . . . 𝑠 3 (𝑛 − 𝑁 ) 𝑠 𝑀 (𝑛 − 2) 𝑠 𝑀 (𝑛 − 3) . . . 𝑠 𝑀 (𝑛 − 1) 𝑠 𝑀 (𝑛 − 3) . . . 𝑠 𝑀 (𝑛 − 𝑁 ) ⎤ ⎦ (23)</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Predictor Parameters Estimation</head><p>So far we saw that all the predictors can be expressed, at time instant 𝑛, as</p><formula xml:id="formula_22">𝑠 ˆ(𝑛) = 𝐻 ⃗ 𝑇 𝑋 ⃗ (𝑛)<label>(24)</label></formula><p>with different definitions of the input, 𝑋 ⃗ (𝑛), end parameters vectors 𝐻 ⃗ 𝑇 . There are two well known possibilities for estimating the optimal parameter vector.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Block-based Approach</head><p>The Minimum Mean Square estimation is based on the minimization of the mathematical expectation of the squared prediction error 𝑒(𝑛) = 𝑠(𝑛) − 𝑠 ˆ(𝑛)</p><formula xml:id="formula_23">𝐸[𝑒 2 ] = 𝐸[(𝑠(𝑛) − 𝑠 ˆ(𝑛)) 2 ] = 𝐸[(𝑠(𝑛) − 𝐻 ⃗ 𝑇 𝑋 ⃗ (𝑛)) 2 ]<label>(25)</label></formula><p>The minimization of ( <ref type="formula" target="#formula_23">25</ref>) is obtain by setting to zero the Laplacian of the mathematical expectation of the squared prediction error:</p><formula xml:id="formula_24">∇ 𝐻 𝐸[𝑒 2 ] = 𝐸[∇ 𝐻 𝑒 2 ] = 𝐸[2𝑒(𝑛)∇ 𝐻 𝑒] = 0<label>(26)</label></formula><p>which leads to the well known unique solution</p><formula xml:id="formula_25">𝐻 ⃗ 𝑜𝑝𝑡 = 𝑅 ⃗ −1 𝑥𝑥 𝑅 ⃗ 𝑠𝑥<label>(27)</label></formula><p>where</p><formula xml:id="formula_26">𝑅 ⃗ 𝑥𝑥 (𝑛) = 𝐸[𝑋 ⃗ (𝑛)𝑋 ⃗ 𝑇 (𝑛)]<label>(28)</label></formula><p>is the statistical auto-correlation matrix of the input vector 𝑋 ⃗ (𝑛) and</p><formula xml:id="formula_27">𝑅 ⃗ 𝑠𝑥 (𝑛) = 𝐸[𝑠(𝑛)𝑋 ⃗ (𝑛)]<label>(29)</label></formula><p>is the statistical cross-correlation vector between the signal 𝑠(𝑛) and the input vector 𝑋 ⃗ (𝑛).</p><p>The mathematical expectations of the auto and cross correlation are estimated using</p><formula xml:id="formula_28">𝑅 ⃗ 𝑥𝑥 (𝑛) = ∑︀ 𝑛 𝑘=1 𝑋 ⃗ (𝑛)𝑋 ⃗ 𝑇 (𝑛) 𝑛<label>(30)</label></formula><p>is the statistical auto-correlation matrix of the input vector 𝑋 ⃗ (𝑛) and</p><formula xml:id="formula_29">𝑅 ⃗ 𝑠𝑥 (𝑛) = ∑︀ 𝑛 𝑘=1 𝑠(𝑘)(𝑛)𝑋 ⃗ (𝑛) 𝑛 (31)</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Adaptive Approach</head><p>Let us consider a general second order terms of a Volterra predictor</p><formula xml:id="formula_30">𝑦(𝑛) = 𝑁 −1 ∑︁ 𝑘=0 𝑁 −1 ∑︁ 𝑟=0 ℎ 2 (𝑘, 𝑟)𝑥(𝑛 − 𝑘)𝑥(𝑛 − 𝑟)<label>(32)</label></formula><p>It can be generalized for higher order term as</p><formula xml:id="formula_31">𝑁 ∑︁ 𝑘 1 =1 • • • 𝑁 ∑︁ 𝑘𝑝=1 𝑐 𝑘 1 • • • 𝑐 𝑘𝑝 𝐻 𝑝 {︀ 𝑥 𝑘 1 (𝑛), • • • 𝑥 𝑘𝑝 (𝑛) }︀ (<label>33</label></formula><formula xml:id="formula_32">)</formula><p>where</p><formula xml:id="formula_33">𝑁 ∑︁ 𝑘=1 𝑐 𝑘 𝑥 𝑘 (𝑛). (<label>34</label></formula><formula xml:id="formula_34">)</formula><p>For the sake of simplicity and without loss of generality, we consider a Volterra predictor based on a Volterra series truncated to the second term</p><formula xml:id="formula_35">𝑟 ˆ(𝑛) = 𝑁 1 ∑︁ 𝑖=1 ℎ 1 (𝑖)𝑟(𝑛 − 𝑖) + 𝑁 2 ∑︁ 𝑖=1 𝑁 2 ∑︁ 𝑗=𝑖 ℎ 2 (𝑖, 𝑗)𝑟(𝑛 − 𝑖)𝑟(𝑛 − 𝑗)<label>(35)</label></formula><p>By defining</p><formula xml:id="formula_36">𝐻 𝑇 (𝑛) = |ℎ 1 (1), • • • , ℎ 1 (𝑁 1 ) , ℎ 2 (1, 1), • • • , ℎ 2 (𝑁 2 , 𝑁 2 )|<label>(36)</label></formula><p>and</p><formula xml:id="formula_37">𝑋 𝑇 (𝑛) = ⃒ ⃒ 𝑟(𝑛 − 1), • • • , 𝑟 (𝑛 − 𝑁 1 ) , 𝑟 2 (𝑛 − 1) 𝑟(𝑛 − 1)𝑟(𝑛 − 2), • • • , 𝑟 2 (𝑛 − 𝑁 2 ) | (37)</formula><p>Eq (35) can be rewritten as follows</p><formula xml:id="formula_38">𝑟 ˆ(𝑛) = 𝐻 𝑇 (𝑛)𝑋(𝑛).<label>(38)</label></formula><p>In order to estimate the best parameters 𝐻, we consider the following loss function</p><formula xml:id="formula_39">𝐽 𝑛 (𝐻) = 𝑛 ∑︁ 𝑘=0 𝜆 𝑛−𝑘 [︀ 𝑟 ˆ(𝑘) − 𝐻 𝑇 (𝑛)𝑋(𝑘) ]︀ 2<label>(39)</label></formula><p>where 𝜆 𝑛−𝑘 weights the relative importance of each squared error. In order to find the 𝐻 that minimizes the convex function (39) it is enough to impose its gradient to zero, i.e.,</p><formula xml:id="formula_40">∇ 𝐻 𝐽 𝑛 (𝐻) = 0 (40) That is equivalent to 𝑅 𝑋𝑋 (𝑛)𝐻(𝑛) = 𝑅 𝑟𝑋 (𝑛)<label>(41)</label></formula><p>where</p><formula xml:id="formula_41">𝑅 𝑋𝑋 (𝑛) = ∑︀ 𝑛 𝑘=0 𝜆 𝑛−𝑘 𝑋(𝑘)𝑋 𝑇 (𝑘) 𝑅 𝑟𝑋 (𝑛) = ∑︀ 𝑛 𝑘=0 𝜆 𝑛−𝑘 𝑟(𝑘)𝑋(𝑘)<label>(42)</label></formula><p>It follows that the best 𝐻 can be computed by</p><formula xml:id="formula_42">𝐻(𝑛) = 𝑅 −1 𝑋𝑋 (𝑛)𝑅 𝑟𝑋 (𝑛)<label>(43)</label></formula><p>Since</p><formula xml:id="formula_43">𝑅 𝑋𝑋 (𝑛) = 𝜆𝑅 𝑋𝑋 (𝑛 − 1) + 𝑋(𝑛)𝑋 𝑇 (𝑛)<label>(44)</label></formula><p>it follows that</p><formula xml:id="formula_44">𝑅 −1 𝑋𝑋 (𝑛) = 1 𝜆 [︀ 𝑅 −1 𝑋𝑋 (𝑛 − 1) − 𝑘(𝑛)𝑋 𝑇 (𝑛)𝑅 −1 𝑋𝑋 (𝑛 − 1) ]︀<label>(45)</label></formula><p>where 𝑘(𝑛) is equal to</p><formula xml:id="formula_45">𝑘(𝑛) = 𝑅 −1 𝑋𝑋 (𝑛 − 1)𝑋(𝑛) 𝜆 + 𝑋 𝑇 (𝑛)𝑅 −1 𝑋𝑋 (𝑛 − 1)𝑋(𝑛)<label>(46)</label></formula><p>Instead, matrix 𝑅 𝑟𝑋 (𝑛) in ( <ref type="formula" target="#formula_42">43</ref>) can be written as</p><formula xml:id="formula_46">𝑅 𝑟𝑋 (𝑛) = 𝜆𝑅 𝑟𝑋 (𝑛 − 1) + 𝑟(𝑛)𝑋(𝑛)<label>(47)</label></formula><p>Thus, inserting Eq (47) and Eq (45)in Eq (43) and rearranging the terms, we obtain</p><formula xml:id="formula_47">𝐻(𝑛) = 𝐻(𝑛 − 1) + 𝑅 −1 𝑋𝑋 (𝑛)𝑋(𝑛)𝜖(𝑛)<label>(48)</label></formula><p>where</p><formula xml:id="formula_48">𝜖 = 𝑟 ˆ(𝑛) − 𝐻 𝑇 (𝑛 − 1)𝑋(𝑛)<label>(49)</label></formula><p>By recalling Eq. ( <ref type="formula" target="#formula_45">46</ref>), we can write Eq. (48) as</p><formula xml:id="formula_49">𝐻(𝑛) = 𝐻(𝑛 − 1) + 𝜖(𝑛)𝑘(𝑛)<label>(50)</label></formula><p>By introducing, the new notation,</p><formula xml:id="formula_50">𝐹 (𝑛) = 𝑆 𝑇 (𝑛 − 1)𝑋(𝑛)<label>(51)</label></formula><p>The previous equations can be resumed by the following system</p><formula xml:id="formula_51">⎧ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎨ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎩ 𝐿(𝑛) = 𝑆(𝑛 − 1)𝐹 (𝑛) 𝛽(𝑛) = 𝜆 + 𝐹 𝑇 (𝑛)𝐹 (𝑛) 𝛼(𝑛) = 1 𝛽(𝑛)+ √ 𝜆𝛽(𝑛) 𝑆(𝑛) = 1 √ 𝜆 [︀ 𝑆(𝑛 − 1) − 𝛼(𝑛)𝐿(𝑛)𝐹 𝑇 (𝑛) ]︀ 𝜖(𝑛) = 𝑟 ˆ(𝑛 − 1) − 𝛼(𝑛)𝐿(𝑛)𝐹 𝑇 (𝑛) 𝜖(𝑛) = 𝐻(𝑛 − 1) + 𝐿(𝑛) 𝜖(𝑛) 𝛽(𝑛)<label>(52)</label></formula><p>It should be noted that by using Eq (52) the estimation adapts in each step in order to decrease the error. Thus, the system structure is somehow similar to the Kalman filter.</p><p>Finally, we define the estimation error as</p><formula xml:id="formula_52">𝑒(𝑛) = 𝑟(𝑛) − 𝐻 𝑇 (𝑛)𝑋(𝑛)<label>(53)</label></formula><p>It is worth noting that the computation of the predicted value from Eq. (38) requires 6𝑁 tot +2𝑁 2 tot operations, where 𝑁 tot = 𝑁 1 + 𝑁 2 (𝑁 2 + 1) /2.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Experiments</head><p>In order to prove the effectiveness of the proposed approach, in this section we present our experimental results for a real dataset. Specifically, we consider the requests made to the 1998 World Cup Web site between April 30, 1998 and July 26, 1998 In the dataset, 87 days are reported. We use the first one in order to initialise the estimator in (35) and we use the others as test set by using a rolling horizon method (as in <ref type="bibr" target="#b17">[18]</ref>). Particularly, for each day 𝑡 we compute the estimation by using all the IP observations in the previous days [0, 𝑡 − 1]. The results are reported in Figure <ref type="figure" target="#fig_1">2</ref>. The increase of errors in June is due to the sudden increment of different IP accessing the website due to the start of the competition (see <ref type="bibr" target="#b18">[19]</ref>). It should be noted that the estimation error decrease exponentially despite dealing with several millions of IPs.</p><p>Since the computation of the optimal coefficient 𝐻(𝑛) may require some time, we measure the percentage of available data that our approach needs in order to provide good results. Particularly, in this experiment we consider the average estimation error done by the model at time 𝑡 by considering a subset of the IPs observed in interval [0, 𝑡 − 1]. The experimental results on real data cubes are depicted in Figure <ref type="figure" target="#fig_2">3</ref>. It should be noted that the Hammerstain model outperform the results by the Volterra's kernel as well as the clustering techniques. In more detail, the clustering techniques are the one less performing. This is due to the nature of the clustering techniques that exploit the geometric information of the data more than their time dependency. We highlight that despite the calculation of 𝐻(𝑛) is computational intensive, this does not effect the real time applicability of the method. In fact, the access decision is taken by considering the estimator 𝑟 ˆ(𝑛) that is computed once per day. Thus the computation of 𝐻(𝑛) does not need to be fast.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions and Future Work</head><p>In this paper, we presented a new way to deal with cyber attack by using Hammerstein models. Experimental results clearly confirm the effectiveness of the proposed techniques for a real data set, outperforming other well-known techniques. Future work will have two objectives. First, we want to consider the problem in a stochastic optimization settings, as for example in <ref type="bibr" target="#b19">[20]</ref>. Second, we want to test the approach on other case studies, by also exploiting knowledge management methodologies (e.g., <ref type="bibr" target="#b20">[21,</ref><ref type="bibr" target="#b21">22]</ref>).</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Representation of the Hammerstein Models</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Estimation error for each day of activity of the website.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Estimation error vs. percentage size of the training set</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>1) 𝑐(2, 2) . . . 𝑐(2, 𝑁 2 ) 𝑐(3, 1) 𝑐(3, 2) . . . 𝑐(3, 𝑁 2 ) . . . 𝑐(𝑀, 1) 𝐶(𝑀, 2) . . . 𝐶(𝑀, 𝑁 )</figDesc><table><row><cell>⎤</cell></row><row><cell>⎦ (22)</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>1 . During this period of time the site received 1,352,804,107 requests. The fields of the request structure contain the following information: (i) timestamp the time of the request, stored as the number of seconds since the Epoch. The timestamp has been converted to GMT to allow for portability. During the World Cup the local time was 2 hours ahead of GMT (+0200). In order to determine the local time, each timestamp must be adjusted by this amount; (ii) clientID a unique integer identifier for the client that issued the request; due to privacy concerns these mappings cannot be released; note that each clientID maps to exactly one IP address, and the mappings are preserved across the entire data set -that is if IP address 0.0.0.0 mapped to clientID 𝑋 on day 𝑌 then any request in any of the data sets containing clientID 𝑋 also came from IP address 0.0.0.0; (iii) objectID a unique integer identifier for the requested URL; these mappings are also 1-to-1 and are preserved across the entire data set; (iv) size the number of bytes in the response; (v) method the method contained in the client's request (e.g., GET); (vi) status this field contains two pieces of information; the 2 highest order bits contain the HTTP version indicated in the client's request (e.g., HTTP/1.0); the remaining 6 bits indicate the response status code (e.g., 200 OK); (vii) type the type of file requested, generally based on the file extension (.html), or the presence of a parameter list; (viii) server indicates which server handled the request. The upper 3 bits indicate which region the server was at; the remaining bits indicate which server at the site handled the request.</figDesc><table /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">ftp://ita.ee.lbl.gov/html/contrib/WorldCup.html</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgements</head><p>This work is partially supported by NSERC (Canada) and University of Manitoba.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Bayes optimal ddos mitigation by adaptive history-based ip filtering</title>
		<author>
			<persName><forename type="first">M</forename><surname>Goldstein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Lampert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Reif</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Stahl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Breuel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Seventh International Conference on Networking (icn</title>
				<imprint>
			<date type="published" when="2008">2008. 2008</date>
			<biblScope unit="page" from="174" to="179" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">Framework for statistical filtering against ddos attacks in manets</title>
		<author>
			<persName><forename type="first">H.-X</forename><surname>Tan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Seah</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICESS.2005.57</idno>
		<imprint>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page">8</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">On filtering of ddos attacks based on source address prefixes</title>
		<author>
			<persName><forename type="first">G</forename><surname>Pack</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Yoon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Collins</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Estan</surname></persName>
		</author>
		<idno type="DOI">10.1109/SECCOMW.2006.359537</idno>
		<imprint>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="1" to="12" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">The role of traffic forecasting in qos routing -a case study of time-dependent routing</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C.-H</forename><surname>Lung</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICC.2005.1494351</idno>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="224" to="228" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Clustering hosts in p2p and global computing platforms</title>
		<author>
			<persName><forename type="first">A</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Casanova</surname></persName>
		</author>
		<idno type="DOI">10.1109/CCGRID.2003.1199389</idno>
		<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="367" to="373" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Olap*: Effectively and efficiently supporting parallel OLAP over big data</title>
		<author>
			<persName><forename type="first">A</forename><surname>Cuzzocrea</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Moussa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Xu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Model and Data Engineering -Third International Conference, MEDI 2013</title>
				<meeting><address><addrLine>Amantea, Italy</addrLine></address></meeting>
		<imprint>
			<publisher>Proceedings</publisher>
			<date type="published" when="2013">September 25-27, 2013. 2013</date>
			<biblScope unit="page" from="38" to="49" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A novel distributed framework for optimizing query routing trees in wireless sensor networks via optimal operator placement</title>
		<author>
			<persName><forename type="first">G</forename><surname>Chatzimilioudis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Cuzzocrea</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Gunopulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Mamoulis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Comput. Syst. Sci</title>
		<imprint>
			<biblScope unit="volume">79</biblScope>
			<biblScope unit="page" from="349" to="368" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Privacy preserving OLAP over distributed XML data: A theoretically-sound secure-multipartycomputation approach</title>
		<author>
			<persName><forename type="first">A</forename><surname>Cuzzocrea</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Bertino</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Comput. Syst. Sci</title>
		<imprint>
			<biblScope unit="volume">77</biblScope>
			<biblScope unit="page" from="965" to="987" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Privacy preserving OLAP and OLAP security</title>
		<author>
			<persName><forename type="first">A</forename><surname>Cuzzocrea</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Russo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Encyclopedia of Data Warehousing and Mining, Second Edition</title>
				<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="1575" to="1581" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Storing and retrieving xpath fragments in structured P2P networks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Bonifati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Cuzzocrea</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Data Knowl. Eng</title>
		<imprint>
			<biblScope unit="volume">59</biblScope>
			<biblScope unit="page" from="247" to="269" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Fuzzy logic-based data analytics on predicting the effect of hurricanes on the stock market</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">C</forename><surname>Camara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Cuzzocrea</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M</forename><surname>Grasso</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">K</forename><surname>Leung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">B</forename><surname>Powell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Souza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Tang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Fuzzy Systems, FUZZ-IEEE 2018</title>
				<meeting><address><addrLine>Rio de Janeiro, Brazil</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2018-07-08">2018. July 8-13, 2018. 2018</date>
			<biblScope unit="page" from="1" to="8" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">An innovative framework for supporting frequent pattern mining problems in iot environments</title>
		<author>
			<persName><forename type="first">P</forename><surname>Braun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Cuzzocrea</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">K</forename><surname>Leung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">G M</forename><surname>Pazdor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Tanbeer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M</forename><surname>Grasso</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computational Science and Its Applications -ICCSA 2018 -18th International Conference</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">O</forename><surname>Gervasi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Murgante</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Misra</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><forename type="middle">N</forename><surname>Stankova</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><forename type="middle">M</forename><surname>Torre</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><forename type="middle">M A C</forename><surname>Rocha</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Taniar</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><forename type="middle">O</forename><surname>Apduhan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Tarantino</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Y</forename><surname>Ryu</surname></persName>
		</editor>
		<meeting><address><addrLine>Melbourne, VIC, Australia</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2018">July 2-5, 2018. 2018</date>
			<biblScope unit="volume">10964</biblScope>
			<biblScope unit="page" from="642" to="657" />
		</imprint>
	</monogr>
	<note>Proceedings, Part V</note>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Private databases on the cloud: Models, issues and research perspectives</title>
		<author>
			<persName><forename type="first">A</forename><surname>Cuzzocrea</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Mastroianni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M</forename><surname>Grasso</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2016 IEEE International Conference on Big Data, BigData 2016</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Joshi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Karypis</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Liu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">X</forename><surname>Hu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Ak</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Y</forename><surname>Xia</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">W</forename><surname>Xu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Sato</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Rachuri</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><forename type="middle">H</forename><surname>Ungar</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><forename type="middle">S</forename><surname>Yu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Govindaraju</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Suzumura</surname></persName>
		</editor>
		<meeting><address><addrLine>Washington DC, USA</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2016">December 5-8, 2016. 2016</date>
			<biblScope unit="page" from="3656" to="3661" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Accuracy control in compressed multidimensional data cubes for quality of answer-based OLAP tools</title>
		<author>
			<persName><forename type="first">A</forename><surname>Cuzzocrea</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">18th International Conference on Scientific and Statistical Database Management, SSDBM 2006</title>
				<meeting><address><addrLine>Vienna, Austria</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2006-07-05">3-5 July 2006. 2006</date>
			<biblScope unit="page" from="301" to="310" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Linear prediction: A tutorial review</title>
		<author>
			<persName><forename type="first">J</forename><surname>Makhoul</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE</title>
				<meeting>the IEEE</meeting>
		<imprint>
			<date type="published" when="1975">1975</date>
			<biblScope unit="volume">63</biblScope>
			<biblScope unit="page" from="561" to="580" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Volterra series theory: A state-of-the-art review</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Peng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Changming</surname></persName>
		</author>
		<idno type="DOI">10.1360/N972014-01056</idno>
	</analytic>
	<monogr>
		<title level="j">Chinese Science Bulletin (Chinese Version)</title>
		<imprint>
			<biblScope unit="volume">60</biblScope>
			<biblScope unit="page">1874</biblScope>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Adaptively combined fir and functional link artificial neural network equalizer for nonlinear communication channel</title>
		<author>
			<persName><forename type="first">H</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Neural Networks</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="page" from="665" to="674" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A robust optimization approach to kernel-based nonparametric error-in-variables identification in the presence of bounded noise</title>
		<author>
			<persName><forename type="first">V</forename><surname>Cerone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Fadda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Regruto</surname></persName>
		</author>
		<idno type="DOI">10.23919/acc.2017.7963056</idno>
	</analytic>
	<monogr>
		<title level="m">2017 American Control Conference (ACC)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m" type="main">A workload characterization study of the 7998 world cup web site, ???</title>
		<author>
			<persName><forename type="first">M</forename><surname>Arlitt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Jin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Laboratories</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Customized multi-period stochastic assignment problem for social engagement and opportunistic iot</title>
		<author>
			<persName><forename type="first">E</forename><surname>Fadda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Perboli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Tadei</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Operations Research</title>
		<imprint>
			<biblScope unit="volume">93</biblScope>
			<biblScope unit="page" from="41" to="50" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Combining multidimensional user models and knowledge representation and management techniques for making web services knowledge-aware</title>
		<author>
			<persName><forename type="first">A</forename><surname>Cuzzocrea</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Web Intelligence and Agent Systems</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="289" to="312" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Modeling adaptive hypermedia with an object-oriented approach and XML</title>
		<author>
			<persName><forename type="first">M</forename><surname>Cannataro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Cuzzocrea</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Mastroianni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Ortale</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Pugliese</surname></persName>
		</author>
		<ptr target="org" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Second International Workshop on Web Dynamics, WebDyn@WWW 2002</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<editor>
			<persName><forename type="first">M</forename><surname>Levene</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Poulovassilis</surname></persName>
		</editor>
		<meeting>the Second International Workshop on Web Dynamics, WebDyn@WWW 2002<address><addrLine>Honululu, HW, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2002-05-07">May 7, 2002. 2002</date>
			<biblScope unit="volume">702</biblScope>
			<biblScope unit="page" from="35" to="44" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
