{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T20:33:35Z","timestamp":1776890015969,"version":"3.51.2"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031474507","type":"print"},{"value":"9783031474514","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-47451-4_39","type":"book-chapter","created":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T20:02:04Z","timestamp":1698782524000},"page":"550-565","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Uses of Artificial Intelligence in Cyber Security to Mitigate DDOS"],"prefix":"10.1007","author":[{"given":"Safaa Sharif","family":"Althagafi","sequence":"first","affiliation":[]},{"given":"Hajer Fahad","family":"Aljudiaibi","sequence":"additional","affiliation":[]},{"given":"Badriah Abdelhadi","family":"Alharbi","sequence":"additional","affiliation":[]},{"given":"Raniyah","family":"Wazirali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,1]]},"reference":[{"key":"39_CR1","doi-asserted-by":"crossref","unstructured":"Umar, R., Olalere, M., Idris, I., Egigogo, R.A., Bolarin, G.: Performance evaluation of ML for hypertext transfer protocol distributed denial of service intrusion detection. In: 15th International Conference on Electronics, Computer and Computation, Abuja, Nigeria, pp. 1\u20137 (2019)","DOI":"10.1109\/ICECCO48375.2019.9043262"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Roempluk, T., Surintaused, O.: A machine learning approach for detecting distributed denial of service attacks. In: Joint International Conference on Digital Arts, Media and Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering, Nan, Thailand, pp. 146\u2013149 (2019)","DOI":"10.1109\/ECTI-NCON.2019.8692243"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Ali, O., Cotaeempluk, P.: Towards DoS\/DDoS attack detection using artificial neural networks. In: Electronics & Mobile Communication Conference, New York City, Ny, USA, pp. 229\u2013234 (2018)","DOI":"10.1109\/UEMCON.2018.8796637"},{"issue":"1","key":"39_CR4","first-page":"19","volume":"24","author":"SR Khonde","year":"2019","unstructured":"Khonde, S.R., Venugopal, U.: Hybrid architecture for distributed intrusion detection system. Int. Inf. Eng. Technol. Assoc. 24(1), 19\u201328 (2019)","journal-title":"Int. Inf. Eng. Technol. Assoc."},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Kachavimath, V., Nazare, S.V., Akkiresearchers, S.S.: Distributed denial of service attack detection using na\u00efve bayes and k-nearest neighbor for network forensics. In: 2nd International Conference on Innovative Mechanisms for Industry Applications, Bangalore, India, pp. 711\u2013717 (2020)","DOI":"10.1109\/ICIMIA48430.2020.9074929"},{"key":"39_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/1263123","volume":"2018","author":"M Idhammad","year":"2018","unstructured":"Idhammad, M., Afdel, K., Belouch, M.: Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest. Secur. Commun. Netw. 2018, 1\u201313 (2018)","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"39_CR7","first-page":"1","volume":"12","author":"P Huseyin","year":"2020","unstructured":"Huseyin, P., Onur, P., Aydin, C.: Detecting DDoS attacks in software-defined networks through feature selection methods and machine learning models. Sustainability 12(3), 1\u201316 (2020)","journal-title":"Sustainability"},{"issue":"5","key":"39_CR8","doi-asserted-by":"publisher","first-page":"43","DOI":"10.3390\/fi10050043","volume":"10","author":"XD Hoang","year":"2018","unstructured":"Hoang, X.D., Nguyen, Q.C.: Botnet detection based on machine learning techniques using DNS query data. Future Internet 10(5), 43 (2018)","journal-title":"Future Internet"},{"issue":"1","key":"39_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/4943509","volume":"2018","author":"E Min","year":"2018","unstructured":"Min, E., Long, J., Liu, Q., Cui, J., Chen, W.: TR-IDS: anomaly-based intrusion detection through text-convolutional neural network and random forest. Secur. Commun. Netw. 2018(1), 1\u20139 (2018)","journal-title":"Secur. Commun. Netw."}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the Future Technologies Conference (FTC) 2023, Volume 2"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47451-4_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T18:07:50Z","timestamp":1713031670000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47451-4_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031474507","9783031474514"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47451-4_39","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FTC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of the Future Technologies Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ftc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/FTC","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}