{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:53:52Z","timestamp":1769925232206,"version":"3.49.0"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T00:00:00Z","timestamp":1766620800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T00:00:00Z","timestamp":1766620800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10207-025-01162-5","type":"journal-article","created":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T15:27:03Z","timestamp":1766676423000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bi-GRU framework with entropy-augmented Mac for IoT security in SDN"],"prefix":"10.1007","volume":"25","author":[{"given":"Amani K.","family":"Samha","sequence":"first","affiliation":[]},{"given":"Hanan Abdullah","family":"Mengash","sequence":"additional","affiliation":[]},{"given":"Mohammed A.","family":"AlAqil","sequence":"additional","affiliation":[]},{"given":"Hamed","family":"Alqahtani","sequence":"additional","affiliation":[]},{"given":"Somia A.","family":"Asklany","sequence":"additional","affiliation":[]},{"given":"Rana","family":"Alabdan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,25]]},"reference":[{"issue":"6","key":"1162_CR1","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1007\/s10661-024-12698-9","volume":"196","author":"H Amirian","year":"2024","unstructured":"Amirian, H., Dalvand, K., Ghiasvand, A.: Seamless integration of Internet of Things, miniaturization, and environmental chemical surveillance. Environ. Monit. Assess. 196(6), 582 (2024)","journal-title":"Environ. Monit. Assess."},{"key":"1162_CR2","doi-asserted-by":"publisher","unstructured":"P., L., Kumar, R.: Enhancing IoT fog computing security: A dynamic nonlinear analytical model-based SDN assessment framework. Deleted Journal, 32(1): 102\u2013112 (2024). https:\/\/doi.org\/10.52783\/cana.v32.1624","DOI":"10.52783\/cana.v32.1624"},{"issue":"3","key":"1162_CR3","doi-asserted-by":"publisher","first-page":"3599","DOI":"10.11591\/ijai.v13.i3.pp3599-3610","volume":"13","author":"R Yahya","year":"2024","unstructured":"Yahya, R., Mohammed, M., Younes, B., Kaouthar, C., Mohammed, F., Sa\u00efd, M., Moulhime, E., Bekkali, B., Bernoussi, S.: Hybrid software defined network-based deep learning framework for enhancing internet of medical things cybersecurity. IAES Int. J. Artif. Intell. 13(3), 3599\u20133610 (2024). https:\/\/doi.org\/10.11591\/ijai.v13.i3.pp3599-3610","journal-title":"IAES Int. J. Artif. Intell."},{"issue":"2","key":"1162_CR4","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1007\/s10207-023-00771-2","volume":"23","author":"M Maddu","year":"2024","unstructured":"Maddu, M., Rao, Y.: Network intrusion detection and mitigation in SDN using deep learning models. Int. J. Inf. Secur. 23(2), 849\u2013862 (2024)","journal-title":"Int. J. Inf. Secur."},{"key":"1162_CR5","doi-asserted-by":"publisher","unstructured":"Divya, N., Soumya, P., Rahul, C., Shamim, A., Khan, V., Kanpur, R., S., M.: Enhancing security and efficiency in IoT-enabled smart grids with blockchain SDN Bi-GRU and digital twin. 198\u2013203 (2024). https:\/\/doi.org\/10.1109\/i-smac61858.2024.10714800","DOI":"10.1109\/i-smac61858.2024.10714800"},{"key":"1162_CR6","doi-asserted-by":"publisher","unstructured":"Mangayarkarasi, R., Adla, P., R., V., Mohemmed, Y., Rahamathulla, V., Chithanuru: A hybrid wrapper technique enabled network intrusion detection system for software defined networking based IoT networks. (2024) https:\/\/doi.org\/10.1109\/aiiot58432.2024.10574755","DOI":"10.1109\/aiiot58432.2024.10574755"},{"key":"1162_CR7","doi-asserted-by":"crossref","unstructured":"Mohammad, H. M., Abdullah, A. A.: DDoS attack mitigation using entropy in SDN-IoT environment. In AIP Conference Proceedings (Vol. 2591, No. 1). AIP Publishing (2023, March).","DOI":"10.1063\/5.0123465"},{"key":"1162_CR8","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.aej.2022.08.019","volume":"67","author":"MM Elsagheer","year":"2023","unstructured":"Elsagheer, M.M., Ramzy, S.M.: A hybrid model for automatic modulation classification based on residual neural networks and long shortterm memory. Alex. Eng. J. 67, 117\u2013128 (2023)","journal-title":"Alex. Eng. J."},{"issue":"1063\/5","key":"1162_CR9","first-page":"0123465","volume":"10","author":"M Hussein","year":"2023","unstructured":"Hussein, M., Mohammad, A., Abdulkareem, A., Abdullah, H.: DDoS attack mitigation using entropy in SDN-IoT environment. Nucleation and Atmospheric Aerosols. doi 10(1063\/5), 0123465 (2023)","journal-title":"Nucleation and Atmospheric Aerosols. doi"},{"key":"1162_CR10","doi-asserted-by":"publisher","unstructured":"Gondhalekar, G., Vasukidevi, G., Lydia, D. I., Vyas, R. K., Arunraj, S. R. A. N.: An optimized security framework for global IoT communication using software-defined networking (SDN) in adversarial environments. In: Proceedings, 100\u2013109 (2023). https:\/\/doi.org\/10.1109\/i-smac58438.2023.10290515","DOI":"10.1109\/i-smac58438.2023.10290515"},{"key":"1162_CR11","doi-asserted-by":"publisher","DOI":"10.20944\/preprints202307.1781.v1","author":"J Miguel-Alonso","year":"2023","unstructured":"Miguel-Alonso, J.: Securing IoT networks through SDN technologies. Preprints (2023). https:\/\/doi.org\/10.20944\/preprints202307.1781.v1","journal-title":"Preprints"},{"key":"1162_CR12","first-page":"5651","volume":"70","author":"M Ibrahim","year":"2022","unstructured":"Ibrahim, M., Hanif, M., Ahmad, S., Jamil, F., Sehar, T., Lee, Y., Kim, D.: SDN-based DDoS mitigating approach using traffic entropy for IoT network. Comput. Mater. Contin. 70, 5651\u20135665 (2022)","journal-title":"Comput. Mater. Contin."},{"key":"1162_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Chen, Y., Yu, S., Gu, X., Song, M., Peng, Y., ... & Liu, Q. (2022). Bi-GRU relation extraction model based on keywords attention. Data Intelligence, 4(3), 552\u2013572.","DOI":"10.1162\/dint_a_00147"},{"issue":"8","key":"1162_CR14","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10080918","volume":"10","author":"D Javeed","year":"2021","unstructured":"Javeed, D., Gao, T., Khan, M.T.: SDN-enabled hybrid DL-driven framework for the detection of emerging cyber threats in IoT. Electronics 10(8), 918 (2021). https:\/\/doi.org\/10.3390\/electronics10080918","journal-title":"Electronics"},{"key":"1162_CR15","doi-asserted-by":"crossref","unstructured":"Nguyen-An, H., Silverston, T., Yamazaki, T., Miyoshi, T.: Entropy-based IoT devices identification. In: 2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS) (pp. 73\u201378). IEEE (2020, September).","DOI":"10.23919\/APNOMS50412.2020.9236963"},{"issue":"4","key":"1162_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJKSS.2020100101","volume":"11","author":"S Mishra","year":"2020","unstructured":"Mishra, S.: SDN-based secure architecture for IoT. Int. J. Knowl. Syst. Sci. 11(4), 1\u201316 (2020). https:\/\/doi.org\/10.4018\/IJKSS.2020100101","journal-title":"Int. J. Knowl. Syst. Sci."},{"key":"1162_CR17","doi-asserted-by":"publisher","DOI":"10.47852\/bonviewjcce42023061","author":"P Kumar","year":"2024","unstructured":"Kumar, P., Neduncheliyan, S.: BSA-SGRU: A novel deep learning framework to alleviate multiple attacks in IoT-cloud environment. J. Comput. Cogn. Eng. (2024). https:\/\/doi.org\/10.47852\/bonviewjcce42023061","journal-title":"J. Comput. Cogn. Eng."},{"key":"1162_CR18","doi-asserted-by":"publisher","first-page":"53015","DOI":"10.1109\/ACCESS.2022.3172304","volume":"10","author":"MA Razib","year":"2022","unstructured":"Razib, M.A., Javeed, D., Khan, M.T., Alkanhel, R., Muthanna, M.S.A.: Cyber threats detection in smart environments using SDN-enabled DNN-LSTM hybrid framework. IEEE Access 10, 53015\u201353026 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3172304","journal-title":"IEEE Access"},{"key":"1162_CR19","doi-asserted-by":"publisher","unstructured":"Hirsi, L., Audah, A., Salh, N. M., Sahar, S., Ahmed, M., Alhartomi, M. A.: DDoS anomaly detection in software-defined networks: An evaluation of machine learning techniques for traffic classification and prediction. In: 2024 International Conference on Future Technologies for Smart Society (ICFTSS) (pp. 100\u2013105). IEEE. (2024) https:\/\/doi.org\/10.1109\/ICFTSS61109.2024.10691328","DOI":"10.1109\/ICFTSS61109.2024.10691328"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01162-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01162-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01162-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T16:07:21Z","timestamp":1769875641000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01162-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,25]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1162"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01162-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,25]]},"assertion":[{"value":"24 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interests"}}],"article-number":"13"}}