{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:19:18Z","timestamp":1740122358555,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T00:00:00Z","timestamp":1635292800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T00:00:00Z","timestamp":1635292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100007592","name":"Al-Balqa' Applied University","doi-asserted-by":"publisher","award":["DSR-2020#323"],"award-info":[{"award-number":["DSR-2020#323"]}],"id":[{"id":"10.13039\/100007592","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s10586-021-03449-3","type":"journal-article","created":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T13:03:44Z","timestamp":1635339824000},"page":"735-750","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Intelligent transmission control layer for efficient node management in SDN"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4141-0079","authenticated-orcid":false,"given":"Hamza","family":"Aldabbas","sequence":"first","affiliation":[]},{"given":"Khalaf","family":"Khatatneh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,27]]},"reference":[{"key":"3449_CR1","doi-asserted-by":"publisher","first-page":"91028","DOI":"10.1109\/ACCESS.2020.2992580","volume":"8","author":"OS Al-Heety","year":"2020","unstructured":"Al-Heety, O.S., et al.: A comprehensive survey: benefits, services, recent works, challenges, security, and use cases for sdn-vanet. IEEE Access 8, 91028\u201391047 (2020)","journal-title":"IEEE Access"},{"key":"3449_CR2","doi-asserted-by":"publisher","first-page":"107346","DOI":"10.1109\/ACCESS.2019.2932422","volume":"7","author":"M Alsaeedi","year":"2019","unstructured":"Alsaeedi, M., Mohamad, M.M., Al-Roubaiey, A.A.J.I.A.: Toward adaptive and scalable OpenFlow-SDN flow control: a survey. IEEE Access 7, 107346\u2013107379 (2019)","journal-title":"IEEE Access"},{"key":"3449_CR3","doi-asserted-by":"crossref","unstructured":"Mohajer, A., et al. Secure dominating set-based routing protocol in MANET: Using reputation. In: 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC). 2013. IEEE.","DOI":"10.1109\/ISCISC.2013.6767346"},{"issue":"4","key":"3449_CR4","doi-asserted-by":"publisher","first-page":"3259","DOI":"10.1109\/COMST.2018.2837161","volume":"20","author":"R Amin","year":"2018","unstructured":"Amin, R., et al.: Hybrid SDN networks: a survey of existing approaches. IEEE Commun. Surv. Tutor. 20(4), 3259\u20133306 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"3449_CR5","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s12083-017-0630-0","volume":"12","author":"N Sultana","year":"2019","unstructured":"Sultana, N., et al.: Survey on SDN based network intrusion detection system using machine learning approaches. Peer-to-Peer Netw Appl 12(2), 493\u2013501 (2019)","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"7","key":"3449_CR6","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MCOM.2013.6553676","volume":"51","author":"S Sezer","year":"2013","unstructured":"Sezer, S., et al.: Are we ready for SDN? Implementation challenges for software-defined networks. IEEE Commun. Mag. 51(7), 36\u201343 (2013)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"3449_CR7","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","volume":"18","author":"Q Yan","year":"2015","unstructured":"Yan, Q., et al.: Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Commun. Surv. Tutor. 18(1), 602\u2013622 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3449_CR8","doi-asserted-by":"publisher","first-page":"9437","DOI":"10.1109\/ACCESS.2016.2641482","volume":"4","author":"R Amin","year":"2016","unstructured":"Amin, R., et al.: Auto-configuration of ACL policy in case of topology change in hybrid SDN. IEEE Access 4, 9437\u20139450 (2016)","journal-title":"IEEE Access"},{"key":"3449_CR9","unstructured":"Mandal, S.J.P.S., USENIX ATC, Lessons learned from b4, google\u2019s sdn wan. 2015. 15."},{"key":"3449_CR10","doi-asserted-by":"crossref","unstructured":"Fang, L., et al. Hierarchical SDN for the hyper-scale, hyper-elastic data center and cloud. In: Proceedings of the 1st ACM SIGCOMM Symposium on Software Defined Networking Research. 2015.","DOI":"10.1145\/2774993.2775009"},{"key":"3449_CR11","doi-asserted-by":"crossref","unstructured":"Amin, R., et al., A survey on machine learning techniques for routing optimization in SDN. 2021.","DOI":"10.1109\/ACCESS.2021.3099092"},{"key":"3449_CR12","first-page":"1","volume":"4","author":"H Aldabbas","year":"2021","unstructured":"Aldabbas, H., Amin, R.J.C.C.: A novel mechanism to handle address spoofing attacks in SDN based IoT. Clust. Comput. 4, 1\u201316 (2021)","journal-title":"Clust. Comput."},{"issue":"4","key":"3449_CR13","first-page":"562","volume":"8","author":"F Ubaid","year":"2017","unstructured":"Ubaid, F., et al.: Mitigating address spoofing attacks in hybrid SDN. Int. J. Adv. Comput. Sci. Appl. 8(4), 562\u2013570 (2017)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"3449_CR14","unstructured":"Sheikh, M.N.A.J.G.J.o.C.S. and Technology, SDN-Based approach to evaluate the best controller: internal controller NOX and external controllers POX, ONOS, RYU. 2019."},{"issue":"2","key":"3449_CR15","doi-asserted-by":"publisher","first-page":"47","DOI":"10.31436\/iiumej.v17i2.615","volume":"17","author":"S Rowshanrad","year":"2016","unstructured":"Rowshanrad, S., Abdi, V., Keshtgari, M.J.I.E.J.: Performance evaluation of SDN controllers: floodlight and OpenDaylight. IIUM Eng. J. 17(2), 47\u201357 (2016)","journal-title":"IIUM Eng. J."},{"issue":"7","key":"3449_CR16","doi-asserted-by":"publisher","first-page":"1838","DOI":"10.1109\/TIFS.2018.2805600","volume":"13","author":"J Zheng","year":"2018","unstructured":"Zheng, J., et al.: Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis. IEEE Trans Inform Forensics Secur 13(7), 1838\u20131853 (2018)","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"3449_CR17","unstructured":"Rachenko, Y. Should we use artificial intelligence to recruit employees in the aerospace industry?. In VII International Scientific and Practical Conference United Kingdom, London 2021"},{"key":"3449_CR18","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.future.2021.02.011","volume":"119","author":"S Khan","year":"2021","unstructured":"Khan, S., Hussain, F.K., Hussain, O.K.J.F.G.C.S.: Guaranteeing end-to-end QoS provisioning in SOA based SDN architecture: a survey and open issues. Future Generation Comput. Syst. 119, 176\u2013187 (2021)","journal-title":"Future Generation Comput. Syst."},{"key":"3449_CR19","doi-asserted-by":"crossref","unstructured":"Xiong, S., Q. Cao, and W. Si. Adaptive path tracing with programmable bloom filters in software-defined networks. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications. 2019. IEEE.","DOI":"10.1109\/INFOCOM.2019.8737387"},{"key":"3449_CR20","doi-asserted-by":"crossref","unstructured":"Tammana, P., R. Agarwal, and M. Lee. Cherrypick: Tracing packet trajectory in software-defined datacenter networks. In: Proceedings of the 1st ACM SIGCOMM Symposium on Software Defined Networking Research. 2015.","DOI":"10.1145\/2774993.2775066"},{"key":"3449_CR21","unstructured":"Handigol, N., et al. I know what your packet did last hop: using packet histories to troubleshoot networks. In: 11th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 14). 2014."},{"key":"3449_CR22","doi-asserted-by":"crossref","unstructured":"Agarwal, K., et al. SDN traceroute: Tracing SDN forwarding without changing network behavior. In: Proceedings of the third workshop on Hot topics in software defined networking. 2014.","DOI":"10.1145\/2620728.2620756"},{"issue":"4","key":"3449_CR23","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TDSC.2013.8","volume":"10","author":"C-J Chung","year":"2013","unstructured":"Chung, C.-J., et al.: NICE: Network intrusion detection and countermeasure selection in virtual network systems. IEEE Trans Depend Secure Comput 10(4), 198\u2013211 (2013)","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"3449_CR24","doi-asserted-by":"crossref","unstructured":"Handigol, N., et al. Where is the debugger for my software-defined network? in Proceedings of the first workshop on Hot topics in software defined networks. 2012.","DOI":"10.1145\/2342441.2342453"},{"key":"3449_CR25","unstructured":"Liu, X. and D. Gong. A comparative study of A-star algorithms for search and rescue in perfect maze. In: 2011 international conference on electric information and control engineering. 2011. IEEE."},{"issue":"1","key":"3449_CR26","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1109\/TNSM.2019.2946332","volume":"17","author":"T Qu","year":"2019","unstructured":"Qu, T., et al.: Efficient event scheduling of network update. EEE Trans Netw Serv Manag 17(1), 416\u2013429 (2019)","journal-title":"EEE Trans Netw Serv Manag"},{"key":"3449_CR27","first-page":"4110","volume":"4","author":"VA Kumar","year":"2020","unstructured":"Kumar, V.A., et al.: Efficient data transfer in edge envisioned environment using artificial intelligence based edge node algorithm. Trans. Emerging Telecommun. Technol. 4, 4110 (2020)","journal-title":"Trans. Emerging Telecommun. Technol."},{"key":"3449_CR28","first-page":"1","volume":"6","author":"MT Islam","year":"2020","unstructured":"Islam, M.T., Islam, N., Al-Refat, M.J.W.P.C.: Node to node performance evaluation through RYU SDN controller. Wirel. Personal Commun. 6, 1\u201316 (2020)","journal-title":"Wirel. Personal Commun."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03449-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-021-03449-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03449-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,19]],"date-time":"2022-03-19T20:07:24Z","timestamp":1647720444000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-021-03449-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,27]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["3449"],"URL":"https:\/\/doi.org\/10.1007\/s10586-021-03449-3","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2021,10,27]]},"assertion":[{"value":"8 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2021","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original online version of this article was revised: Authors affiliation and funding note has been corrected.","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We wish to confirm that there are no known conflicts of interest associated with this publication and there has been no significant financial support for this work that could have influenced its outcome.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}