{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T21:36:53Z","timestamp":1775079413318,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s11036-025-02458-5","type":"journal-article","created":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T05:17:29Z","timestamp":1753161449000},"page":"12-41","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Deep Learning-Based Mechanism for Detecting Variable-Rate DDoS Attacks in Software-Defined Networks"],"prefix":"10.1007","volume":"30","author":[{"given":"Abdullah Ahmed","family":"Bahashwan","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Anbar","sequence":"additional","affiliation":[]},{"given":"Selvakumar","family":"Manickam","sequence":"additional","affiliation":[]},{"given":"Taief Alaa","family":"Al-Amiedy","sequence":"additional","affiliation":[]},{"given":"Mohammad Adnan","family":"Aladaileh","sequence":"additional","affiliation":[]},{"given":"Ali Abdulqader","family":"Bin-Salem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,22]]},"reference":[{"key":"2458_CR1","doi-asserted-by":"publisher","unstructured":"Bahashwan AA, Anbar M, Manickam S, Al-Amiedy TA, Aladaileh MA, Hasbullah IH (2023) A systematic literature review on machine learning and deep learning approaches for detecting DDoS attacks in software-defined networking. Sensors 23(9). https:\/\/doi.org\/10.3390\/s23094441","DOI":"10.3390\/s23094441"},{"issue":"4","key":"2458_CR2","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1109\/TSC.2020.2966970","volume":"13","author":"A Yazdinejad","year":"2020","unstructured":"Yazdinejad A, Parizi RM, Dehghantanha A, Zhang Q, Choo K-KR (2020) An energy-efficient sdn controller architecture for iot networks with blockchain-based security. IEEE Trans Serv Comput 13(4):625\u2013638. https:\/\/doi.org\/10.1109\/TSC.2020.2966970","journal-title":"IEEE Trans Serv Comput"},{"issue":"1","key":"2458_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11235-024-01252-0","volume":"88","author":"T Darwish","year":"2025","unstructured":"Darwish T, Alhaj TA, Elhaj FA (2025) Controller placement in software defined emerging networks: a review and future directions. Telecommun Syst 88(1):1\u201333. https:\/\/doi.org\/10.1007\/s11235-024-01252-0","journal-title":"Telecommun Syst"},{"issue":"1","key":"2458_CR4","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","volume":"18","author":"Q Yan","year":"2015","unstructured":"Yan Q, Yu FR, Gong Q, Li J (2015) Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun Surv Tutorials 18(1):602\u2013622. https:\/\/doi.org\/10.1109\/COMST.2015.2487361","journal-title":"IEEE Commun Surv Tutorials"},{"key":"2458_CR5","doi-asserted-by":"publisher","unstructured":"Aladaileh MA, Anbar M, Hintaw AJ, Hasbullah IH, Bahashwan AA, Al-Amiedy TA, Ibrahim DR (2023) Effectiveness of an entropy-based approach for detecting low- and high-rate DDoS attacks against the SDN controller: experimental analysis. Appl Sci 13(2). https:\/\/doi.org\/10.3390\/app13020775","DOI":"10.3390\/app13020775"},{"issue":"1","key":"2458_CR6","doi-asserted-by":"publisher","first-page":"373","DOI":"10.32604\/cmc.2021.017972","volume":"69","author":"M Aladaileh","year":"2021","unstructured":"Aladaileh M, Anbar M, Hasbullah IH, Sanjalawe YK, Chong Y-W (2021) Entropy-based approach to detect DDoS attacks on software defined networking controller. CMC-Comput Mater Continua 69(1):373\u2013391. https:\/\/doi.org\/10.32604\/cmc.2021.017972","journal-title":"CMC-Comput Mater Continua"},{"issue":"04","key":"2458_CR7","doi-asserted-by":"publisher","first-page":"1917","DOI":"10.1109\/TPDS.2013.146","volume":"3","author":"A Devare","year":"2016","unstructured":"Devare A, Shelake M, Vahadne V, Kamble P, Tamboli B (2016) A system for denial-of-service attack detection based on multivariate correlation analysis. Int Res J Eng Technol (IRJET) 3(04):1917\u20131923. https:\/\/doi.org\/10.1109\/TPDS.2013.146","journal-title":"Int Res J Eng Technol (IRJET)"},{"issue":"1","key":"2458_CR8","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1109\/COMST.2015.2453114","volume":"18","author":"S Scott-Hayward","year":"2015","unstructured":"Scott-Hayward S, Natarajan S, Sezer S (2015) A survey of security in software defined networks. IEEE Commun Surv Tutorials 18(1):623\u2013654. https:\/\/doi.org\/10.1109\/COMST.2015.2453114","journal-title":"IEEE Commun Surv Tutorials"},{"key":"2458_CR9","doi-asserted-by":"publisher","unstructured":"Singh S, Prakash S (2019) A survey on software defined network based on architecture, issues and challenges. In: 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 27-29 March 2019. IEEE, pp 568\u2013573. https:\/\/doi.org\/10.1109\/ICCMC.2019.8819785","DOI":"10.1109\/ICCMC.2019.8819785"},{"issue":"1\u20134","key":"2458_CR10","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/S1088-467X(97)00008-5","volume":"1","author":"M Dash","year":"1997","unstructured":"Dash M, Liu H (1997) Feature selection for classification. Intell Data Anal 1(1\u20134):131\u2013156. https:\/\/doi.org\/10.1016\/S1088-467X(97)00008-5","journal-title":"Intell Data Anal"},{"issue":"1","key":"2458_CR11","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/S1088-467X(97)00008-5","volume":"20","author":"F Bannour","year":"2017","unstructured":"Bannour F, Souihi S, Mellouk A (2017) Distributed sdn control: survey, taxonomy, and challenges. IEEE Commun Surv Tutorials 20(1):333\u2013354. https:\/\/doi.org\/10.1016\/S1088-467X(97)00008-5","journal-title":"IEEE Commun Surv Tutorials"},{"key":"2458_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patrec.2014.07.019","volume":"51","author":"MH Bhuyan","year":"2015","unstructured":"Bhuyan MH, Bhattacharyya DK, Kalita JK (2015) An empirical evaluation of information metrics for low-rate and high-rate ddos attack detection. Pattern Recogn Lett 51:1\u20137. https:\/\/doi.org\/10.1016\/j.patrec.2014.07.019","journal-title":"Pattern Recogn Lett"},{"issue":"1","key":"2458_CR13","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.32604\/cmc.2022.029369","volume":"73","author":"MA Aladaileh","year":"2022","unstructured":"Aladaileh MA, Anbar M, Hasbullah AABIH, Al-Sarawn S (2022) Dynamic threshold-based approach to detect low-rate DDoS attacks on software-defined networking controller. Comput Mater Continua 73(1):1403\u20131416. https:\/\/doi.org\/10.32604\/cmc.2022.029369","journal-title":"Comput Mater Continua"},{"issue":"2","key":"2458_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0297548","volume":"19","author":"AA Bahashwan","year":"2024","unstructured":"Bahashwan AA, Anbar M, Manickam S, Issa G, Aladaileh MA, Alabsi BA, Ahmed Rihan SD (2024) Hld-ddosdn: high and low-rates dataset-based ddos attacks against sdn. PLoS ONE 19(2):1\u201329. https:\/\/doi.org\/10.1371\/journal.pone.0297548","journal-title":"PLoS ONE"},{"issue":"12","key":"2458_CR15","doi-asserted-by":"publisher","first-page":"35253","DOI":"10.1007\/s11042-023-16781-0","volume":"83","author":"S Karnani","year":"2024","unstructured":"Karnani S, Agrawal N, Kumar R (2024) A comprehensive survey on low-rate and high-rate ddos defense approaches in sdn: taxonomy, research challenges, and opportunities. Multimed Tools Appl 83(12):35253\u201335306. https:\/\/doi.org\/10.1007\/s11042-023-16781-0","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"2458_CR16","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.3390\/sym14122483","volume":"14","author":"AHH Kabla","year":"2022","unstructured":"Kabla AHH, Thamrin AH, Anbar M, Manickam S, Karuppayah S (2022) PeerAmbush: multi-layer perceptron to detect peer-to-peer botnet. Symmetry 14(12):2483. https:\/\/doi.org\/10.3390\/sym14122483","journal-title":"Symmetry"},{"issue":"9","key":"2458_CR17","doi-asserted-by":"publisher","first-page":"1523","DOI":"10.3390\/diagnostics11091523","volume":"11","author":"S Li","year":"2021","unstructured":"Li S, Deng Y-Q, Zhu Z-L, Hua H-L, Tao Z-Z (2021) A comprehensive review on radiomics and deep learning for nasopharyngeal carcinoma imaging. Diagnostics 11(9):1523. https:\/\/doi.org\/10.3390\/diagnostics11091523","journal-title":"Diagnostics"},{"key":"2458_CR18","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.neucom.2016.12.038","volume":"234","author":"W Liu","year":"2017","unstructured":"Liu W, Wang Z, Liu X, Zeng N, Liu Y, Alsaadi FE (2017) A survey of deep neural network architectures and their applications. Neurocomputing 234:11\u201326. https:\/\/doi.org\/10.1016\/j.neucom.2016.12.038","journal-title":"Neurocomputing"},{"key":"2458_CR19","volume-title":"Artificial intelligence and intelligent systems","author":"P Langley","year":"2006","unstructured":"Langley P, Laird JE (2006) Artificial intelligence and intelligent systems. American Association for Artificial Intelligence, Menlo Park, CA, US"},{"issue":"1","key":"2458_CR20","doi-asserted-by":"publisher","first-page":"212","DOI":"10.3390\/pr11010212","volume":"11","author":"BA Mohammed","year":"2023","unstructured":"Mohammed BA, Senan EM, Alshammari TS, Alreshidi A, Alayba AM, Alazmi M, Alsagri AN (2023) Hybrid techniques of analyzing MRI images for early diagnosis of brain tumours based on hybrid features. Processes 11(1):212. https:\/\/doi.org\/10.3390\/pr11010212","journal-title":"Processes"},{"key":"2458_CR21","doi-asserted-by":"publisher","first-page":"102419","DOI":"10.1016\/j.jisa.2019.102419","volume":"50","author":"MA Ferrag","year":"2020","unstructured":"Ferrag MA, Maglaras L, Moschoyiannis S, Janicke H (2020) Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J Inf Secur Appl 50:102419. https:\/\/doi.org\/10.1016\/j.jisa.2019.102419","journal-title":"J Inf Secur Appl"},{"key":"2458_CR22","doi-asserted-by":"publisher","unstructured":"Dehghantanha A, Yazdinejad A, Parizi RM (2023) Autonomous cybersecurity: evolving challenges, emerging opportunities, and future research trajectories. In: Proceedings of the workshop on autonomous cybersecurity, pp 1\u201310. https:\/\/doi.org\/10.1145\/3689933.369083","DOI":"10.1145\/3689933.369083"},{"key":"2458_CR23","unstructured":"Brownlee J (2016) Deep learning with python: develop deep learning models on theano and tensorflow using Keras. Machine Learning Mastery. https:\/\/www.toogit.com\/uploads\/43614\/PortfolioImage\/60dbb272336db.pdf"},{"issue":"3","key":"2458_CR24","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1109\/COMST.2020.2988293","volume":"22","author":"MA Al-Garadi","year":"2020","unstructured":"Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M (2020) A survey of machine and deep learning methods for Internet of Things (IoT) security. IEEE Commun Surv Tutorials 22(3):1646\u20131685. https:\/\/doi.org\/10.1109\/COMST.2020.2988293","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"6","key":"2458_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/systems11060296","volume":"11","author":"A Mansoor","year":"2023","unstructured":"Mansoor A, Anbar M, Bahashwan AA, Alabsi BA, Rihan SDA (2023) Deep learning-based approach for detecting DDoS attack on software-defined networking controller. Systems 11(6):1\u201321. https:\/\/doi.org\/10.3390\/systems11060296","journal-title":"Systems"},{"issue":"5","key":"2458_CR26","doi-asserted-by":"publisher","first-page":"3033","DOI":"10.3390\/app13053033","volume":"13","author":"TE Ali","year":"2023","unstructured":"Ali TE, Chong Y-W, Manickam S (2023) Comparison of ML\/DL approaches for detecting DDoS attacks in SDN. Appl Sci 13(5):3033. https:\/\/doi.org\/10.3390\/app13053033","journal-title":"Appl Sci"},{"issue":"2","key":"2458_CR27","doi-asserted-by":"publisher","first-page":"923","DOI":"10.32604\/iasc.2022.024668","volume":"33","author":"A Fatmah","year":"2022","unstructured":"Fatmah A, Kamal J, Fathy E, Maher K, Abdullah B, Khalid A (2022) Ensemble deep learning models for mitigating DDoS attack in software-defined network. Intell Autom Soft Comput 33(2):923\u2013938. https:\/\/doi.org\/10.32604\/iasc.2022.024668","journal-title":"Intell Autom Soft Comput"},{"key":"2458_CR28","doi-asserted-by":"publisher","unstructured":"Mbasuva U, Zodi G-AL (2022) Designing ensemble deep learning intrusion detection system for ddos attacks in software defined networks. In: 2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM), Seoul, Korea, 03-05 January 2022. IEEE, pp 1\u20138. https:\/\/doi.org\/10.1109\/IMCOM53663.2022.9721785","DOI":"10.1109\/IMCOM53663.2022.9721785"},{"key":"2458_CR29","doi-asserted-by":"publisher","first-page":"14301","DOI":"10.1109\/ACCESS.2022.3148134","volume":"10","author":"AH Janabi","year":"2022","unstructured":"Janabi AH, Kanakis T, Johnson M (2022) Convolutional neural network based algorithm for early warning proactive system security in software defined networks. IEEE Access 10:14301\u201314310. https:\/\/doi.org\/10.1109\/ACCESS.2022.3148134","journal-title":"IEEE Access"},{"key":"2458_CR30","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.future.2021.11.009","volume":"129","author":"Y Liu","year":"2022","unstructured":"Liu Y, Zhi T, Shen M, Wang L, Li Y, Wan M (2022) Software-defined ddos detection with information entropy analysis and optimized deep learning. Futur Gener Comput Syst 129:99\u2013114. https:\/\/doi.org\/10.1016\/j.future.2021.11.009","journal-title":"Futur Gener Comput Syst"},{"key":"2458_CR31","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.procs.2021.07.032","volume":"191","author":"AS Alshra\u2019a","year":"2021","unstructured":"Alshra\u2019a AS, Farhat A, Seitz J (2021) Deep learning algorithms for detecting denial of service attacks in software-defined networks. Procedia Comp Sci 191:254\u2013263. https:\/\/doi.org\/10.1016\/j.procs.2021.07.032","journal-title":"Procedia Comp Sci"},{"issue":"1","key":"2458_CR32","doi-asserted-by":"publisher","first-page":"14","DOI":"10.3390\/technologies9010014","volume":"9","author":"JD Gadze","year":"2021","unstructured":"Gadze JD, Bamfo-Asante AA, Agyemang JO, Nunoo-Mensah H, Opare KA-B (2021) An investigation into the application of deep learning in the detection and mitigation of ddos attack on SDN controllers. Technologies 9(1):14. https:\/\/doi.org\/10.3390\/technologies9010014","journal-title":"Technologies"},{"key":"2458_CR33","doi-asserted-by":"publisher","unstructured":"Elsayed MS, Le-Khac N-A, Dev S, Jurcut AD (2020) Ddosnet: a deep-learning model for detecting network attacks. In: 2020 IEEE 21st International Symposium on\u201d A World of Wireless, Mobile and Multimedia Networks\u201d(WoWMoM), Cork, Ireland, 31 August 2020 - 03 September 2020. IEEE, pp 391\u2013396. https:\/\/doi.org\/10.1109\/WoWMoM49955.2020.00072","DOI":"10.1109\/WoWMoM49955.2020.00072"},{"issue":"9","key":"2458_CR34","doi-asserted-by":"publisher","first-page":"1533","DOI":"10.3390\/electronics9091533","volume":"9","author":"TA Tang","year":"2020","unstructured":"Tang TA, Mhamdi L, McLernon D, Zaidi SAR, Ghogho M, El Moussa F (2020) DeepIDS: deep learning approach for intrusion detection in software defined networking. Electronics 9(9):1533. https:\/\/doi.org\/10.3390\/electronics9091533","journal-title":"Electronics"},{"key":"2458_CR35","doi-asserted-by":"publisher","first-page":"53972","DOI":"10.1109\/ACCESS.2020.2976908","volume":"8","author":"S Haider","year":"2020","unstructured":"Haider S, Akhunzada A, Mustafa I, Patel TB, Fernandez A, Choo K-KR, Iqbal J (2020) A deep cnn ensemble framework for efficient ddos attack detection in software defined networks. IEEE Access 8:53972\u201353983. https:\/\/doi.org\/10.1109\/ACCESS.2020.2976908","journal-title":"IEEE Access"},{"key":"2458_CR36","doi-asserted-by":"publisher","unstructured":"Tang T, Mhamdi L, Zaidi S, El-moussa F, McLernon D, Ghogho M (2020) A deep learning approach combining autoencoder with one-class SVM for DDoS attack detection in SDNs. In: 2020 IEEE Eighth International Conference on Communications and Networking (ComNet), Hammamet, Tunisia, 27-30 October 2020. https:\/\/doi.org\/10.1109\/ComNet47917.2020.9306073","DOI":"10.1109\/ComNet47917.2020.9306073"},{"key":"2458_CR37","doi-asserted-by":"publisher","unstructured":"Tang TA, McLernon D, Mhamdi L, Zaidi SAR, Ghogho M (2019) Intrusion detection in SDN-based networks: deep recurrent neural network approach. Springer International Publishing, Cham, pp 175\u2013195. https:\/\/doi.org\/10.1007\/978-3-030-13057-2_8","DOI":"10.1007\/978-3-030-13057-2_8"},{"key":"2458_CR38","doi-asserted-by":"publisher","unstructured":"Tang TA, Mhamdi L, McLernon D, Zaidi SAR, Ghogho M (2018) Deep recurrent neural network for intrusion detection in SDN-based networks. In: 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft, Montreal, QC, Canada, 25-29 June 2018). IEEE, pp 202\u2013206. https:\/\/doi.org\/10.1109\/NETSOFT.2018.8460090","DOI":"10.1109\/NETSOFT.2018.8460090"},{"key":"2458_CR39","doi-asserted-by":"publisher","unstructured":"Liu Y, Dong M, Ota K, Li J, Wu J (2018) Deep reinforcement learning based smart mitigation of DDoS flooding in software-defined networks. In: 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Barcelona, Spain, 17-19 September 2018. IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/CAMAD.2018.8514971","DOI":"10.1109\/CAMAD.2018.8514971"},{"issue":"5","key":"2458_CR40","doi-asserted-by":"publisher","first-page":"e3497","DOI":"10.1002\/dac.3497","volume":"31","author":"C Li","year":"2018","unstructured":"Li C, Wu Y, Yuan X, Sun Z, Wang W, Li X, Gong L (2018) Detection and defense of DDoS attack-based on deep learning in openflow-based SDN. Int J Commun Syst 31(5):e3497. https:\/\/doi.org\/10.1002\/dac.3497","journal-title":"Int J Commun Syst"},{"key":"2458_CR41","doi-asserted-by":"publisher","unstructured":"Niyaz Q, Sun W, Javaid AY (2017) A deep learning based DDoS detection system in software-defined networking (SDN). EAI Endorsed Trans Secur Safety 4(12). https:\/\/doi.org\/10.4108\/eai.28-12-2017.153515","DOI":"10.4108\/eai.28-12-2017.153515"},{"key":"2458_CR42","doi-asserted-by":"publisher","unstructured":"Tang TA, Mhamdi L, McLernon D, Zaidi SAR, Ghogho M (2016) Deep learning approach for network intrusion detection in software defined networking. In: 2016 international conference on wireless networks and mobile communications (WINCOM), Fez, Morocco, 26-29 October 2016. IEEE, pp 258\u2013263. https:\/\/doi.org\/10.1109\/WINCOM.2016.7777224","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"2458_CR43","doi-asserted-by":"publisher","unstructured":"Nazari H, Yazdinejad A, Dehghantanha A, Zarrinkalam F, Srivastava G (2023) P3gnn: a privacy-preserving provenance graph-based model for autonomous apt detection in software defined networking. In: Proceedings of the workshop on autonomous cybersecurity, pp 34\u201344. https:\/\/doi.org\/10.1145\/3689933.369083","DOI":"10.1145\/3689933.369083"},{"issue":"1","key":"2458_CR44","doi-asserted-by":"publisher","first-page":"37","DOI":"10.3390\/a18010037","volume":"18","author":"G Husain","year":"2025","unstructured":"Husain G, Nasef D, Jose R, Mayer J, Bekbolatova M, Devine T, Toma M (2025) Smote vs. smoteenn: a study on the performance of resampling algorithms for addressing class imbalance in regression models. Algorithms 18(1):37. https:\/\/doi.org\/10.3390\/a18010037","journal-title":"Algorithms"},{"key":"2458_CR45","doi-asserted-by":"publisher","unstructured":"Elejla OE, Anbar M, Hamouda S, Faisal S, Bahashwan AA, Hasbullah IH (2022) Deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks. Appl Sci 12(12). https:\/\/doi.org\/10.3390\/app12126150","DOI":"10.3390\/app12126150"},{"key":"2458_CR46","doi-asserted-by":"publisher","unstructured":"ElSayed MS, Le-Khac N-A, Albahar MA, Jurcut A (2021) A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique. J Netw Comput Appl 191:103160. https:\/\/doi.org\/10.1016\/j.jnca.2021.103160","DOI":"10.1016\/j.jnca.2021.103160"},{"key":"2458_CR47","doi-asserted-by":"publisher","unstructured":"Uddin MT, Uddiny MA (2015) A guided random forest based feature selection approach for activity recognition. In: 2015 International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), Savar, Bangladesh, 29 October 2015. IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICEEICT.2015.7307376","DOI":"10.1109\/ICEEICT.2015.7307376"},{"key":"2458_CR48","doi-asserted-by":"publisher","first-page":"114805","DOI":"10.1016\/j.eswa.2021.114805","volume":"174","author":"S Kili\u00e7arslan","year":"2021","unstructured":"Kili\u00e7arslan S, Celik M (2021) RSigELU: a nonlinear activation function for deep neural networks. Expert Syst Appl 174:114805. https:\/\/doi.org\/10.1016\/j.eswa.2021.114805","journal-title":"Expert Syst Appl"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-025-02458-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-025-02458-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-025-02458-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T01:42:46Z","timestamp":1760492566000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-025-02458-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":48,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["2458"],"URL":"https:\/\/doi.org\/10.1007\/s11036-025-02458-5","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4]]},"assertion":[{"value":"11 July 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}