{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T18:34:29Z","timestamp":1770834869050,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2021,2,24]],"date-time":"2021-02-24T00:00:00Z","timestamp":1614124800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,24]],"date-time":"2021-02-24T00:00:00Z","timestamp":1614124800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s11042-021-10640-6","type":"journal-article","created":{"date-parts":[[2021,2,24]],"date-time":"2021-02-24T23:02:45Z","timestamp":1614207765000},"page":"26739-26757","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":61,"title":["Enhanced method of ANN based model for detection of DDoS attacks on multimedia internet of things"],"prefix":"10.1007","volume":"81","author":[{"given":"R.","family":"Gopi","sequence":"first","affiliation":[]},{"given":"V.","family":"Sathiyamoorthi","sequence":"additional","affiliation":[]},{"given":"S.","family":"Selvakumar","sequence":"additional","affiliation":[]},{"given":"Ramasamy","family":"Manikandan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0775-5540","authenticated-orcid":false,"given":"Pushpita","family":"Chatterjee","sequence":"additional","affiliation":[]},{"given":"N. Z.","family":"Jhanjhi","sequence":"additional","affiliation":[]},{"given":"Ashish Kumar","family":"Luhach","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,24]]},"reference":[{"issue":"5","key":"10640_CR1","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1007\/s00521-018-3383-7","volume":"31","author":"D Arivudainambi","year":"2019","unstructured":"Arivudainambi D, Varun Kumar KA, Chakkaravarthy SS (2019) LION IDS: a meta-heuristics approach to detect DDoS attacks against software-defined networks. Neural Comput Applic 31(5):1491\u20131501","journal-title":"Neural Comput Applic"},{"issue":"1","key":"10640_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.3390\/electronics6010005","volume":"6","author":"L Chhaya","year":"2017","unstructured":"Chhaya L, Sharma P, Bhagwatikar G, Kumar A (2017) Wireless sensor network based smart grid communications: cyber attacks, intrusion detection system and topology control. Electronics 6(1):5","journal-title":"Electronics"},{"key":"10640_CR3","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.jnca.2018.02.004","volume":"108","author":"JF Colom","year":"2018","unstructured":"Colom JF, Gil D, Mora H, Volckaert B, Jimeno AM (2018) Scheduling framework for distributed intrusion detection systems over heterogeneous network architectures. J Netw Comput Appl 108:76\u201386","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"10640_CR4","doi-asserted-by":"publisher","first-page":"2425","DOI":"10.1007\/s11277-015-2536-6","volume":"83","author":"M Duraipandian","year":"2015","unstructured":"Duraipandian M, Palanisamy C (2015) Analysis of a combined parameter-based multi-objective model for performance improvement in wireless networks. Wirel Pers Commun 83(4):2425\u20132437","journal-title":"Wirel Pers Commun"},{"issue":"1","key":"10640_CR5","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1109\/COMST.2018.2862350","volume":"21","author":"I Farris","year":"2018","unstructured":"Farris I et al (2018) A survey on emerging SDN and NFV security mechanisms for IoT systems. IEEE Commun Surv Tutor 21(1):812\u2013837","journal-title":"IEEE Commun Surv Tutor"},{"issue":"3","key":"10640_CR6","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/fi12030044","volume":"12","author":"MA Ferrag","year":"2020","unstructured":"Ferrag MA, Maglaras L, Ahmim A, Derdour M, Janicke H (2020) RDTIDS: rules and decision tree-based intrusion detection system for internet-of-things networks. Futur Internet 12(3):44","journal-title":"Futur Internet"},{"key":"10640_CR7","doi-asserted-by":"crossref","unstructured":"Fu Y, et al. (2017) An automata based intrusion detection method for internet of things. Mob Inf Syst 2017","DOI":"10.1155\/2017\/1750637"},{"issue":"2","key":"10640_CR8","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1007\/s11277-018-5307-3","volume":"103","author":"UD Gandhi","year":"2018","unstructured":"Gandhi UD, Kumar PM, Varatharajan R, Manogaran G, Sundarasekar R, Kadu S (2018) HIoTPOT: surveillance on IoT devices against recent threats. Wirel Pers Commun 103(2):1179\u20131194","journal-title":"Wirel Pers Commun"},{"key":"10640_CR9","doi-asserted-by":"crossref","unstructured":"Gendreau AA, Moorman M (2016) Survey of intrusion detection systems towards an end to end secure internet of things. In: 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud), pp. 84\u201390. IEEE","DOI":"10.1109\/FiCloud.2016.20"},{"issue":"4","key":"10640_CR10","doi-asserted-by":"publisher","first-page":"577","DOI":"10.3390\/electronics9040577","volume":"9","author":"A Golrang","year":"2020","unstructured":"Golrang A, Golrang AM, Yayilgan SY, Elezaj O (2020) A novel hybrid IDS based on modified NSGAII-ANN and random forest. Electronics 9(4):577","journal-title":"Electronics"},{"key":"10640_CR11","doi-asserted-by":"publisher","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","volume":"7","author":"V Hassija","year":"2019","unstructured":"Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721\u201382743","journal-title":"IEEE Access"},{"key":"10640_CR12","doi-asserted-by":"crossref","unstructured":"Hussain F, Hussain R, Hassan SA, & Hossain E (2020) Machine learning in IoT security: current solutions and future challenges. IEEE Commun Surv Tutor","DOI":"10.1109\/COMST.2020.2986444"},{"key":"10640_CR13","doi-asserted-by":"crossref","unstructured":"Khan R, Kumar P, Jayakody DNK, Liyanage M (2019) A survey on security and privacy of 5G technologies: potential solutions, recent advancements and future directions. IEEE Commun Surv Tutor","DOI":"10.1109\/COMST.2019.2933899"},{"issue":"6","key":"10640_CR14","doi-asserted-by":"publisher","first-page":"916","DOI":"10.3390\/electronics9060916","volume":"9","author":"J Kim","year":"2020","unstructured":"Kim J, Kim J, Kim H, Shim M, Choi E (2020) CNN-based network intrusion detection against denial-of-service attacks. Electronics 9(6):916","journal-title":"Electronics"},{"issue":"2","key":"10640_CR15","first-page":"117","volume":"12","author":"MS Ksasy","year":"2018","unstructured":"Ksasy MS et al (2018) A new advanced cryptographic algorithm system for binary codes by means of mathematical equation. ICIC Exp Lett 12(2):117\u2013125","journal-title":"ICIC Exp Lett"},{"key":"10640_CR16","doi-asserted-by":"publisher","first-page":"77396","DOI":"10.1109\/ACCESS.2020.2986013","volume":"8","author":"S Manimurugan","year":"2020","unstructured":"Manimurugan S, Al-Mutairi S, Aborokbah MM, Chilamkurti N, Ganesan S, Patan R (2020) Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE Access 8:77396\u201377404","journal-title":"IEEE Access"},{"issue":"3","key":"10640_CR17","doi-asserted-by":"publisher","first-page":"106","DOI":"10.3390\/info10030106","volume":"10","author":"P Manso","year":"2019","unstructured":"Manso P, Moura J, Serr\u00e3o C (2019) SDN-based intrusion detection system for early detection and mitigation of DDoS attacks. Information 10(3):106","journal-title":"Information"},{"key":"10640_CR18","doi-asserted-by":"publisher","first-page":"16623","DOI":"10.1109\/ACCESS.2018.2798626","volume":"6","author":"MN Napiah","year":"2018","unstructured":"Napiah MN, Idris MYIB, Ramli R, Ahmedy I (2018) Compression header analyzer intrusion detection system (cha-ids) for 6lowpan communication protocol. IEEE Access 6:16623\u201316638","journal-title":"IEEE Access"},{"key":"10640_CR19","doi-asserted-by":"crossref","unstructured":"Pejic D, Arsic M (2019) Minimization and maximization of functions: golden-section search in one dimension. In: Exploring the Data Flow Supercomputing Paradigm (pp. 55\u201390). Springer: Cham","DOI":"10.1007\/978-3-030-13803-5_3"},{"issue":"1","key":"10640_CR20","first-page":"46","volume":"6","author":"AA Suratgar","year":"2005","unstructured":"Suratgar AA, Tavakoli MB, Hoseinabadi A (2005) Modified Levenberg-Marquardt method for neural networks training. World Acad Sci Eng Technol 6(1):46\u201348","journal-title":"World Acad Sci Eng Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10640-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10640-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10640-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T07:11:53Z","timestamp":1658214713000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10640-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,24]]},"references-count":20,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["10640"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10640-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,24]]},"assertion":[{"value":"29 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}