{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:58:53Z","timestamp":1775667533404,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T00:00:00Z","timestamp":1738022400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T00:00:00Z","timestamp":1738022400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s12083-024-01894-6","type":"journal-article","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T09:10:38Z","timestamp":1738055438000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Distributed denial of service attack detection and mitigation strategy in 5G-enabled internet of things networks with adaptive cascaded gated recurrent unit"],"prefix":"10.1007","volume":"18","author":[{"given":"Md. Mobin","family":"Akhtar","sequence":"first","affiliation":[]},{"given":"Sultan Ali","family":"Alasmari","sequence":"additional","affiliation":[]},{"given":"Sk Wasim","family":"Haidar","sequence":"additional","affiliation":[]},{"given":"Ali Abdulaziz","family":"Alzubaidi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,28]]},"reference":[{"key":"1894_CR1","doi-asserted-by":"crossref","first-page":"104745","DOI":"10.1109\/ACCESS.2023.3318316","volume":"11","author":"M Aljebreen","year":"2023","unstructured":"Aljebreen M, Mengash HA, Arasi MA, Aljameel SS, Salama AS, Hamza MA (2023) Enhancing DDoS attack detection using snake optimizer with ensemble learning on internet of things environment. IEEE Access 11:104745\u2013104753","journal-title":"IEEE Access"},{"key":"1894_CR2","doi-asserted-by":"crossref","first-page":"119862","DOI":"10.1109\/ACCESS.2023.3327620","volume":"11","author":"A Ahmim","year":"2023","unstructured":"Ahmim A, Maazouzi F, Ahmim M, Namane S, Dhaou IB (2023) Distributed Denial of Service Attack Detection for the Internet of Things Using Hybrid Deep Learning Mode. IEEE Access 11:119862\u2013119875","journal-title":"IEEE Access"},{"key":"1894_CR3","doi-asserted-by":"crossref","first-page":"18448","DOI":"10.1109\/ACCESS.2023.3247512","volume":"11","author":"Z Liu","year":"2023","unstructured":"Liu Z, Guo C, Liu D, Yin X (2023) An Asynchronous Federated Learning Arbitration Model for Low-Rate DDoS Attack Detection. IEEE Access 11:18448\u201318460","journal-title":"IEEE Access"},{"issue":"2","key":"1894_CR4","doi-asserted-by":"crossref","first-page":"590","DOI":"10.1016\/j.dcan.2022.04.008","volume":"9","author":"H Huang","year":"2023","unstructured":"Huang H, Ye P, Hu M, Wu J (2023) A multi-point collaborative DDoS defense mechanism for IIoT environment. Digital Commun Networks 9(2):590\u2013601","journal-title":"Digital Commun Networks"},{"issue":"5","key":"1894_CR5","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/s11082-023-04553-x","volume":"55","author":"N Sivanesan","year":"2023","unstructured":"Sivanesan N, Archana KS (2023) Detecting distributed denial of service (DDoS) in SD-IoT environment with enhanced firefly algorithm and convolution neural network. Opt Quantum Electron 55(5):393","journal-title":"Opt Quantum Electron"},{"key":"1894_CR6","doi-asserted-by":"crossref","unstructured":"Alashhab AA, Zahid MSM, Muneer A and Abdullahi M. (2022) Low-rate DDoS attack Detection using Deep Learning for SDN-enabled IoT Networks. Int J Adv Comput Sci Appl 13(11).","DOI":"10.14569\/IJACSA.2022.0131141"},{"issue":"1","key":"1894_CR7","first-page":"20220155","volume":"32","author":"FM Aswad","year":"2023","unstructured":"Aswad FM, Ahmed AMS, Alhammadi NAM, Khalaf BA, Mostafa SA (2023) Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks. J Intell Syst 32(1):20220155","journal-title":"J Intell Syst"},{"key":"1894_CR8","doi-asserted-by":"crossref","unstructured":"Alshunaifi SY, Mishra S and Alshehri M (2022) Cyber-Attack Detection and Mitigation Using SVM for 5G Network. Intell Autom Soft Comput 31(1).","DOI":"10.32604\/iasc.2022.019121"},{"issue":"7","key":"1894_CR9","doi-asserted-by":"crossref","first-page":"2697","DOI":"10.3390\/s22072697","volume":"22","author":"M Aslam","year":"2022","unstructured":"Aslam M, Ye D, Tariq A, Asad M, Hanif M, Ndzi D, Chelloug SA, Al-Qaness EMA, MAA and Jilani SF, (2022) Adaptive machine learning based distributed denial-of-services attacks detection and mitigation system for SDN-enabled IoT. Sensors 22(7):2697","journal-title":"Sensors"},{"key":"1894_CR10","unstructured":"Alzhrani RM and Alliheedi MA (2023) 5G Networks and IoT Devices: Mitigating DDoS Attacks with Deep Learning Techniques, arXiv, Cryptography and Security. 2311\u201306938."},{"issue":"10","key":"1894_CR11","first-page":"93","volume":"8","author":"UM Badamasi","year":"2020","unstructured":"Badamasi UM, Khaliq S, Babalola O, Musa S, Iqbal T (2020) A deep learning based approach for DDoS attack detection in IoT-enabled smart environments. Int J Comput Netw Commun Secur 8(10):93\u201399","journal-title":"Int J Comput Netw Commun Secur"},{"issue":"2","key":"1894_CR12","doi-asserted-by":"crossref","first-page":"382","DOI":"10.11591\/ijai.v10.i2.pp382-388","volume":"10","author":"T Khempetch","year":"2021","unstructured":"Khempetch T, Wuttidittachotti P (2021) DDoS attack detection using deep learning. IAES Int J Artif Intell 10(2):382","journal-title":"IAES Int J Artif Intell"},{"issue":"2","key":"1894_CR13","doi-asserted-by":"crossref","first-page":"1280","DOI":"10.3934\/mbe.2022059","volume":"19","author":"J Wang","year":"2022","unstructured":"Wang J, Liu Y, Feng H (2022) IFACNN: efficient DDoS attack detection based on improved firefly algorithm to optimize convolutional neural networks. Math Biosci Eng 19(2):1280\u20131303","journal-title":"Math Biosci Eng"},{"issue":"2","key":"1894_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5539\/mas.v16n2p1","volume":"16","author":"GO Coli","year":"2022","unstructured":"Coli GO, Aina S, Okegbile SD, Lawal AR, Oluwaranti AI (2022) DDoS Attacks Detection in the IoT Using Deep Gaussian-Bernoulli Restricted Boltzmann Machine. Mod Appl Sci 16(2):1\u201312","journal-title":"Mod Appl Sci"},{"issue":"4A","key":"1894_CR15","first-page":"655","volume":"17","author":"MM Shurman","year":"2020","unstructured":"Shurman MM, Khrais RM, Yateem AA (2020) DoS and DDoS attack detection using deep learning and IDS. Int Arab J Inf Technol 17(4A):655\u2013661","journal-title":"Int Arab J Inf Technol"},{"issue":"23","key":"1894_CR16","doi-asserted-by":"crossref","first-page":"12407","DOI":"10.3390\/app122312407","volume":"12","author":"SH Lee","year":"2022","unstructured":"Lee SH, Shiue YL, Cheng CH, Li YH, Huang YF (2022) Detection and Prevention of DDoS Attacks on the IoT. Appl Sci 12(23):12407","journal-title":"Appl Sci"},{"issue":"2","key":"1894_CR17","doi-asserted-by":"crossref","first-page":"105","DOI":"10.12700\/APH.20.2.2023.2.6","volume":"20","author":"ASA Issa","year":"2023","unstructured":"Issa ASA, Albayrak Z (2023) Ddos attack intrusion detection system based on hybridization of cnn and lstm. Acta Polytech Hung 20(2):105\u2013123","journal-title":"Acta Polytech Hung"},{"key":"1894_CR18","volume":"222","author":"PB Caballero","year":"2023","unstructured":"Caballero PB, Wang Q, Calero JMA (2023) Distributed dual-layer autonomous closed loops for self-protection of 5G\/6G IoT networks from distributed denial of service attacks. Comput Networks 222:109526","journal-title":"Comput Networks"},{"key":"1894_CR19","doi-asserted-by":"crossref","first-page":"28934","DOI":"10.1109\/ACCESS.2023.3260256","volume":"11","author":"WI Khedr","year":"2023","unstructured":"Khedr WI, Gouda AE, Mohamed ER (2023) FMDADM: A Multi-Layer DDoS Attack Detection and Mitigation Framework Using Machine Learning for Stateful SDN-Based IoT Networks. IEEE Access 11:28934\u201328954","journal-title":"IEEE Access"},{"issue":"2","key":"1894_CR20","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1109\/TII.2020.2974520","volume":"17","author":"B Hussain","year":"2021","unstructured":"Hussain B, Du Q, Sun B, Han Z (2021) Deep Learning-Based DDoS-Attack Detection for Cyber-Physical System Over 5G Network. IEEE Trans Ind Inf 17(2):860\u2013870","journal-title":"IEEE Trans Ind Inf"},{"key":"1894_CR21","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.procs.2021.02.003","volume":"182","author":"MA Lawal","year":"2021","unstructured":"Lawal MA, Shaikh RA, Hassan SR (2021) A DDoS attack mitigation framework for IoT networks using fog computing. Procedia Comput Sci 182:13\u201320","journal-title":"Procedia Comput Sci"},{"key":"1894_CR22","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108399","volume":"199","author":"EM B\u00e5rli","year":"2021","unstructured":"B\u00e5rli EM, Yazidi A, Viedma EH, Haugerud H (2021) DoS and DDoS mitigation using variational autoencoders. Comput Networks 199:108399","journal-title":"Comput Networks"},{"issue":"8","key":"1894_CR23","doi-asserted-by":"crossref","first-page":"4953","DOI":"10.3390\/app13084953","volume":"13","author":"R Jmal","year":"2023","unstructured":"Jmal R, Ghabri W, Guesmi R, Alshammari BM, Alshammari AS, Alsaif H (2023) Distributed Blockchain-SDN Secure IoT System Based on ANN to Mitigate DDoS Attacks. Appl Sci 13(8):4953","journal-title":"Appl Sci"},{"issue":"7","key":"1894_CR24","doi-asserted-by":"crossref","first-page":"2697","DOI":"10.3390\/s22072697","volume":"22","author":"M Aslam","year":"2022","unstructured":"Aslam M, Ye D, Tariq A, Asad M, Hanif M, Ndzi D, Chelloug SA, Elaziz MA, Al-Qaness MAA, Jilani SF (2022) Adaptive machine learning based distributed denial-of-services attacks detection and mitigation system for SDN-enabled IoT. Sensors 22(7):2697","journal-title":"Sensors"},{"issue":"3","key":"1894_CR25","doi-asserted-by":"crossref","first-page":"1604","DOI":"10.11591\/eei.v11i3.3643","volume":"11","author":"KF Hassan","year":"2022","unstructured":"Hassan KF, Manaa ME (2022) Detection and mitigation of DDoS attacks in internet of things using a fog computing hybrid approach. Bull Electr Eng Inf 11(3):1604\u20131613","journal-title":"Bull Electr Eng Inf"},{"key":"1894_CR26","volume":"134","author":"IA Khan","year":"2022","unstructured":"Khan IA, Keshk M, Pi D, Khan N, Hussain Y, Soliman H (2022) Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems. Ad Hoc Netw 134:102930","journal-title":"Ad Hoc Netw"},{"issue":"10","key":"1894_CR27","doi-asserted-by":"crossref","first-page":"8467","DOI":"10.1109\/JIOT.2022.3200048","volume":"10","author":"IA Khan","year":"2022","unstructured":"Khan IA, Pi D, Abbas MZ, Zia U, Hussain Y, Soliman H (2022) Federated-SRUs: A Federated-Simple-Recurrent-Units-Based IDS for Accurate Detection of Cyber Attacks Against IoT-Augmented Industrial Control Systems. IEEE Internet Things J 10(10):8467\u20138476","journal-title":"IEEE Internet Things J"},{"issue":"13","key":"1894_CR28","doi-asserted-by":"crossref","first-page":"11604","DOI":"10.1109\/JIOT.2021.3130156","volume":"9","author":"IA Khan","year":"2021","unstructured":"Khan IA, Moustafa N, Pi D, Sallam KM, Zomaya AY, Li B (2021) A New Explainable Deep Learning Framework for Cyber Threat Discovery in Industrial IoT Networks. IEEE Internet Things J 9(13):11604\u201311613","journal-title":"IEEE Internet Things J"},{"key":"1894_CR29","doi-asserted-by":"crossref","unstructured":"Singh A, Gupta BB Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions. Int J Semant Web Inf Syst (IJSWIS) 18(1): 43(2022).","DOI":"10.4018\/IJSWIS.297143"},{"key":"1894_CR30","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s11235-020-00747-w","volume":"77","author":"A Mishra","year":"2021","unstructured":"Mishra A, Gupta N, Gupta BB (2021) Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecommun Syst 77:47\u201362","journal-title":"Telecommun Syst"},{"issue":"1","key":"1894_CR31","first-page":"10","volume":"14","author":"A Mishra","year":"2022","unstructured":"Mishra A, Joshi BK, Arya V, Gupta AK, Chui KT (2022) Detection of Distributed Denial of Service (DDoS) Attacks Using Computational Intelligence and Majority Vote-Based Ensemble Approach. Int J Software Sci Comput Intell (IJSSCI) 14(1):10","journal-title":"Int J Software Sci Comput Intell (IJSSCI)"},{"key":"1894_CR32","unstructured":"Badis H, Munaretto, A, Aghal, KA, and Pujolle G (2004) Optimal path selection in a link state QoS routing protocol, 2004 IEEE 59th Vehicular Technology Conference. VTC 2004-Spring (IEEE Cat. No.04CH37514), Milan, Italy."},{"issue":"11","key":"1894_CR33","doi-asserted-by":"crossref","first-page":"8356","DOI":"10.1109\/TII.2022.3168011","volume":"18","author":"A Yazdinejad","year":"2022","unstructured":"Yazdinejad A, Dehghantanha A, Parizi RM, Hammoudeh M, Karimipour H, Srivastava G (2022) Block hunter: Federated learning for cyber threat hunting in blockchain-based iiot networks. IEEE Trans Ind Inf 18(11):8356\u20138366","journal-title":"IEEE Trans Ind Inf"},{"issue":"11","key":"1894_CR34","doi-asserted-by":"crossref","first-page":"8356","DOI":"10.1109\/TII.2022.3168011","volume":"18","author":"G Srivastava","year":"2022","unstructured":"Srivastava G (2022) Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-Based IIoT Networks. IEEE Trans Ind Inf 18(11):8356\u20138366","journal-title":"IEEE Trans Ind Inf"},{"key":"1894_CR35","doi-asserted-by":"crossref","unstructured":"Namakshenas D, Yazdinejad A, Dehghantanha A, & Srivastava G (2024) Federated quantum-based privacy-preserving threat detection model for consumer internet of things. IEEE Trans Consum Electron.","DOI":"10.1109\/TCE.2024.3377550"},{"key":"1894_CR36","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2024.103088","volume":"148","author":"A Yazdinejad","year":"2024","unstructured":"Yazdinejad A, Dehghantanha A, Srivastava G, Karimipour H, Parizi RM (2024) Hybrid privacy preserving federated learning against irregular users in next-generation Internet of Things. J Syst Archit 148:103088","journal-title":"J Syst Archit"},{"key":"1894_CR37","doi-asserted-by":"crossref","unstructured":"Yazdinejad A, Dehghantanha A, Karimipour H, Srivastava G, & Parizi RM (2024) A robust privacy-preserving federated learning model against model poisoning attacks. IEEE Trans Inf Forensics Secur.","DOI":"10.1109\/TIFS.2024.3420126"},{"issue":"4","key":"1894_CR38","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/s10723-023-09690-x","volume":"21","author":"MM Akhtar","year":"2023","unstructured":"Akhtar MM, Shatat ASA, Al-Hashimi M, Zamani AS, Rizwanullah M, Mohamed SSI, Ayub R (2023) MapReduce with deep learning framework for student health monitoring system using IoT technology for big data. J Grid Comput 21(4):67","journal-title":"J Grid Comput"},{"issue":"11","key":"1894_CR39","first-page":"727","volume":"22","author":"AS Zamani","year":"2022","unstructured":"Zamani AS, Shatat ASA, Khan IA, Akhtar MM, Ayub R, Samdani F (2022) Cloud Network Design and Requirements for the Virtualization System for IoT Networks. IJCSNS 22(11):727","journal-title":"IJCSNS"},{"key":"1894_CR40","unstructured":"Shatat ASA, Akhtar MM, Zamani AS, Dilshad S, & Samdani F (2022) Big Data Driven Map Reduce Framework for Automated Flood Disaster Detection Based on Heuristic-Based Ensemble Learning. Cybern Syst 1\u201335."},{"issue":"11","key":"1894_CR41","doi-asserted-by":"crossref","first-page":"17353","DOI":"10.1007\/s11042-022-13934-5","volume":"82","author":"MM Akhtar","year":"2023","unstructured":"Akhtar MM, Shatat RSA, Shatat ASA, Hameed SA, Alnajdawi SI (2023) IoMT-based smart healthcare monitoring system using adaptive wavelet entropy deep feature fusion and improved RNN. Multimedia Tools Appl 82(11):17353\u201317390","journal-title":"Multimedia Tools Appl"},{"issue":"2","key":"1894_CR42","doi-asserted-by":"crossref","first-page":"91","DOI":"10.3390\/biomimetics9020091","volume":"9","author":"MV Anaraki","year":"2024","unstructured":"Anaraki MV, Farzin S (2024) The Pine Cone Optimization Algorithm (PCOA). Biomimetics 9(2):91","journal-title":"Biomimetics"},{"key":"1894_CR43","unstructured":"Dabbaghjamanesh M, Moeini A, Kimball J, & Zhang J (2019) Using gated recurrent units for selective harmonic current mitigation-pwm in grid-tied cascaded h-bridge converters. IEEE Trans Ind Appl."},{"key":"1894_CR44","doi-asserted-by":"crossref","first-page":"143608","DOI":"10.1109\/ACCESS.2021.3121998","volume":"9","author":"A Mezina","year":"2021","unstructured":"Mezina A, Burget R, Travieso-Gonz\u00e1lez CM (2021) Network anomaly detection with temporal convolutional network and U-Net model. IEEE Access 9:143608\u2013143622","journal-title":"IEEE Access"},{"key":"1894_CR45","doi-asserted-by":"crossref","first-page":"87099","DOI":"10.1109\/ACCESS.2022.3192836","volume":"10","author":"H Singh","year":"2022","unstructured":"Singh H, Sharma S, Khurana M, Kaur M, Lee HN (2022) Binary Drone Squadron optimization approaches for feature selection. IEEE Access 10:87099\u201387114","journal-title":"IEEE Access"},{"key":"1894_CR46","doi-asserted-by":"crossref","unstructured":"Rao MR & Sundar S (2023) An Efficient Method for Optimal Allocation of Resources in LPWAN Using Hybrid Coati-Energy Valley Optimization Algorithm Based on Reinforcement Learning. IEEE Access.","DOI":"10.1109\/ACCESS.2023.3325724"},{"key":"1894_CR47","doi-asserted-by":"crossref","first-page":"1428","DOI":"10.1016\/j.egyr.2020.05.024","volume":"6","author":"H Shi","year":"2020","unstructured":"Shi H, Li J, Zafetti N (2020) New optimized technique for unknown parameters selection of SOFC using converged grass fibrous root optimization algorithm. Energy Rep 6:1428\u20131437","journal-title":"Energy Rep"},{"key":"1894_CR48","doi-asserted-by":"crossref","first-page":"161546","DOI":"10.1109\/ACCESS.2021.3128837","volume":"9","author":"YK Saheed","year":"2021","unstructured":"Saheed YK, Arowolo MO (2021) Efficient cyber attack detection on the internet of medical things-smart environment based on deep recurrent neural network and machine learning algorithms. IEEE Access 9:161546\u2013161554","journal-title":"IEEE Access"},{"issue":"6","key":"1894_CR49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/LSENS.2020.2993522","volume":"4","author":"Z Khan","year":"2020","unstructured":"Khan Z, Chowdhury M, Islam M, Huang CY, Rahman M (2020) Long short-term memory neural network-based attack detection model for in-vehicle network security. IEEE Sens Lett 4(6):1\u20134","journal-title":"IEEE Sens Lett"},{"key":"1894_CR50","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103588","volume":"137","author":"WG Gadallah","year":"2024","unstructured":"Gadallah WG, Ibrahim HM, Omar NM (2024) A deep learning technique to detect distributed denial of service attacks in software-defined networks. Comput Secur 137:103588","journal-title":"Comput Secur"},{"issue":"9","key":"1894_CR51","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.3390\/math12091294","volume":"12","author":"FL Becerra-Suarez","year":"2024","unstructured":"Becerra-Suarez FL, Fern\u00e1ndez-Roman I, Forero MG (2024) Improvement of Distributed Denial of Service Attack Detection through Machine Learning and Data Processing. Mathematics 12(9):1294","journal-title":"Mathematics"},{"issue":"14","key":"1894_CR52","doi-asserted-by":"crossref","first-page":"24715","DOI":"10.1109\/JIOT.2024.3376578","volume":"11","author":"YA Abid","year":"2024","unstructured":"Abid YA, Wu J, Xu G, Fu S, Waqas M (2024) Multilevel Deep Neural Network Approach for Enhanced Distributed Denial-of-Service Attack Detection and Classification in Software-Defined Internet of Things Networks. IEEE Internet Things J 11(14):24715\u201324725","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"1894_CR53","doi-asserted-by":"crossref","first-page":"1519","DOI":"10.1080\/15567036.2021.2023237","volume":"46","author":"D Durairaj","year":"2024","unstructured":"Durairaj D, Venkatasamy TK, Mehbodniya A, Umar S, Alam T (2024) Intrusion detection and mitigation of attacks in microgrid using enhanced deep belief network. Energy Sources, Part A 46(1):1519\u20131541","journal-title":"Energy Sources, Part A"},{"issue":"11","key":"1894_CR54","doi-asserted-by":"crossref","first-page":"32367","DOI":"10.1007\/s11042-023-16894-6","volume":"83","author":"KK Paidipati","year":"2024","unstructured":"Paidipati KK, Kurangi C, Uthayakumar J, Padmanayaki S, Pradeepa D, Nithinsha S (2024) Ensemble of deep reinforcement learning with optimization model for DDoS attack detection and classification in cloud based software defined networks. Multimedia Tools Appl 83(11):32367\u201332385","journal-title":"Multimedia Tools Appl"},{"key":"1894_CR55","doi-asserted-by":"crossref","unstructured":"Dora VRS & Lakshmi VN (2024) Smart network security using advanced ensemble-DDoS attack detection and hybrid JA-SLOA-linked optimal routing-based mitigation. Aust J Electr Electron Eng 1\u201323.","DOI":"10.1080\/1448837X.2024.2335797"},{"key":"1894_CR56","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.122544","volume":"241","author":"O Pandithurai","year":"2024","unstructured":"Pandithurai O, Venkataiah C, Tiwari S, Ramanjaneyulu N (2024) DDoS attack prediction using a honey badger optimization algorithm based feature selection and Bi-LSTM in cloud environment. Expert Syst Appl 241:122544","journal-title":"Expert Syst Appl"},{"key":"1894_CR57","doi-asserted-by":"crossref","unstructured":"Wasserman L, and Wasserman Y (2022) Hospital cybersecurity risks and gaps: Review (for the non-cyber professional). Frontiers.","DOI":"10.3389\/fdgth.2022.862221"},{"key":"1894_CR58","doi-asserted-by":"crossref","unstructured":"Bhunia SS, Gurusamy M (2017) Dynamic Attack Detection and Mitigation in IoT using SDN. 27th International Telecommunication Networks and Applications Conference (ITNAC).","DOI":"10.1109\/ATNAC.2017.8215418"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01894-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01894-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01894-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T10:03:12Z","timestamp":1747476192000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01894-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,28]]},"references-count":58,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["1894"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01894-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,28]]},"assertion":[{"value":"5 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"Not Applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare no conflict of interest","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"81"}}