{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T13:34:04Z","timestamp":1770471244925,"version":"3.49.0"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04110-1","type":"journal-article","created":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T20:33:30Z","timestamp":1751315610000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Deep Learning GRU-BiLSTM for DDoS Attack Detection"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-4059-7417","authenticated-orcid":false,"given":"Amal M.","family":"Al-Eryani","sequence":"first","affiliation":[]},{"given":"Fatma A.","family":"Omara","sequence":"additional","affiliation":[]},{"given":"Eman","family":"Hossny","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,30]]},"reference":[{"key":"4110_CR1","doi-asserted-by":"publisher","unstructured":"Miettinen M, Sadeghi A-R.: Keynote: internet of things or threats? On Building trust in IoT. In: 2018 international conference on hardware\/software codesign and system synthesis (CODES+ISSS). 2018. pp. 1\u20139. IEEE. https:\/\/doi.org\/10.1109\/CODESISSS.2018.8525931.","DOI":"10.1109\/CODESISSS.2018.8525931"},{"key":"4110_CR2","doi-asserted-by":"crossref","unstructured":"Criscuolo PJ. Distributed denial of service: Trin00, tribe flood network, tribe flood network 2000, and stacheldraht ciac-2319. Department of Energy Computer Incident Advisory Capability (CIAC), UCRL-ID-136939, Rev. 1, 2000.","DOI":"10.2172\/792253"},{"key":"4110_CR3","doi-asserted-by":"publisher","unstructured":"Lau F, Rubin SH, Smith MH, Trajkovic L. Distributed denial of service attacks. In: Smc 2000 conference proceedings. 2000 IEEE international conference on systems, man and cybernetics. \u201ccybernetics evolving to systems, humans, organizations, and their complex interactions\u201d (cat. no.0. 2000. pp. 2275\u20132280 vol.3. https:\/\/doi.org\/10.1109\/ICSMC.2000.886455.","DOI":"10.1109\/ICSMC.2000.886455"},{"key":"4110_CR4","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.comcom.2012.09.010","volume":"36","author":"PAR Kumar","year":"2013","unstructured":"Kumar PAR, Selvakumar S. Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. Comput Commun. 2013;36:303\u201319.","journal-title":"Comput Commun"},{"key":"4110_CR5","doi-asserted-by":"publisher","unstructured":"Hyder HK, Lung C-H. Closed-loop DDoS mitigation system in software defined networks. In: 2018 IEEE conference on dependable and secure computing (DSC). 2018. pp. 1\u20136. IEEE. https:\/\/doi.org\/10.1109\/DESEC.2018.8625125.","DOI":"10.1109\/DESEC.2018.8625125"},{"key":"4110_CR6","unstructured":"Kiteworks: DDoS Attacks, https:\/\/www.kiteworks.com\/risk-compliance-glossary\/ddos-attacks\/, last accessed 23 Dec 2022"},{"key":"4110_CR7","doi-asserted-by":"publisher","first-page":"103096","DOI":"10.1016\/j.cose.2023.103096","volume":"127","author":"P Kumari","year":"2023","unstructured":"Kumari P, Jain AK. A comprehensive study of DDoS attacks over IoT network and their countermeasures. Comput Secur. 2023;127:103096. https:\/\/doi.org\/10.1016\/j.cose.2023.103096.","journal-title":"Comput Secur"},{"key":"4110_CR8","doi-asserted-by":"publisher","unstructured":"Sommer R, Paxson V. Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE symposium on security and privacy. 2010. pp. 305\u2013316. https:\/\/doi.org\/10.1109\/SP.2010.25.","DOI":"10.1109\/SP.2010.25"},{"key":"4110_CR9","unstructured":"AI False Positives: How Machine Learning Can Improve Fraud Detection, https:\/\/softjourn.com\/insights\/how-machine-learning-can-reduce-false-positives-increase-fraud-detection. Accessed 12 Mar 2024"},{"key":"4110_CR10","doi-asserted-by":"publisher","first-page":"876","DOI":"10.1109\/TNSM.2020.2971776","volume":"17","author":"R Doriguzzi-Corin","year":"2020","unstructured":"Doriguzzi-Corin R, Millar S, Scott-Hayward S, Mart\u00ednez-del-Rinc\u00f3n J, Siracusa D. Lucid: a practical, lightweight deep learning solution for DDoS attack detection. IEEE Trans Netw Serv Manage. 2020;17:876\u201389. https:\/\/doi.org\/10.1109\/TNSM.2020.2971776.","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"4110_CR11","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton G. Deep learning. Nature. 2015;521:436\u201344. https:\/\/doi.org\/10.1038\/nature14539.","journal-title":"Nature"},{"key":"4110_CR12","doi-asserted-by":"publisher","unstructured":"McDermott CD, Majdani F, Petrovski AV. Botnet detection in the internet of things using deep learning approaches. In: Proceedings of the international joint conference on neural networks. 2018. pp. 1\u20138. https:\/\/doi.org\/10.1109\/IJCNN.2018.8489489.","DOI":"10.1109\/IJCNN.2018.8489489"},{"key":"4110_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102942","volume":"177","author":"MVO Assis","year":"2021","unstructured":"Assis MVO, Carvalho LF, Lloret J, Proen\u00e7a ML. A GRU deep learning system against attacks in software defined networks. J Netw Comput Appl. 2021;177: 102942. https:\/\/doi.org\/10.1016\/j.jnca.2020.102942.","journal-title":"J Netw Comput Appl"},{"key":"4110_CR14","unstructured":"Meenakshi, Kumar K, Behal S. Distributed denial of service attack detection using deep learning approaches. In: 2021 8th international conference on computing for sustainable global development (INDIACom). 2021. pp. 491\u2013495."},{"key":"4110_CR15","unstructured":"Kim Y. Chapter 10, sequence modeling: recurrent and recursive nets. dated Apr. 1, 50. 2016"},{"key":"4110_CR16","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/B978-0-12-816176-0.00026-0","volume-title":"Handbook of medical image computing and computer assisted intervention","author":"R DiPietro","year":"2019","unstructured":"DiPietro R, Hager GD. Deep learning: RNNs and LSTM. In: Zhou SK, Rueckert D, Fichtinger G, editors. Handbook of medical image computing and computer assisted intervention. Cambridge: Academic Press; 2019. p. 503\u201319. https:\/\/doi.org\/10.1016\/B978-0-12-816176-0.00026-0."},{"key":"4110_CR17","doi-asserted-by":"publisher","first-page":"48697","DOI":"10.1109\/ACCESS.2018.2867564","volume":"6","author":"C Xu","year":"2018","unstructured":"Xu C, Shen J, Du X, Zhang F. An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access. 2018;6:48697\u2013707. https:\/\/doi.org\/10.1109\/ACCESS.2018.2867564.","journal-title":"IEEE Access"},{"key":"4110_CR18","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/72.279181","volume":"5","author":"Y Bengio","year":"1994","unstructured":"Bengio Y, Simard P, Frasconi P. Learning long-term dependencies with gradient descent is difficult. IEEE Trans Neural Netw. 1994;5:157\u201366. https:\/\/doi.org\/10.1109\/72.279181.","journal-title":"IEEE Trans Neural Netw"},{"key":"4110_CR19","unstructured":"Salehinejad H, Sankar S, Barfett J, Colak E, Valaee S. Recent advances in recurrent neural networks. 2017 arXiv preprint arXiv:1801.01078. Accessed 24 Apr 2024"},{"key":"4110_CR20","doi-asserted-by":"publisher","first-page":"53972","DOI":"10.1109\/ACCESS.2020.2976908","volume":"8","author":"S Haider","year":"2020","unstructured":"Haider S, Akhunzada A, Mustafa I, Patel TB, Fernandez A, Choo K-KR, Iqbal J. A deep CNN ensemble framework for efficient DDoS attack detection in software defined networks. IEEE Access. 2020;8:53972\u201383. https:\/\/doi.org\/10.1109\/ACCESS.2020.2976908.","journal-title":"IEEE Access"},{"key":"4110_CR21","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA. Others: toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp. 2018;1:108\u201316.","journal-title":"ICISSp"},{"key":"4110_CR22","doi-asserted-by":"publisher","unstructured":"Elsayed MS, Le-Khac N-A, Dev S, Jurcut AD. DDoSNet: a deep-learning model for detecting network attacks. In: 2020 IEEE 21st international symposium on \u201cA world of wireless, mobile and multimedia networks\u201d (WoWMoM). 2020. pp. 391\u2013396. https:\/\/doi.org\/10.1109\/WoWMoM49955.2020.00072.","DOI":"10.1109\/WoWMoM49955.2020.00072"},{"key":"4110_CR23","doi-asserted-by":"publisher","first-page":"134695","DOI":"10.1109\/ACCESS.2020.3009849","volume":"8","author":"J Malik","year":"2020","unstructured":"Malik J, Akhunzada A, Bibi I, Imran M, Musaddiq A, Kim SW. Hybrid deep learning: an efficient reconnaissance and surveillance detection mechanism in SDN. IEEE Access. 2020;8:134695\u2013706. https:\/\/doi.org\/10.1109\/ACCESS.2020.3009849.","journal-title":"IEEE Access"},{"key":"4110_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/J.ESWA.2020.114520","volume":"169","author":"AE Cil","year":"2021","unstructured":"Cil AE, Yildiz K, Buldu A. Detection of DDoS attacks with feed forward based deep neural network model. Expert Syst Appl. 2021;169: 114520. https:\/\/doi.org\/10.1016\/J.ESWA.2020.114520.","journal-title":"Expert Syst Appl"},{"key":"4110_CR25","doi-asserted-by":"publisher","first-page":"11634","DOI":"10.3390\/app112411634","volume":"11","author":"D Alghazzawi","year":"2021","unstructured":"Alghazzawi D, Bamasag O, Ullah H, Asghar MZ. Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection. Appl Sci. 2021;11:11634.","journal-title":"Appl Sci"},{"key":"4110_CR26","doi-asserted-by":"publisher","first-page":"108495","DOI":"10.1109\/ACCESS.2021.3101650","volume":"9","author":"NM Yungaicela-Naula","year":"2021","unstructured":"Yungaicela-Naula NM, Vargas-Rosales C, Perez-Diaz JA. SDN-based architecture for transport and application layer DDoS attack detection by using machine and deep learning. IEEE Access. 2021;9:108495\u2013512. https:\/\/doi.org\/10.1109\/ACCESS.2021.3101650.","journal-title":"IEEE Access"},{"key":"4110_CR27","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s42979-021-00467-1","volume":"2","author":"A Makuvaza","year":"2021","unstructured":"Makuvaza A, Jat DS, Gamundani AM. Deep neural network (DNN) solution for real-time detection of distributed denial of service (DDoS) attacks in software defined networks (SDNs). SN Comput Sci. 2021;2:107. https:\/\/doi.org\/10.1007\/s42979-021-00467-1.","journal-title":"SN Comput Sci"},{"key":"4110_CR28","doi-asserted-by":"publisher","first-page":"8106","DOI":"10.1007\/s11227-021-04253-x","volume":"78","author":"M Najafimehr","year":"2022","unstructured":"Najafimehr M, Zarifzadeh S, Mostafavi S. A hybrid machine learning approach for detecting unprecedented DDoS attacks. J Supercomput. 2022;78:8106\u201336. https:\/\/doi.org\/10.1007\/s11227-021-04253-x.","journal-title":"J Supercomput"},{"key":"4110_CR29","doi-asserted-by":"publisher","first-page":"923","DOI":"10.32604\/iasc.2022.024668","volume":"32","author":"F Alanazi","year":"2022","unstructured":"Alanazi F, Jambi K, Eassa F, Khemakhem M, Basuhail A, Alsubhi K. Ensemble deep learning models for mitigating DDoS attack in software-defined network. Intell Autom Soft Comput. 2022;32:923\u201338. https:\/\/doi.org\/10.32604\/iasc.2022.024668.","journal-title":"Intell Autom Soft Comput"},{"key":"4110_CR30","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4443","author":"W Sun","year":"2022","unstructured":"Sun W, Guan S, Wang P, Wu Q. A hybrid deep learning model based low-rate DoS attack detection method for software defined network. Trans Emerg Telecommun Technol. 2022. https:\/\/doi.org\/10.1002\/ett.4443.","journal-title":"Trans Emerg Telecommun Technol"},{"key":"4110_CR31","unstructured":"Gupta A. Distributed denial of service attack detection using a machine learning approach. Unpublished master\u2019s thesis. 2018."},{"key":"4110_CR32","doi-asserted-by":"publisher","unstructured":"Elgendy S, Attawiya M, Haridy O, Farag A, Branco P. DTEXNet: artificial intelligence-based combination scheme for DDoS attacks detection. Proceedings of the Canadian Conference on Artificial Intelligence. 2022. https:\/\/doi.org\/10.21428\/594757db.76ee7dbd.","DOI":"10.21428\/594757db.76ee7dbd"},{"key":"4110_CR33","doi-asserted-by":"publisher","first-page":"2420","DOI":"10.1016\/J.PROCS.2023.01.217","volume":"218","author":"D Kumar","year":"2023","unstructured":"Kumar D, Pateriya RK, Gupta RK, Dehalwar V, Sharma A. DDoS detection using deep learning. Procedia Comput Sci. 2023;218:2420\u20139. https:\/\/doi.org\/10.1016\/J.PROCS.2023.01.217.","journal-title":"Procedia Comput Sci"},{"key":"4110_CR34","doi-asserted-by":"publisher","unstructured":"Muneeswaran S, Sachidananda V, Patil R, Peng H, Liu M, Gurusamy M. Hiatus: unsupervised generative approach for\u00a0detection of\u00a0DoS and\u00a0DDoS attacks. In: Li F, Liang K, Lin Z, Katsikas SK (eds.) Lecture notes of the institute for computer sciences, social-informatics and telecommunications engineering, LNICST. 2023. pp. 529\u2013546. Springer Nature Switzerland, Cham. https:\/\/doi.org\/10.1007\/978-3-031-25538-0_28.","DOI":"10.1007\/978-3-031-25538-0_28"},{"key":"4110_CR35","doi-asserted-by":"publisher","first-page":"3828","DOI":"10.3390\/app13063828","volume":"13","author":"H Elubeyd","year":"2023","unstructured":"Elubeyd H, Yiltas-Kaplan D. Hybrid deep learning approach for automatic DoS\/DDoS attacks detection in software-defined networks. Appl Sci. 2023;13:3828. https:\/\/doi.org\/10.3390\/app13063828.","journal-title":"Appl Sci"},{"key":"4110_CR36","doi-asserted-by":"publisher","first-page":"8491","DOI":"10.1109\/JIOT.2022.3196942","volume":"10","author":"A Zainudin","year":"2023","unstructured":"Zainudin A, Ahakonye LAC, Akter R, Kim D-S, Lee J-M. An efficient hybrid-DNN for DDoS detection and classification in software-defined IIoT networks. IEEE Internet Things J. 2023;10:8491\u2013504. https:\/\/doi.org\/10.1109\/JIOT.2022.3196942.","journal-title":"IEEE Internet Things J"},{"key":"4110_CR37","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.patcog.2017.10.013","volume":"77","author":"J Gu","year":"2018","unstructured":"Gu J, Wang Z, Kuen J, Ma L, Shahroudy A, Shuai B, Liu T, Wang X, Wang G, Cai J, Chen T. Recent advances in convolutional neural networks. Pattern Recognit. 2018;77:354\u201377. https:\/\/doi.org\/10.1016\/j.patcog.2017.10.013.","journal-title":"Pattern Recognit"},{"key":"4110_CR38","doi-asserted-by":"publisher","unstructured":"Kim J, Kim J, Thu HL, Kim H. Long short term memory recurrent neural network classifier for intrusion detection. In: 2016 International conference on platform technology and service (PlatCon). 2013. pp. 1\u20135. https:\/\/doi.org\/10.1109\/PlatCon.2016.7456805.","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"4110_CR39","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin C, Zhu Y, Fei J, He X. A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access. 2017;5:21954\u201361. https:\/\/doi.org\/10.1109\/ACCESS.2017.2762418.","journal-title":"IEEE Access"},{"key":"4110_CR40","doi-asserted-by":"crossref","unstructured":"Subrmanian M, Shanmugavadivel K, Nandhini PS, Sowmya R. Evaluating the performance of LSTM and GRU in detection of distributed denial of service attacks using CICDDoS2019 dataset. In: Kim JH, Deep K, Geem ZW, Sadollah A, Yadav A (eds.) Proceedings of 7th international conference on harmony search, soft computing and applications. 2022. pp. 395\u2013406. Springer Nature Singapore, Singapore.","DOI":"10.1007\/978-981-19-2948-9_38"},{"key":"4110_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2023\/9965945","volume":"2023","author":"TG Gebremeskel","year":"2023","unstructured":"Gebremeskel TG, Gemeda KA, Krishna TG, Ramulu PJ. DDoS attack detection and classification using hybrid model for multicontroller SDN. Wirel Commun Mob Comput. 2023;2023:1\u201318. https:\/\/doi.org\/10.1155\/2023\/9965945.","journal-title":"Wirel Commun Mob Comput"},{"key":"4110_CR42","first-page":"20220155","volume":"32","author":"FM Aswad","year":"2023","unstructured":"Aswad FM, Ahmed AMS, Alhammadi NAM, Khalaf BA, Mostafa SA. Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks. J Intell Syst. 2023;32:20220155.","journal-title":"J Intell Syst"},{"key":"4110_CR43","doi-asserted-by":"crossref","unstructured":"Edo G, Ahmad T, Putra MAR. Hybrid GAN-LSTM for enhancing DDoS detection on imbalance dataset. International Journal of Safety Security Engineering. 2025;15(1):189","DOI":"10.18280\/ijsse.150120"},{"key":"4110_CR44","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0312425","volume":"20","author":"S Mehmood","year":"2025","unstructured":"Mehmood S, Amin R, Mustafa J, Hussain M, Alsubaei FS, Zakaria MD. Distributed denial of services (DDoS) attack detection in SDN using Optimizer-equipped CNN-MLP. PLoS ONE. 2025;20: e0312425.","journal-title":"PLoS ONE"},{"key":"4110_CR45","doi-asserted-by":"crossref","unstructured":"Dandotiya M, Makwana RRS. Improving network security with hybrid model for DDoS attack detection. In: 2024 IEEE international conference on blockchain and distributed systems security (ICBDS). 2024. pp. 1\u20138.","DOI":"10.1109\/ICBDS61829.2024.10837036"},{"key":"4110_CR46","doi-asserted-by":"crossref","unstructured":"Graves A, Graves A. Long short-term memory. Supervised sequence labelling with recurrent neural networks. 2012;37\u201345.","DOI":"10.1007\/978-3-642-24797-2_4"},{"key":"4110_CR47","doi-asserted-by":"publisher","unstructured":"Liang X, Znati T. A long short-term memory enabled framework for DDoS detection. In: Proceedings - IEEE global communications conference, GLOBECOM. 2019. pp. 1\u20136. https:\/\/doi.org\/10.1109\/GLOBECOM38437.2019.9013450.","DOI":"10.1109\/GLOBECOM38437.2019.9013450"},{"key":"4110_CR48","unstructured":"Chung J, Gulcehre C, Cho K, Bengio Y. Empirical evaluation of gated recurrent neural networks on sequence modeling. 2014."},{"key":"4110_CR49","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1016\/j.neunet.2005.06.042","volume":"18","author":"A Graves","year":"2005","unstructured":"Graves A, Schmidhuber J. Framewise phoneme classification with bidirectional LSTM and other neural network architectures. Neural Netw. 2005;18:602\u201310. https:\/\/doi.org\/10.1016\/j.neunet.2005.06.042.","journal-title":"Neural Netw"},{"key":"4110_CR50","doi-asserted-by":"crossref","unstructured":"Galphade M, Nikam VB, Banerjee B, Kiwelekar AW. Comparative analysis of wind power forecasting using LSTM, BiLSTM, and GRU. In: International Conference on Frontiers of Intelligent Computing: Theory and Applications. 2022. pp. 483\u2013493.","DOI":"10.1007\/978-981-19-7513-4_42"},{"key":"4110_CR51","doi-asserted-by":"publisher","unstructured":"Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA. Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: Proceedings - international carnahan conference on security technology. 2019. pp. 1\u20138. https:\/\/doi.org\/10.1109\/CCST.2019.8888419","DOI":"10.1109\/CCST.2019.8888419"},{"key":"4110_CR52","unstructured":"Brownlee J. Undersampling algorithms for imbalanced classification, https:\/\/machinelearningmastery.com\/undersampling-algorithms-for-imbalanced-classification\/ (2024). Last Accessed 02 Feb 2024."},{"key":"4110_CR53","doi-asserted-by":"crossref","unstructured":"Al-Eryani AM, Hossny E, Omara FA. Efficient machine learning algorithms for DDoS attack detection. In: 2024 6th international conference on computing and informatics (ICCI). 2024. pp. 174\u2013181.","DOI":"10.1109\/ICCI61671.2024.10485168"},{"key":"4110_CR54","doi-asserted-by":"publisher","unstructured":"Saha S, Priyoti AT, Sharma A, Haque A. Towards an optimal feature selection method for AI-Based DDoS detection system. In: Proceedings - IEEE consumer communications and networking conference, CCNC. 2022. pp. 425\u2013428 https:\/\/doi.org\/10.1109\/CCNC49033.2022.9700569.","DOI":"10.1109\/CCNC49033.2022.9700569."},{"key":"4110_CR55","doi-asserted-by":"publisher","unstructured":"Das S, Venugopal D, Shiva S, Sheldon FT. Empirical evaluation of the ensemble framework for feature selection in DDoS Attack. In: Proceedings - 2020 7th IEEE international conference on cyber security and cloud computing and 2020 6th IEEE international conference on edge computing and scalable cloud, CSCloud-EdgeCom 2020. Pp. 56\u201361. https:\/\/doi.org\/10.1109\/CSCloud-EdgeCom49738.2020.00019.","DOI":"10.1109\/CSCloud-EdgeCom49738.2020.00019."},{"key":"4110_CR56","unstructured":"Kingma DP, Ba J. Adam: a method for stochastic optimization. 2014 arXiv preprint arXiv:1412.6980. Accessed 12 May 2024"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04110-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04110-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04110-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T20:33:43Z","timestamp":1751315623000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04110-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":56,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["4110"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04110-1","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,30]]},"assertion":[{"value":"17 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving Human and\/or Animals"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}],"article-number":"605"}}