{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T12:11:30Z","timestamp":1777378290259,"version":"3.51.4"},"reference-count":58,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T00:00:00Z","timestamp":1774396800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Array"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.array.2026.100789","type":"journal-article","created":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T01:17:54Z","timestamp":1774487874000},"page":"100789","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Strengthening network security with advanced defense strategies for robust protection against DoS attacks in complex environments"],"prefix":"10.1016","volume":"30","author":[{"given":"M.","family":"Premkumar","sequence":"first","affiliation":[]},{"given":"S.R.","family":"Ashokkumar","sequence":"additional","affiliation":[]},{"given":"Dhamodharan","family":"Srinivasan","sequence":"additional","affiliation":[]},{"given":"S.","family":"Anupallavi","sequence":"additional","affiliation":[]},{"given":"A.","family":"Rajendran","sequence":"additional","affiliation":[]},{"given":"Ajmeera","family":"Kiran","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.array.2026.100789_bib1","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.114582","article-title":"Conditional Wasserstein GAN-based oversampling of tabular data for imbalanced learning","volume":"174","author":"Engelmann","year":"2021","journal-title":"Expert Syst Appl"},{"issue":"7","key":"10.1016\/j.array.2026.100789_bib2","doi-asserted-by":"crossref","DOI":"10.1007\/s10994-022-06296-4","article-title":"A theoretical distribution analysis of synthetic minority oversampling technique (SMOTE) for imbalanced learning","volume":"113","author":"Elreedy","year":"2024","journal-title":"Mach Learn"},{"key":"10.1016\/j.array.2026.100789_bib3","article-title":"Seismic data interpolation based on spectrally normalized generative adversarial network","volume":"61","author":"Zhao","year":"2023","journal-title":"IEEE Trans Geosci Rem Sens"},{"key":"10.1016\/j.array.2026.100789_bib4","series-title":"A survey of security in software defined networks","author":"Scott-Hayward","year":"2016"},{"issue":"1\u20132","key":"10.1016\/j.array.2026.100789_bib5","article-title":"Anomaly-based network intrusion detection: techniques, systems and challenges","volume":"28","author":"Garc\u00eda-Teodoro","year":"2009","journal-title":"Comput Secur"},{"key":"10.1016\/j.array.2026.100789_bib6","series-title":"A taxonomy of DDoS attack and DDoS defense mechanisms","author":"Mirkovic","year":"2004"},{"key":"10.1016\/j.array.2026.100789_bib7","series-title":"Proceedings of the ACM SIGCOMM internet measurement conference","article-title":"A multifaceted approach to understanding the botnet phenomenon","author":"Abu Rajab","year":"2006"},{"key":"10.1016\/j.array.2026.100789_bib8","series-title":"Communications in computer and information science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-16210-7_39","article-title":"Distributed architecture of an intrusion detection system in industrial control systems","author":"Abid","year":"2022"},{"issue":"6","key":"10.1016\/j.array.2026.100789_bib9","doi-asserted-by":"crossref","DOI":"10.1016\/0950-7051(96)81920-4","article-title":"Survey and critique of techniques for extracting rules from trained artificial neural networks","volume":"8","author":"Andrews","year":"1995","journal-title":"Knowl Base Syst"},{"issue":"1","key":"10.1016\/j.array.2026.100789_bib10","article-title":"Simultaneous botnet attack detection using long short term memory-based autoencoder and XGBoost classifier","volume":"14","author":"Belkacem","year":"2024","journal-title":"Int J Saf Secur Eng"},{"key":"10.1016\/j.array.2026.100789_bib11","series-title":"ICISSP 2018 - proceedings of the 4th international conference on information systems security and privacy","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","author":"Sharafaldin","year":"2018"},{"issue":"4","key":"10.1016\/j.array.2026.100789_bib12","doi-asserted-by":"crossref","DOI":"10.1109\/COMST.2020.3011208","article-title":"A systematic survey of industrial internet of things security: requirements and fog computing opportunities","volume":"22","author":"Tange","year":"2020","journal-title":"IEEE Commun Surv Tutor"},{"issue":"16","key":"10.1016\/j.array.2026.100789_bib13","doi-asserted-by":"crossref","DOI":"10.1007\/s11042-023-17576-z","article-title":"Intrusion detection in cyber-physical system using rsa blockchain technology","volume":"83","author":"Aljabri","year":"2024","journal-title":"Multimed Tool Appl"},{"issue":"11","key":"10.1016\/j.array.2026.100789_bib14","doi-asserted-by":"crossref","DOI":"10.1016\/j.asej.2023.102547","article-title":"Integrating IoT and honey badger algorithm based ensemble learning for accurate vehicle detection and classification","volume":"14","author":"Aljebreen","year":"2023","journal-title":"Ain Shams Eng J"},{"key":"10.1016\/j.array.2026.100789_bib15","series-title":"Anomaly-based intrusion detection systems in iot using deep learning: a systematic literature review","author":"Alsoufi","year":"2021"},{"issue":"6","key":"10.1016\/j.array.2026.100789_bib16","article-title":"DroidEnemy: battling adversarial example attacks for android malware detection","volume":"8","author":"Bala","year":"2022","journal-title":"Digit Commun Networks"},{"key":"10.1016\/j.array.2026.100789_bib17","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2022.3211513","article-title":"Toward the protection of IoT networks: introducing the LATAM-DDoS-IoT dataset","volume":"10","author":"Almaraz-Rivera","year":"2022","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.array.2026.100789_bib18","doi-asserted-by":"crossref","DOI":"10.1109\/TR.2021.3118026","article-title":"A comparative study of class rebalancing methods for security bug report classification","volume":"70","author":"Zheng","year":"2021","journal-title":"IEEE Trans Reliab"},{"key":"10.1016\/j.array.2026.100789_bib19","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2022.111245","article-title":"Interpretability application of the just-in-time software defect prediction model","volume":"188","author":"Zheng","year":"2022","journal-title":"J Syst Software"},{"issue":"10","key":"10.1016\/j.array.2026.100789_bib20","doi-asserted-by":"crossref","DOI":"10.1109\/TCOMM.2021.3094581","article-title":"DeepBAN: a temporal convolution-based communication framework for dynamic WBANs","volume":"69","author":"Liu","year":"2021","journal-title":"IEEE Trans Commun"},{"issue":"2","key":"10.1016\/j.array.2026.100789_bib21","article-title":"Grey wolf optimization parameter control for feature selection in anomaly detection","volume":"14","author":"Almazini","year":"2021","journal-title":"Int J Intell Eng Syst"},{"key":"10.1016\/j.array.2026.100789_bib22","article-title":"Artificial intelligence in the digital twins: state of the art, challenges, and future research topics","volume":"1","author":"Lv","year":"2021","journal-title":"Digit Twin"},{"issue":"2","key":"10.1016\/j.array.2026.100789_bib23","article-title":"Combining graph neural networks with expert knowledge for smart contract vulnerability detection","volume":"35","author":"Liu","year":"2023","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"10.1016\/j.array.2026.100789_bib24","doi-asserted-by":"crossref","DOI":"10.1016\/j.future.2021.04.012","article-title":"Efficient cooperative cache management for latency-aware data intelligent processing in edge environment","volume":"123","author":"Li","year":"2021","journal-title":"Future Gener Comput Syst"},{"key":"10.1016\/j.array.2026.100789_bib25","series-title":"Advances in intelligent systems and computing","article-title":"Real-time detection of fake account in Twitter using machine-learning approach","author":"Sahoo","year":"2021"},{"issue":"8","key":"10.1016\/j.array.2026.100789_bib26","doi-asserted-by":"crossref","DOI":"10.1109\/JIOT.2021.3065583","article-title":"Edge-cloud resource scheduling in space-air-ground-integrated networks for internet of vehicles","volume":"9","author":"Cao","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.array.2026.100789_bib27","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2022.3152804","article-title":"Gaussian regression models for evaluation of network lifetime and cluster-head selection in wireless sensor devices","volume":"10","author":"George","year":"2022","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.array.2026.100789_bib28","article-title":"Modified echo state network enabled dynamic duty cycle for optimal opportunistic routing in EH-WSNs","volume":"9","author":"Rathore","year":"2020","journal-title":"Electron"},{"key":"10.1016\/j.array.2026.100789_bib29","doi-asserted-by":"crossref","DOI":"10.1155\/2022\/9169568","article-title":"Analysis of network slicing for management of 5G networks using machine learning techniques","volume":"2022","author":"Singh","year":"2022","journal-title":"Wireless Commun Mobile Comput"},{"issue":"11","key":"10.1016\/j.array.2026.100789_bib30","doi-asserted-by":"crossref","DOI":"10.1109\/TFUZZ.2020.3018191","article-title":"Multisource heterogeneous unsupervised domain adaptation via fuzzy relation neural networks","volume":"29","author":"Liu","year":"2021","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"2","key":"10.1016\/j.array.2026.100789_bib31","doi-asserted-by":"crossref","DOI":"10.1504\/IJOR.2021.115630","article-title":"A review and classification of heuristic algorithms for the inventory routing problem","volume":"41","author":"Sofianopoulou","year":"2021","journal-title":"Int J Oper Res"},{"issue":"3","key":"10.1016\/j.array.2026.100789_bib32","article-title":"Reinforcement learning with an ensemble of binary action deep Q-Networks","volume":"46","author":"Hafiz","year":"2023","journal-title":"Comput Syst Sci Eng"},{"issue":"1","key":"10.1016\/j.array.2026.100789_bib33","doi-asserted-by":"crossref","DOI":"10.1080\/03772063.2023.2200373","article-title":"Theil-sen regressive Miyaguchi\u2013preneel-based cryptographic hash blockchain for secure data transmission using remote sensing data in IoT","volume":"70","author":"Sharmila","year":"2024","journal-title":"IETE J Res"},{"key":"10.1016\/j.array.2026.100789_bib34","article-title":"Optimal sizing of smart hybrid renewable energy system using different optimization algorithms","volume":"8","author":"Mahmoud","year":"2022","journal-title":"Energy Rep"},{"key":"10.1016\/j.array.2026.100789_bib35","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2021.05.009","article-title":"A privacy-preserving aggregation scheme based on negative survey for vehicle fuel consumption data","volume":"570","author":"Yang","year":"2021","journal-title":"Inf Sci (Ny)"},{"issue":"3","key":"10.1016\/j.array.2026.100789_bib36","doi-asserted-by":"crossref","DOI":"10.3390\/s22031184","article-title":"Multi-label active learning-based machine learning model for heart disease prediction","volume":"22","author":"El-Hasnony","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.array.2026.100789_bib37","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2022.3175829","article-title":"A secure and privacy preserved parking recommender system using elliptic curve cryptography and local differential privacy","volume":"10","author":"Khaliq","year":"2022","journal-title":"IEEE Access"},{"issue":"7","key":"10.1016\/j.array.2026.100789_bib38","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.2021.3063727","article-title":"Data quality matters: a case study on data label correctness for security bug report prediction","volume":"48","author":"Wu","year":"2022","journal-title":"IEEE Trans Software Eng"},{"issue":"4","key":"10.1016\/j.array.2026.100789_bib39","doi-asserted-by":"crossref","DOI":"10.1007\/s11277-023-10252-3","article-title":"Scalable and energy efficient cluster based anomaly detection against denial of service attacks in wireless sensor networks","volume":"129","author":"Premkumar","year":"2023","journal-title":"Wirel Pers Commun"},{"key":"10.1016\/j.array.2026.100789_bib40","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2021.3109490","article-title":"Detection and classification of DDoS flooding attacks on software-defined networks: a case study for the application of machine learning","volume":"9","author":"Sangodoyin","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.array.2026.100789_bib41","doi-asserted-by":"crossref","DOI":"10.1016\/j.buildenv.2019.04.002","article-title":"Building facade multi-objective optimization for daylight and aesthetical perception","volume":"156","author":"Yi","year":"2019","journal-title":"Build Environ"},{"key":"10.1016\/j.array.2026.100789_bib42","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2021.108153","article-title":"Knowledge base graph embedding module design for visual question answering model","volume":"120","author":"Zheng","year":"2021","journal-title":"Pattern Recogn"},{"issue":"3","key":"10.1016\/j.array.2026.100789_bib43","doi-asserted-by":"crossref","DOI":"10.1049\/cje.2021.00.295","article-title":"220 GHz multi circuit integrated front end based on solid-state circuits for high speed communication system","volume":"31","author":"Niu","year":"2022","journal-title":"Chin J Electron"},{"issue":"3","key":"10.1016\/j.array.2026.100789_bib44","article-title":"Dynamic defense mechanism for DoS attacks in wireless environments using hybrid intrusion detection system and statistical approaches","volume":"29","author":"Premkumar","year":"2022","journal-title":"Teh Vjesn"},{"issue":"10","key":"10.1016\/j.array.2026.100789_bib45","doi-asserted-by":"crossref","DOI":"10.1080\/01431161.2021.1880662","article-title":"Design of supercontinuum laser hyperspectral light detection and ranging (LiDAR) (SCLaHS LiDAR)","volume":"42","author":"Zhou","year":"2021","journal-title":"Int J Rem Sens"},{"issue":"4","key":"10.1016\/j.array.2026.100789_bib46","doi-asserted-by":"crossref","DOI":"10.1007\/s11277-021-08545-6","article-title":"Defense countermeasures for DoS attacks in WSNs using deep radial basis networks","volume":"120","author":"Premkumar","year":"2021","journal-title":"Wirel Pers Commun"},{"key":"10.1016\/j.array.2026.100789_bib47","doi-asserted-by":"crossref","DOI":"10.1155\/2022\/8481452","article-title":"ML-DDoSnet: IoT intrusion detection based on denial-of-service attacks using machine learning methods and NSL-KDD","volume":"2022","author":"Esmaeili","year":"2022","journal-title":"Wireless Commun Mobile Comput"},{"key":"10.1016\/j.array.2026.100789_bib48","series-title":"When text mining meets science mapping in the bibliometric analysis: a review and future opportunities","author":"Chen","year":"2023"},{"issue":"10","key":"10.1016\/j.array.2026.100789_bib49","doi-asserted-by":"crossref","DOI":"10.1016\/j.jksuci.2021.12.001","article-title":"High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem","volume":"34","author":"Jayabalasamy","year":"2022","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"6","key":"10.1016\/j.array.2026.100789_bib50","doi-asserted-by":"crossref","DOI":"10.1007\/s11276-022-03214-3","article-title":"Network intrusion detection system for DDoS attacks in ICS using deep autoencoders","volume":"30","author":"Ortega-Fernandez","year":"2024","journal-title":"Wirel Netw"},{"key":"10.1016\/j.array.2026.100789_bib51","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2022.108768","article-title":"A two-stage intrusion detection system with auto-encoder and LSTMs","volume":"121","author":"Mushtaq","year":"2022","journal-title":"Appl Soft Comput"},{"issue":"9","key":"10.1016\/j.array.2026.100789_bib52","doi-asserted-by":"crossref","DOI":"10.3390\/app13095525","article-title":"Anomaly detection for automated vehicles integrating continuous wavelet transform and convolutional neural network","volume":"13","author":"Wang","year":"2023","journal-title":"Appl Sci"},{"issue":"6","key":"10.1016\/j.array.2026.100789_bib53","article-title":"CNN-based network intrusion detection against denial-of-service attacks","volume":"9","author":"Kim","year":"2020","journal-title":"Electron"},{"key":"10.1016\/j.array.2026.100789_bib54","series-title":"NSL-KDD datasets","author":"Tavallaee","year":"2024"},{"key":"10.1016\/j.array.2026.100789_bib55","article-title":"CICIDS2017","author":"Panigrahi","year":"2025","journal-title":"IEEE Dataport"},{"key":"10.1016\/j.array.2026.100789_bib56","volume":"TIB","author":"Nato","year":"2024"},{"key":"10.1016\/j.array.2026.100789_bib57","article-title":"Hybrid decision fusion based multimodal ensemble framework for cervical cancer detection","author":"Mukku","year":"2023","journal-title":"Int J Sci Res Comput Sci Eng Inf Technol"},{"key":"10.1016\/j.array.2026.100789_bib58","series-title":"Discovery science","first-page":"347","article-title":"Learning fast to detect slow: a few-shot neural approach to slow DoS attack detection","author":"Scala Francescoand Guarascio","year":"2025"}],"container-title":["Array"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2590005626001128?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2590005626001128?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T09:10:38Z","timestamp":1777367438000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2590005626001128"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":58,"alternative-id":["S2590005626001128"],"URL":"https:\/\/doi.org\/10.1016\/j.array.2026.100789","relation":{},"ISSN":["2590-0056"],"issn-type":[{"value":"2590-0056","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Strengthening network security with advanced defense strategies for robust protection against DoS attacks in complex environments","name":"articletitle","label":"Article Title"},{"value":"Array","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.array.2026.100789","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier Inc.","name":"copyright","label":"Copyright"}],"article-number":"100789"}}