{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T22:21:56Z","timestamp":1772835716602,"version":"3.50.1"},"reference-count":53,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1016\/j.comnet.2025.111436","type":"journal-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T02:47:16Z","timestamp":1749178036000},"page":"111436","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":5,"special_numbering":"C","title":["Intrusion detection in Software-Defined Networking using hybrid Bayesian model averaging for reliable uncertainty quantification"],"prefix":"10.1016","volume":"269","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4661-8589","authenticated-orcid":false,"given":"Yasmine","family":"Medjadba","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6783-8252","authenticated-orcid":false,"given":"Hamza","family":"Drid","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9701-5505","authenticated-orcid":false,"given":"Mohamed","family":"Rahouti","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.comnet.2025.111436_b1","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.jksuci.2023.02.001","article-title":"Data plane failure and its recovery techniques in SDN: A systematic literature review","volume":"35","author":"Khan","year":"2023","journal-title":"J. King Saud Univ. - Comput. Inf. Sci."},{"key":"10.1016\/j.comnet.2025.111436_b2","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110203","article-title":"Enhancing security in SDN: Systematizing attacks and defenses from a penetration perspective","volume":"241","author":"Kim","year":"2024","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2025.111436_b3","series-title":"A brief overview of software-defined networking","author":"Nunez","year":"2023"},{"key":"10.1016\/j.comnet.2025.111436_b4","doi-asserted-by":"crossref","DOI":"10.1109\/COMST.2024.3488580","article-title":"Online network DoS\/DDoS detection: Sampling, change point detection, and machine learning methods","author":"Owusu","year":"2024","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.comnet.2025.111436_b5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jpdc.2022.12.009","article-title":"Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm","volume":"175","author":"Asgharzadeh","year":"2023","journal-title":"J. Parallel Distrib. Comput."},{"key":"10.1016\/j.comnet.2025.111436_b6","doi-asserted-by":"crossref","unstructured":"H. Li, F. Wei, H. Hu, Enabling Dynamic Network Access Control with Anomaly-based IDS and SDN, in: Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, in: SDN-NFVSec \u201919, 2019, pp. 13\u201316, http:\/\/dx.doi.org\/10.1145\/3309194.3309199.","DOI":"10.1145\/3309194.3309199"},{"issue":"4","key":"10.1016\/j.comnet.2025.111436_b7","doi-asserted-by":"crossref","first-page":"897","DOI":"10.1109\/TIFS.2018.2868220","article-title":"A policy-based security architecture for software-defined networks","volume":"14","author":"Varadharajan","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2025.111436_b8","article-title":"A simple baseline for Bayesian uncertainty in deep learning","volume":"vol. 32","author":"Maddox","year":"2019"},{"key":"10.1016\/j.comnet.2025.111436_b9","doi-asserted-by":"crossref","first-page":"52181","DOI":"10.1109\/ACCESS.2019.2912115","article-title":"Network anomaly intrusion detection using a nonparametric Bayesian approach and feature selection","volume":"7","author":"Alhakami","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2025.111436_b10","unstructured":"B.A. Alahmadi, L. Axon, I. Martinovic, 99% False Positives: A Qualitative Study of SOC Analysts\u2019 Perspectives on Security Alarms, in: 31st USENIX Security Symposium (USENIX Security 22), 2022, pp. 2783\u20132800."},{"key":"10.1016\/j.comnet.2025.111436_b11","unstructured":"H. Jiang, B. Kim, M.Y. Guan, M. Gupta, To trust or not to trust a classifier, in: Proceedings of the 32nd International Conference on Neural Information Processing Systems, NIPS \u201918, 2018, pp. 5546\u20135557."},{"key":"10.1016\/j.comnet.2025.111436_b12","series-title":"Proceedings of the 33rd International Conference on Machine Learning","first-page":"1050","article-title":"Dropout as a Bayesian approximation: representing model uncertainty in deep learning","volume":"vol. 48","author":"Gal","year":"2016"},{"key":"10.1016\/j.comnet.2025.111436_b13","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.118196","article-title":"Bayesian autoencoders with uncertainty quantification: Towards trustworthy anomaly detection","volume":"209","author":"Yong","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.comnet.2025.111436_b14","unstructured":"M. Glazunov, A. Zarras, Do Bayesian Variational Autoencoders Know What They Don\u2019t Know?, in: The 38th Conference on Uncertainty in Artificial Intelligence, 2022, pp. 718\u2013727."},{"key":"10.1016\/j.comnet.2025.111436_b15","series-title":"Springer Series in Statistics","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/978-1-4612-1276-8","article-title":"Monte Carlo methods in Bayesian computation","author":"Chen","year":"2000"},{"key":"10.1016\/j.comnet.2025.111436_b16","doi-asserted-by":"crossref","first-page":"36538","DOI":"10.1109\/ACCESS.2022.3163384","article-title":"A review on Bayesian deep learning in healthcare: Applications and challenges","volume":"10","author":"Abdullah","year":"2022","journal-title":"IEEE Access"},{"issue":"518","key":"10.1016\/j.comnet.2025.111436_b17","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1080\/01621459.2017.1285773","article-title":"Variational inference: A review for statisticians","volume":"112","author":"Blei","year":"2017","journal-title":"J. Amer. Statist. Assoc."},{"issue":"2","key":"10.1016\/j.comnet.2025.111436_b18","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1016\/j.jksuci.2023.01.014","article-title":"A comprehensive review on ensemble deep learning: Opportunities and challenges","volume":"35","author":"Mohammed","year":"2023","journal-title":"J. King Saud Univ. - Comput. Inf. Sci."},{"key":"10.1016\/j.comnet.2025.111436_b19","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.inffus.2021.05.008","article-title":"A review of uncertainty quantification in deep learning: Techniques, applications and challenges","volume":"76","author":"Abdar","year":"2021","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.comnet.2025.111436_b20","series-title":"Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics","first-page":"234","article-title":"Uncertainty in neural networks: Approximately Bayesian ensembling","volume":"vol. 108","author":"Pearce","year":"2020"},{"issue":"2","key":"10.1016\/j.comnet.2025.111436_b21","doi-asserted-by":"crossref","DOI":"10.1016\/j.heliyon.2024.e24188","article-title":"Leveraging Bayesian deep learning and ensemble methods for uncertainty quantification in image classification: A ranking-based approach","volume":"10","author":"Abdullah","year":"2024","journal-title":"Heliyon"},{"issue":"1","key":"10.1016\/j.comnet.2025.111436_b22","article-title":"Intrusion detection system for cloud based software-defined networks","volume":"1804","author":"Ibrahim","year":"2021","journal-title":"J. Phys.: Conf. Ser."},{"issue":"5","key":"10.1016\/j.comnet.2025.111436_b23","doi-asserted-by":"crossref","DOI":"10.3390\/fi13050111","article-title":"Designing a network intrusion detection system based on machine learning for software defined networks","volume":"13","author":"Alzahrani","year":"2021","journal-title":"Futur. Internet"},{"key":"10.1016\/j.comnet.2025.111436_b24","series-title":"Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks","first-page":"37","article-title":"Network anomaly detection using LSTM based autoencoder","author":"Said Elsayed","year":"2020"},{"key":"10.1016\/j.comnet.2025.111436_b25","series-title":"Future Access Enablers for Ubiquitous and Intelligent Infrastructures","first-page":"91","article-title":"The role of CNN for intrusion detection systems: An improved CNN learning approach for SDNs","author":"Elsayed","year":"2021"},{"issue":"9","key":"10.1016\/j.comnet.2025.111436_b26","doi-asserted-by":"crossref","first-page":"1533","DOI":"10.3390\/electronics9091533","article-title":"DeepIDS: Deep learning approach for intrusion detection in software-defined networking","volume":"9","author":"Tang","year":"2020","journal-title":"Electronics"},{"key":"10.1016\/j.comnet.2025.111436_b27","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2024.103868","article-title":"Securing SDN: Hybrid autoencoder-random forest for intrusion detection and attack mitigation","volume":"225","author":"Mhamdi","year":"2024","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"10.1016\/j.comnet.2025.111436_b28","doi-asserted-by":"crossref","first-page":"2269","DOI":"10.1109\/TNSM.2022.3175710","article-title":"Griffin: Real-time network intrusion detection system via ensemble of autoencoder in SDN","volume":"19","author":"Yang","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"3","key":"10.1016\/j.comnet.2025.111436_b29","first-page":"6587","article-title":"Optimal deep learning-driven intrusion detection in SDN-enabled IoT environment","volume":"74","author":"Maray","year":"2022","journal-title":"Comput. Mater. Contin."},{"key":"10.1016\/j.comnet.2025.111436_b30","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2021.103160","article-title":"A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique","volume":"191","author":"ElSayed","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.comnet.2025.111436_b31","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.comcom.2021.08.026","article-title":"A hybrid intrusion detection system based on sparse autoencoder and deep neural network","volume":"180","author":"Rao","year":"2021","journal-title":"Comput. Commun."},{"key":"10.1016\/j.comnet.2025.111436_b32","article-title":"Tachyon: Enhancing stacked models using Bayesian optimization for intrusion detection using different sampling approaches","volume":"27","author":"Kumari","year":"2024","journal-title":"Egypt. Inform. J."},{"issue":"1","key":"10.1016\/j.comnet.2025.111436_b33","article-title":"Hybrid metaheuristics with deep learning enabled cyberattack prevention in software-defined networks","volume":"31","author":"Arun Prasad","year":"2024","journal-title":"Tehni\u010dki Vjesn."},{"key":"10.1016\/j.comnet.2025.111436_b34","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103909","article-title":"Towards trustworthy cybersecurity operations using Bayesian Deep Learning to improve uncertainty quantification of anomaly detection","volume":"144","author":"Yang","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comnet.2025.111436_b35","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2024.121001","article-title":"ESVI-GaMM: A fast network intrusion detection approach based on the Bayesian gamma mixture model","volume":"678","author":"He","year":"2024","journal-title":"Inform. Sci."},{"key":"10.1016\/j.comnet.2025.111436_b36","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.123014","article-title":"An intrusion detection algorithm based on joint symmetric uncertainty and hyperparameter optimized fusion neural network","volume":"244","author":"Wang","year":"2024","journal-title":"Expert Syst. Appl."},{"issue":"6","key":"10.1016\/j.comnet.2025.111436_b37","doi-asserted-by":"crossref","first-page":"7169","DOI":"10.1007\/s10489-022-03763-2","article-title":"A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc network","volume":"53","author":"Prasad","year":"2023","journal-title":"Appl. Intell."},{"key":"10.1016\/j.comnet.2025.111436_b38","doi-asserted-by":"crossref","first-page":"18910","DOI":"10.1109\/ACCESS.2023.3247947","article-title":"A Bayesian deep learning approach with convolutional feature engineering to discriminate cyber-physical intrusions in smart grid systems","volume":"11","author":"Kaur","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2025.111436_b39","series-title":"2023 Winter Simulation Conference","first-page":"2470","article-title":"Uncertainty-quantified, robust deep learning for network intrusion detection","author":"Wong","year":"2023"},{"key":"10.1016\/j.comnet.2025.111436_b40","doi-asserted-by":"crossref","DOI":"10.1007\/s10922-023-09772-x","article-title":"Fault tolerance and failure recovery techniques in software-defined networking: A comprehensive approach","volume":"31","author":"Menaceur","year":"2023","journal-title":"J. Netw. Syst. Manage."},{"key":"10.1016\/j.comnet.2025.111436_b41","doi-asserted-by":"crossref","first-page":"45820","DOI":"10.1109\/ACCESS.2022.3168972","article-title":"SDN security review: Threat taxonomy, implications, and open challenges","volume":"10","author":"Rahouti","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2025.111436_b42","doi-asserted-by":"crossref","first-page":"165263","DOI":"10.1109\/ACCESS.2020.3022633","article-title":"InSDN: A novel SDN intrusion dataset","volume":"8","author":"Elsayed","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2025.111436_b43","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/978-981-99-3691-5_34","article-title":"A review of DDoS evaluation dataset: CICDDoS2019 dataset","author":"Saheb","year":"2023","journal-title":"Energy Syst. Drives Autom."},{"issue":"7","key":"10.1016\/j.comnet.2025.111436_b44","doi-asserted-by":"crossref","first-page":"5929","DOI":"10.1007\/s10462-020-09838-1","article-title":"A review on the long short-term memory model","volume":"53","author":"Van Houdt","year":"2020","journal-title":"Artif. Intell. Rev."},{"key":"10.1016\/j.comnet.2025.111436_b45","doi-asserted-by":"crossref","DOI":"10.1016\/j.istruc.2024.107605","article-title":"Bayesian model averaging and Bayesian inference-based probabilistic inversion method for arch dam zonal material parameters","volume":"70","author":"Cheng","year":"2024","journal-title":"Structures"},{"issue":"2","key":"10.1016\/j.comnet.2025.111436_b46","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1007\/s10207-023-00771-2","article-title":"Network intrusion detection and mitigation in SDN using deep learning models","volume":"23","author":"Maddu","year":"2024","journal-title":"Int. J. Inf. Secur."},{"key":"10.1016\/j.comnet.2025.111436_b47","doi-asserted-by":"crossref","DOI":"10.1016\/j.asej.2023.102211","article-title":"Securing IoT and SDN systems using deep-learning based automatic intrusion detection","volume":"14","author":"Elsayed","year":"2023","journal-title":"Ain Shams Eng. J."},{"key":"10.1016\/j.comnet.2025.111436_b48","doi-asserted-by":"crossref","DOI":"10.1016\/j.pmcj.2023.101750","article-title":"F-BIDS: Federated-blending based intrusion detection system","volume":"89","author":"Aouedi","year":"2023","journal-title":"Pervasive Mob. Comput."},{"issue":"1","key":"10.1016\/j.comnet.2025.111436_b49","doi-asserted-by":"crossref","first-page":"867","DOI":"10.32604\/iasc.2023.026769","article-title":"An intrusion detection system for SDN using machine learning","volume":"35","author":"Logeswari","year":"2023","journal-title":"Intell. Autom. & Soft Comput."},{"issue":"24","key":"10.1016\/j.comnet.2025.111436_b50","doi-asserted-by":"crossref","first-page":"11634","DOI":"10.3390\/app112411634","article-title":"Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection","volume":"11","author":"Alghazzawi","year":"2021","journal-title":"Appl. Sci."},{"key":"10.1016\/j.comnet.2025.111436_b51","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103251","article-title":"Towards DDoS attack detection using deep learning approach","volume":"129","author":"Aktar","year":"2023","journal-title":"Comput. Secur."},{"issue":"5","key":"10.1016\/j.comnet.2025.111436_b52","first-page":"2623","article-title":"An efficient DDoS attack detection mechanism in SDN environment","volume":"15","author":"Hnamte","year":"2023","journal-title":"Int. J. Inf. Technol."},{"issue":"6","key":"10.1016\/j.comnet.2025.111436_b53","first-page":"3077","article-title":"DT-Model: a classification model for distributed denial of service attacks and flash events","volume":"14","author":"Tinubu","year":"2022","journal-title":"Int. J. Inf. Technol."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128625004037?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128625004037?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T19:09:15Z","timestamp":1752606555000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128625004037"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":53,"alternative-id":["S1389128625004037"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2025.111436","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2025,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Intrusion detection in Software-Defined Networking using hybrid Bayesian model averaging for reliable uncertainty quantification","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2025.111436","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"111436"}}