{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T10:22:21Z","timestamp":1778149341346,"version":"3.51.4"},"reference-count":141,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100008561","name":"Universiti Tenaga Nasional Internal","doi-asserted-by":"publisher","award":["RJO10517844057"],"award-info":[{"award-number":["RJO10517844057"]}],"id":[{"id":"10.13039\/501100008561","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3069210","type":"journal-article","created":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T20:49:38Z","timestamp":1617050978000},"page":"52523-52556","source":"Crossref","is-referenced-by-count":58,"title":["Applications of Machine Learning in Networking: A Survey of Current Issues and Future Challenges"],"prefix":"10.1109","volume":"9","author":[{"given":"M. A.","family":"Ridwan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0481-7686","authenticated-orcid":false,"given":"N. A. M.","family":"Radzi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1030-7554","authenticated-orcid":false,"given":"F.","family":"Abdullah","sequence":"additional","affiliation":[]},{"given":"Y. E.","family":"Jalil","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"chollet","year":"2017","journal-title":"Deep Learning with Python"},{"key":"ref38","author":"manaswi","year":"2020","journal-title":"Generative Adversarial Networks With Industrial Use Cases"},{"key":"ref33","author":"g\u00e9ron","year":"2019","journal-title":"Hands-On Machine Learning with Scikit-Learn Keras and TensorFlow Concepts Tools and Techniques to Build Intelligent Systems"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-2312(03)00431-4"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1038\/nbt1206-1565"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11749-016-0481-7"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/9780470191613"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-56927-2","author":"kohonen","year":"2001","journal-title":"Self-Organizing mapsNo Title"},{"key":"ref35","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-29807-3","author":"wu","year":"2012","journal-title":"Advances in K-means Clustering"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/WAMICON.2019.8765434"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.005"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2945545"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0630-0"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766546"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2921977"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2018.8586811"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2924010"},{"key":"ref26","author":"brink","year":"2017","journal-title":"Real-World Machine Learning"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254036"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2827997"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2019.8824952"},{"key":"ref50","first-page":"41","article-title":"An empirical study of the naive Bayes classifier","author":"weise","year":"2009","journal-title":"Proc Int Joint Conf Artif Intell Amer Assoc Artif Intell"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2866942"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ECOC.2018.8535437"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1700244"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.17775\/CSEEJPES.2018.00520"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2773458"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2926625"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2896950"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2707140"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1561\/2000000039"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BSB.2018.8770662"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462375"},{"key":"ref6","first-page":"16","article-title":"Intelligent wireless communications enabled by cognitive radio and machine learning","volume":"15","author":"zhou","year":"2018","journal-title":"China Commun"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005963"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913776"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"100d","DOI":"10.1364\/JOCN.10.00D100","article-title":"Using machine learning in communication networks [invited]","volume":"10","author":"c\u00f4t\u00e9","year":"2018","journal-title":"J Opt Commun Netw"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41063-0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2970615"},{"key":"ref46","first-page":"18","article-title":"Classification and regression by randomForest","volume":"3","author":"liaw","year":"2003","journal-title":"R Project"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56485-8"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM.2018.8607697"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSD47982.2019.9002770"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1613\/jair.301"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref44","author":"rokach","year":"2015","journal-title":"Data Mining with Decision Trees"},{"key":"ref43","author":"sutton","year":"1998","journal-title":"Reinforcement Learning An Introduction"},{"key":"ref127","first-page":"1","article-title":"A connectionist approach to dynamic resource management for virtualised network functions","author":"mijumbi","year":"2017","journal-title":"Proc 12th Int Conf Netw Service Manage (CNSM) Workshops 3rd Int Workshop Manage SDN NFV ManSDN\/NFV Int Workshop Green ICT Smart Netw (GISN)"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005750"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2947591"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2964697"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816048"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2942390"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2847722"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916177"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101752"},{"key":"ref76","author":"dignan","year":"2019","journal-title":"Amazon Exploits Its S3 Outage"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2944169"},{"key":"ref77","article-title":"ENISA threat landscape 2013&#x2014;Overview of current and emerging cyber-threats","author":"marinos","year":"2013"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836950"},{"key":"ref75","year":"2019","journal-title":"BBC NEWS |Technology |Estonia Fines Man for Cyber War"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2017.8108573"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCC.2019.8843628"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3024629"},{"key":"ref78","year":"2014","journal-title":"Ello Social Network Hit by Suspected BLOODY DDoS Attack |DDoSAttacks net"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000478"},{"key":"ref79","year":"2018","journal-title":"Top Dutch Banks Revenue Service Hit by Cyber Attacks"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2692307"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1364\/OFC.2018.Th4D.7"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2018.2828608"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2594776"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2004.10063"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2966271"},{"key":"ref62","doi-asserted-by":"crossref","first-page":"1a","DOI":"10.1364\/JOCN.11.0000A1","article-title":"Experimental demonstration of machine-learning-aided QoT estimation in multi-domain elastic optical networks with alien wavelengths","volume":"11","author":"proietti","year":"2019","journal-title":"IEEE\/OSA Journal of Optical Communications and Networking"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2357-y"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/LPT.2019.2950058"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.10.000D52"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909490"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2874483"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2954595"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.11.025"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/AHS.2018.8541460"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2927867"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2019.8832414"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.9.000A35"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMANTIC.2019.8884267"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2841987"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737413"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972627"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317857"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980937"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.9.000D19"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975716"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2921792"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923640"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2907752"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00131"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1364\/OFC.2019.Th2A.24"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320099"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2018.8589161"},{"key":"ref111","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.comcom.2018.12.001","article-title":"GMMR: A Gaussian mixture model based unsupervised machine learning approach for optimal routing in opportunistic IoT networks","volume":"134","author":"vashishth","year":"0","journal-title":"Comput Commun"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977612"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892063"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAI48974.2019.9010507"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2967118"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-019-03045-6"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.11.034"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2019.2901792"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2912200"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2904897"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916648"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916583"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2873125"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2928564"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821506"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM.2017.8256059"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.09.013"},{"key":"ref81","author":"palmer","year":"2019","journal-title":"Labour Party Confirms Cyber Attack Was DDoS"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2959232"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"ref84","first-page":"1848","article-title":"A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection","volume":"2","author":"revathi","year":"0","journal-title":"Int J Eng Res Technol"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2896380"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973219"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.01.026"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2016.133"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2017.8077095"},{"key":"ref80","author":"tozier","year":"2019","journal-title":"Norsk Hydro Recovers From Lockergoga Cyberattack"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/3313231.3352369"},{"key":"ref115","first-page":"1","article-title":"Empirical study based on machine learning approach to assess the QoS\/QoE correlation","author":"mushtaq","year":"2017","journal-title":"Proc 17th Eur Conf Netw Opt Commun (NOC) 7th Conf Opt Cabling Infrastruct (OCI)"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980136"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996439"},{"key":"ref121","article-title":"A deep-reinforcement learning approach for software-defined networking routing optimization","author":"stampa","year":"2017","journal-title":"arXiv 1709 07080"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2680898"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.205"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICISSEC.2016.7885840"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2869577"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977007"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09388670.pdf?arnumber=9388670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T17:59:32Z","timestamp":1643219972000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9388670\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":141,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3069210","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}