{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T03:40:09Z","timestamp":1774669209700,"version":"3.50.1"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100004682","name":"University of Peshawar, Pakistan","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004682","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Kardan University, Kabul"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3152577","type":"journal-article","created":{"date-parts":[[2022,2,17]],"date-time":"2022-02-17T20:24:50Z","timestamp":1645129490000},"page":"21443-21454","source":"Crossref","is-referenced-by-count":121,"title":["A Machine Learning-Based Classification and Prediction Technique for DDoS Attacks"],"prefix":"10.1109","volume":"10","author":[{"family":"Ismail","sequence":"first","affiliation":[{"name":"Department of Computer Science, Brains Institute Peshawar, Peshawar, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6991-1481","authenticated-orcid":false,"given":"Muhammad Ismail","family":"Mohmand","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Brains Institute Peshawar, Peshawar, Pakistan"}]},{"given":"Hameed","family":"Hussain","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Buner, Buner, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2793-858X","authenticated-orcid":false,"given":"Ayaz Ali","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Lakki Marwat, Lakki Marwat, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0710-2531","authenticated-orcid":false,"given":"Ubaid","family":"Ullah","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Brains Institute Peshawar, Peshawar, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7070-6699","authenticated-orcid":false,"given":"Muhammad","family":"Zakarya","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Abdul Wali Khan University Mardan, Mardan, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9364-0231","authenticated-orcid":false,"given":"Aftab","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Abdul Wali Khan University Mardan, Mardan, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2890-8072","authenticated-orcid":false,"given":"Mushtaq","family":"Raza","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Abdul Wali Khan University Mardan, Mardan, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2289-6624","authenticated-orcid":false,"given":"Izaz Ur","family":"Rahman","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Abdul Wali Khan University Mardan, Mardan, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0782-1077","authenticated-orcid":false,"given":"Muhammad","family":"Haleem","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Kardan University, Kabul, Afghanistan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974752"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973219"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972627"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982418"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975716"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2953451"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923640"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977007"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983568"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2907965"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2912022"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2020.9010021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s21020656"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.22581\/muet1982.2101.19"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/sym13010084"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08271-z"},{"key":"ref18","article-title":"Malware detection and analysis: Challenges and research opportunities","author":"Akhtar","year":"2021","journal-title":"arXiv:2101.08429"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-73280-6_31"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905754"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103186"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.7753\/IJCATR1001.1008"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009733"},{"key":"ref24","first-page":"119","article-title":"Mobile ad hoc netwoks security attacks and secured routing protocols: A survey","volume-title":"Proc. 2nd Int. Conf. Comput. Sci. Inf. Technol. (CCSIT)","author":"Khari"},{"issue":"12","key":"ref25","first-page":"354","article-title":"Python\u2014The fastest growing programming language","volume":"4","author":"Srinath","year":"2017","journal-title":"Int. Res. J. Eng. Technol."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JCDL.2017.7991618"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22203-0_30"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-7527-3_68"},{"issue":"7","key":"ref29","first-page":"71","article-title":"Cloud QoS, high availability & service security issues with solutions","volume":"12","author":"Zakarya","year":"2012","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"issue":"11","key":"ref30","first-page":"1418","article-title":"DDoS verification and attack packet dropping algorithm in cloud computing","volume":"23","author":"Zakarya","year":"2013","journal-title":"World Appl. Sci. J."},{"issue":"3","key":"ref31","first-page":"139","article-title":"Vulnerabilities and attacks in global system for mobile communication (GSM)","volume":"2","author":"Saini","year":"2011","journal-title":"Int. J. Adv. Res. Comput. Sci."}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09716094.pdf?arnumber=9716094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T23:00:54Z","timestamp":1705532454000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9716094\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3152577","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}