{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:23:26Z","timestamp":1775744606240,"version":"3.50.1"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100015624","name":"University of Jeddah, Jeddah, Saudi Arabia","doi-asserted-by":"publisher","award":["UJ-23-SRP-13"],"award-info":[{"award-number":["UJ-23-SRP-13"]}],"id":[{"id":"10.13039\/501100015624","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3443067","type":"journal-article","created":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T17:38:35Z","timestamp":1723570715000},"page":"112368-112380","source":"Crossref","is-referenced-by-count":9,"title":["Enhanced IoT Security for DDOS Attack Detection: Split Attention-Based ResNeXt-GRU Ensembler Approach"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9815-0319","authenticated-orcid":false,"given":"Abdulrahman A.","family":"Alshdadi","sequence":"first","affiliation":[{"name":"Department of Information Systems and Technology, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7181-2100","authenticated-orcid":false,"given":"Abdulwahab Ali","family":"Almazroi","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computing and Information Technology at Khulais, University of Jeddah, Jeddah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0132-6662","authenticated-orcid":false,"given":"Eesa","family":"Alsolami","sequence":"additional","affiliation":[{"name":"Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1153-5401","authenticated-orcid":false,"given":"Nasir","family":"Ayub","sequence":"additional","affiliation":[{"name":"Department of Creative Technologies, Air University, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7281-5458","authenticated-orcid":false,"given":"Miltiadis D.","family":"Lytras","sequence":"additional","affiliation":[{"name":"Management Information Systems Department, School of Business and Economics, The American College of Greece, Athens, Greece"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s40745-022-00444-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00599-z"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.36348\/sjet.2022.v07i05.002"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2021.1962677"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.37868\/sei.v3i1.124"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3194881"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.05.049"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/9629381"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100565"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2876939"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/s21051809"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s21020446"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107417"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2970501"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/jcp2040041"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18732-3_8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103201"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/s22041396"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.007"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2022.2145660"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100059"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3005252"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101898"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8379532"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/s20113078"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3188635"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03238-y"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPC51351.2021.9451740"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4632"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.021"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02271-w"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3215460"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11020198"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph17249347"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3272925"},{"key":"ref37","first-page":"28351","article-title":"BiBench: Benchmarking and analyzing network binarization","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Qin"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01687-5"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3243259"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10096223"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.watres.2022.119100"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.scitotenv.2023.168814"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107536"},{"key":"ref44","volume-title":"NSLKDD DataSet","year":"2024"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.38094\/jastt1224"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3427912"},{"key":"ref47","volume-title":"Data Preparation for Machine Learning: Data Cleaning, Feature Selection, and Data Transforms in Python","author":"Brownlee","year":"2020"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.48161\/qaj.v1n2a50"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115870"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2019.01.006"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1186\/s12864-019-6413-7"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10634505.pdf?arnumber=10634505","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T05:52:46Z","timestamp":1724133166000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10634505\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3443067","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}