{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T13:48:56Z","timestamp":1768312136916,"version":"3.49.0"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"VNUHCM-University of Information Technology\u2019s Scientific Research Support Fund"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2025.3650705","type":"journal-article","created":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T18:39:33Z","timestamp":1767638373000},"page":"4886-4916","source":"Crossref","is-referenced-by-count":0,"title":["An Approach to Attack Classification for Programmable Network Infrastructure Using Machine Learning and Deep Learning Solutions"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-7841-3300","authenticated-orcid":false,"given":"Bao","family":"Pham-Thai","sequence":"first","affiliation":[{"name":"Faculty of Computer Networks and Communications, University of Information Technology, Ho Chi Minh City, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2052-7343","authenticated-orcid":false,"given":"My","family":"Nguyen-Le-Ha","sequence":"additional","affiliation":[{"name":"Faculty of Computer Networks and Communications, University of Information Technology, Ho Chi Minh City, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7509-5399","authenticated-orcid":false,"given":"Thuat","family":"Nguyen-Khanh","sequence":"additional","affiliation":[{"name":"Faculty of Computer Networks and Communications, University of Information Technology, Ho Chi Minh City, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4078-1895","authenticated-orcid":false,"given":"Quan","family":"Le-Trung","sequence":"additional","affiliation":[{"name":"Faculty of Computer Networks and Communications, University of Information Technology, Ho Chi Minh City, Vietnam"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3564048"},{"key":"ref2","volume-title":"Smart City IoT Benefits and Use Cases","year":"2024"},{"key":"ref3","volume-title":"SDN: Enabling Smart Cities","year":"2025"},{"key":"ref4","volume-title":"SDN and the Future of Smart Cities","year":"2025"},{"key":"ref5","volume-title":"SDN Controller Vulnerabilities","year":"2024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs:20060055"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2453114"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref9","volume-title":"Understanding Software-Defined Network (SDN) Attack Vectors: Key Insights and Use Cases","year":"2024"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908998"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICESC60852.2024.10689743"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM49955.2020.00072"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI50826.2021.9402517"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102942"},{"key":"ref15","article-title":"Opportunities and challenges in explainable artificial intelligence (XAI): A survey","author":"Das","year":"2020","journal-title":"arXiv:2006.11371"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2025.03.073"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.55162\/mcet.05.160"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2024.054610"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC2T60072.2024.10475035"},{"key":"ref20","article-title":"Classification and explanation of distributed denial-of-service (DDoS) attack detection using machine learning and Shapley additive explanation (SHAP) methods","author":"Wei","year":"2023","journal-title":"arXiv:2306.17190"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDV66179.2025.11135066"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN50289.2020.9289894"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT64611.2024.11022440"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/computers12020032"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI52147.2023.10371980"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-63783-4_12"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-54129-2_8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3389\/frai.2025.1526221"},{"key":"ref29","article-title":"XAI-based feature selection for improved network intrusion detection systems","author":"Arreche","year":"2024","journal-title":"arXiv:2410.10050"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-025-05326-9"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2928564"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s44227-024-00055-8"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2025.3610365"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-024-00219-7"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2025.111711"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC48688.2020.0-157"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/electronics14163244"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2666270"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115736"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88942-5_30"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/BigComp.2018.00044"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03323-w"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15725-y"},{"key":"ref45","article-title":"Sdn intrusion detection using machine learning method","author":"Zawad Mahmud","year":"2024","journal-title":"arXiv:2411.05888"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11328054.pdf?arnumber=11328054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:12:52Z","timestamp":1768291972000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11328054\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3650705","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}