{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:36:14Z","timestamp":1730223374282,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1109\/globecom54140.2023.10437050","type":"proceedings-article","created":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T14:45:36Z","timestamp":1708958736000},"page":"2692-2697","source":"Crossref","is-referenced-by-count":0,"title":["Network Intrusion Detection in Software-Defined Network Using Deep and Machine Learning"],"prefix":"10.1109","author":[{"given":"Lotfi","family":"Mhamdi","sequence":"first","affiliation":[{"name":"School of Electronic &#x0026; Electrical Eng. University of Leeds,Leeds,United Kingdom"}]},{"given":"Hedi","family":"Hamdi","sequence":"additional","affiliation":[{"name":"Jouf University,Department of Computer Science,Sakkaka,Saudi Arabia"}]},{"given":"Mahmood A.","family":"Mahmood","sequence":"additional","affiliation":[{"name":"Jouf University,Department of Information Systems,Sakkaka,Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2869577"},{"issue":"9","key":"ref4","article-title":"Deepids: Deep learning approach for intrusion detection in software defined networking","volume-title":"Electronics","volume":"9","author":"Tang","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838282"},{"issue":"6","key":"ref6","article-title":"Cnn-based network intrusion detection against denial-of-service attacks","volume-title":"Electronics","volume":"9","author":"Kim","year":"2020"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2018.8460090"},{"issue":"4","key":"ref9","article-title":"Performance evaluation of deep learning based network intrusion detection system across multiple balanced and imbalanced datasets","volume-title":"Electronics","volume":"11","author":"Meliboev","year":"2022"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2019.000-6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2174\/1872212112666180402122150"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412199"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39964-3_62"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI46756.2018.00065"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02300-7_2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2401-x"},{"volume-title":"Keras","year":"2015","author":"Chollet","key":"ref20"}],"event":{"name":"GLOBECOM 2023 - 2023 IEEE Global Communications Conference","start":{"date-parts":[[2023,12,4]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2023,12,8]]}},"container-title":["GLOBECOM 2023 - 2023 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10436708\/10436716\/10437050.pdf?arnumber=10437050","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T20:03:09Z","timestamp":1709236989000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10437050\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/globecom54140.2023.10437050","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]}}}