{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:48:24Z","timestamp":1765039704957,"version":"build-2065373602"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,14]]},"DOI":"10.1109\/ic3i59117.2023.10398150","type":"proceedings-article","created":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T18:27:08Z","timestamp":1706293628000},"page":"546-551","source":"Crossref","is-referenced-by-count":7,"title":["Implementation of ABC &amp; WOA-Based Security Defense Mechanism for Distributed Denial of Service Attacks"],"prefix":"10.1109","author":[{"given":"Suman","family":"Devi","sequence":"first","affiliation":[{"name":"Chaudhary Devi Lal University,Department of Computer Science and Engineering,Sirsa,Haryana,India"}]},{"given":"Yogesh","family":"Kumar Sharma","sequence":"additional","affiliation":[{"name":"Koneru Lakshmaiah Education Foundation,Department of Computer Science &#x0026; Engineering,Guntur,AP"}]},{"given":"Senthil","family":"Athithan","sequence":"additional","affiliation":[{"name":"Koneru Lakshmaiah Education Foundation,Department of Computer Science &#x0026; Engineering,Vaddeswaram,Andhra Pradesh,India"}]},{"given":"Savya","family":"Sachi","sequence":"additional","affiliation":[{"name":"Lalit Narayan Mishra College of Business Management,Department of Information Technology,Muzaffarpur,Bihar,India"}]},{"given":"Ajay Kumar","family":"Singh","sequence":"additional","affiliation":[{"name":"Allen House Institute of Technology,India"}]},{"given":"Arpit","family":"Jain","sequence":"additional","affiliation":[{"name":"Koneru Lakshmaiah Education Foundation,Department of Computer Science &#x0026; Engineering,Vaddeswaram,Andhra Pradesh,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08271-z"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1504\/ijcse.2019.100243"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-6747-1_17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.02.028"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-4305-4_8"},{"key":"ref6","volume":"13","author":"Ali","year":"2022","journal-title":"Network Intrusion Detection in MANET Using Improved Whale Optimization Algorithm-SVM"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.35940\/ijitee.l2478.1081219"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.32628\/cseit206549"},{"issue":"3","key":"ref9","first-page":"358","article-title":"Performance Evaluation of an Intelligent and Optimized Machine Learning Framework for Attack Detection","volume":"14","author":"ALMahadin","year":"2022","journal-title":"Int. J. Commun. Networks Inf. Secur."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.29121\/granthaalayah.v8.i8.2020.1031"},{"issue":"352","key":"ref11","first-page":"38039","volume":"90","author":"Science","year":"2014","journal-title":"518456 - Integrated binary artificial bee colony algorithm with NAiVE bayesian classifier for network intrusion detection system - NSL KDD"},{"key":"ref12","article-title":"A Novel Anomaly-based Intrusion Detection System using Whale Optimization Algorithm WOA-Based Intrusion Detection System","volume-title":"J. Web Res.","author":"Siahmarzkooh","year":"2021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2020.1733307"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3622"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04453-w"}],"event":{"name":"2023 6th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2023,9,14]]},"location":"Gautam Buddha Nagar, India","end":{"date-parts":[[2023,9,16]]}},"container-title":["2023 6th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10397581\/10397594\/10398150.pdf?arnumber=10398150","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T18:26:59Z","timestamp":1706898419000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10398150\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,14]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ic3i59117.2023.10398150","relation":{},"subject":[],"published":{"date-parts":[[2023,9,14]]}}}