{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:44:33Z","timestamp":1774021473691,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR001120C0160"],"award-info":[{"award-number":["HR001120C0160"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1109\/icccn54977.2022.9868942","type":"proceedings-article","created":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T20:26:54Z","timestamp":1662409614000},"page":"1-8","source":"Crossref","is-referenced-by-count":12,"title":["Neural Networks for DDoS Attack Detection using an Enhanced Urban IoT Dataset"],"prefix":"10.1109","author":[{"given":"Arvin","family":"Hekmati","sequence":"first","affiliation":[{"name":"University of Southern California,Dept. of Computer Science,Los Angeles,California,USA"}]},{"given":"Eugenio","family":"Grippo","sequence":"additional","affiliation":[{"name":"University of Southern California,Dept. of Electrical and Computer Engineering,Los Angeles,California,USA"}]},{"given":"Bhaskar","family":"Krishnamachari","sequence":"additional","affiliation":[{"name":"University of Southern California,Dept. of Computer Science,Los Angeles,California,USA"}]}],"member":"263","reference":[{"key":"ref31","article-title":"Survey of network traffic models","volume":"567","author":"chandrasekaran","year":"2009","journal-title":"Washington University in St Louis"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2020.106187"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489489"},{"key":"ref11","first-page":"100","article-title":"Machine learning techniques used in detection of DoS attacks: a literature review","volume":"6","author":"sharma","year":"2016","journal-title":"International Journal of Advance Research in Computer Science and Software Engineering"},{"key":"ref12","year":"2021","journal-title":"University of New Brunswick Canadian Institute for Cybersecurity"},{"key":"ref13","year":"2021","journal-title":"University of California Irvine KDD Archive"},{"key":"ref14","year":"2021","journal-title":"University of New South Wales The UNSW-NB15 Dataset"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2992966"},{"key":"ref16","first-page":"361","article-title":"Flow-based benchmark data sets for intrusion detection","author":"ring","year":"2017","journal-title":"Proceedings of the 16th European Conference on Cyber Warfare and Security ACPI"},{"key":"ref17","first-page":"40","article-title":"Creation of flow-based data sets for intrusion detection","volume":"16","author":"ring","year":"2017","journal-title":"Journal of Information Warfare"},{"key":"ref18","year":"2021","journal-title":"A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks"},{"key":"ref19","year":"2021","journal-title":"University of California Irvine Machine Learning Repository"},{"key":"ref28","article-title":"University of New Brunswick","year":"2018","journal-title":"CSE-CIC-IDS2018 on AWS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"ref27","article-title":"Canadian Institute for Cybersecurity","year":"2017","journal-title":"CICIDS2017"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","article-title":"Current research on internet of things (IoT) security: A survey","volume":"148","author":"hassan","year":"2019","journal-title":"Computer Networks"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref29","article-title":"University of New Brunswick","year":"2019","journal-title":"DDoS Evaluation Dataset (CICD-DoS2019)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5220\/0006246600470058"},{"key":"ref8","first-page":"1","article-title":"Analysis of mirai malicious software","author":"sinanovi?","year":"2017","journal-title":"2017 25th International Conference on Software Telecommunications and Computer Networks (SoftCOM)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.62"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/EEEIC.2016.7555867"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2018.8538636"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SEGE.2016.7589556"},{"key":"ref20","year":"2021","journal-title":"University of New South Wales The Bot-IoT Dataset"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2002.1167058"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3493695"},{"key":"ref24","year":"2021","journal-title":"DARPA 2000 Intrustion Detection Scenario Specific Data Sets"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref25","year":"2007","journal-title":"The caida ucsd &#x201C;ddos attack 2007"}],"event":{"name":"2022 International Conference on Computer Communications and Networks (ICCCN)","location":"Honolulu, HI, USA","start":{"date-parts":[[2022,7,25]]},"end":{"date-parts":[[2022,7,28]]}},"container-title":["2022 International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9868842\/9868856\/09868942.pdf?arnumber=9868942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T21:04:10Z","timestamp":1664226250000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9868942\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icccn54977.2022.9868942","relation":{},"subject":[],"published":{"date-parts":[[2022,7]]}}}