{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:25:50Z","timestamp":1773156350531,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,29]]},"DOI":"10.1109\/icccn61486.2024.10637621","type":"proceedings-article","created":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T17:55:28Z","timestamp":1724349328000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["In-network Reinforcement Learning for Attack Mitigation using Programmable Data Plane in SDN"],"prefix":"10.1109","author":[{"given":"Aparna","family":"Ganesan","sequence":"first","affiliation":[{"name":"The University of Texas at Dallas,Department of Computer Science,Richardson,Texas,75080"}]},{"given":"Kamil","family":"Sarac","sequence":"additional","affiliation":[{"name":"The University of Texas at Dallas,Department of Computer Science,Richardson,Texas,75080"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3472716.3472846"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10000925"},{"key":"ref3","article-title":"Offline reinforcement learning: Tutorial, review, and perspectives on open problems","author":"Levine","year":"2020"},{"key":"ref4","article-title":"Proximal policy optimization algorithms","author":"Schulman","year":"2017"},{"key":"ref5","article-title":"Openai gym","author":"Brockman","year":"2016"},{"key":"ref6","article-title":"Mininet official website"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.5220\/0005740704070414","article-title":"Characterization of encrypted and vpn traffic using time-related","volume-title":"Proceedings of the 2nd ICISSP","author":"Draper-Gil"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3605153"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1145\/3307650.3322259","article-title":"Accelerating distributed reinforcement learning with in-switch computing","volume-title":"Proceedings of the 46th International Symposium on Computer Architecture","author":"Li"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488840"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789930"},{"key":"ref12","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton","year":"2018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft48620.2020.9165383"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500763"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref16","article-title":"simple switch grpc"},{"key":"ref17","article-title":"Behavioral model (bmv2)"},{"key":"ref18","article-title":"P4runtime specification"},{"key":"ref19","article-title":"Thrift: Scalable cross-language services implementation","author":"Slee","year":"2007","journal-title":"Facebook white paper"},{"key":"ref20","article-title":"Stable-baselines3: Reliable reinforcement learning implementations","volume-title":"Journal of Machine Learning Research","author":"Raffin","year":"2021"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2960202"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"}],"event":{"name":"2024 33rd International Conference on Computer Communications and Networks (ICCCN)","location":"Kailua-Kona, HI, USA","start":{"date-parts":[[2024,7,29]]},"end":{"date-parts":[[2024,7,31]]}},"container-title":["2024 33rd International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10637481\/10637507\/10637621.pdf?arnumber=10637621","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T04:46:52Z","timestamp":1725252412000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10637621\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,29]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icccn61486.2024.10637621","relation":{},"subject":[],"published":{"date-parts":[[2024,7,29]]}}}