{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:23:42Z","timestamp":1775665422681,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,6]]},"DOI":"10.1109\/icccnt56998.2023.10306608","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T18:54:40Z","timestamp":1700765680000},"page":"1-7","source":"Crossref","is-referenced-by-count":4,"title":["AI-Enabled Fast Detection of DDoS and Adversary DDoS Attacks in SDN"],"prefix":"10.1109","author":[{"given":"Pratheeksha","family":"Prathap","sequence":"first","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Amritapuri,India"}]},{"given":"Subhasri","family":"Duttagupta","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Amritapuri,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602219"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6553676"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2866942"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3497"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1882-5_19"},{"issue":"10","key":"ref7","first-page":"691","article-title":"Effective threshold defence against DoS attack on SDN controller","volume":"119","author":"Raj","year":"2018","journal-title":"Int. J. Pure Appl. Math"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/jsan10030059"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2181-4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSIT.2018.8748836"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3019330"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03323-w"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/su12031035"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC48623.2020.9085007"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527967"},{"key":"ref18","article-title":"Bidirectional LSTM-CRF models for sequence tagging","author":"Huang","year":"2015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1162\/neco_a_01199"},{"key":"ref20","article-title":"Modeling tabular data using conditional gan","volume":"32","author":"Xu","year":"2019","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-9228-5_32"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2022.3173659"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109080"}],"event":{"name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","location":"Delhi, India","start":{"date-parts":[[2023,7,6]]},"end":{"date-parts":[[2023,7,8]]}},"container-title":["2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10306338\/10306339\/10306608.pdf?arnumber=10306608","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T12:19:05Z","timestamp":1709381945000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10306608\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icccnt56998.2023.10306608","relation":{},"subject":[],"published":{"date-parts":[[2023,7,6]]}}}