{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:35:11Z","timestamp":1750224911076,"version":"3.29.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10723841","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Intelligent Network Intrusion Detection for SDN Using XGBoost"],"prefix":"10.1109","author":[{"given":"G Balu Narasimha","family":"Rao","sequence":"first","affiliation":[{"name":"Vignan&#x2019;s Foundation for Science, Technology and Research,Department of Computer Science &#x0026; Engineering,Guntur,India"}]},{"given":"Amit","family":"Kumar","sequence":"additional","affiliation":[{"name":"Vignan&#x2019;s Foundation for Science, Technology and Research,Department of Computer Science &#x0026; Engineering,Guntur,India"}]},{"given":"Nitish","family":"Kumar","sequence":"additional","affiliation":[{"name":"Vignan&#x2019;s Foundation for Science, Technology and Research,Department of Computer Science &#x0026; Engineering,Guntur,India"}]},{"given":"Prem","family":"Raj","sequence":"additional","affiliation":[{"name":"Vignan&#x2019;s Foundation for Science, Technology and Research,Department of Computer Science &#x0026; Engineering,Guntur,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3409334.3452073"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.47893\/ijcct.2010.1054"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/nigeriacomputconf45974.2019.8949676"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.33545\/26633582.2020.v2.i2a.32"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/wcsp.2019.8927907"},{"key":"ref6","first-page":"1164","article-title":"On the KDD\u201999 Dataset: Support Vector Machine Based Intrusion Detection System (IDS) with Different Kernels","volume":"4","author":"Hasan","year":"2013","journal-title":"International Journal of Electronics Communication and Computer Engineering"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsit.2010.2613"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2019.2907247"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4236\/jsea.2014.712090"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17762\/turcomat.v12i2.2290"},{"key":"ref11","article-title":"Research on Application of Support Vector Machine in Intrusion Detection","volume-title":"Journal of Physics: Conference Series","volume":"012074","author":"Lihua"},{"article-title":"INTRUSION DETECTION USING THE SUPPORT VECTOR MACHINE ENHANCED WITH A FEATURE-WEIGHT KERNEL","year":"2007","author":"Zhao","key":"ref12"},{"article-title":"Intrusion Detection System using Support Vector Machine","volume-title":"Proceedings of the International Conference and Workshop on Advanced Computing (ICWAC)","author":"Jha","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16078-3_42"},{"key":"ref15","first-page":"347","article-title":"Network intrusion detection system: A machine learning approach. Intelligent Decision Technologies (IDT) Journal","volume":"5","author":"Panda","year":"2011"},{"issue":"2022","key":"ref16","first-page":"406","article-title":"Autoencoder-support vector machine-grasshopper optimization for intrusion detection system","volume":"4","author":"Chikkalwar","journal-title":"Int J Intell Eng Syst 15"},{"issue":"2s","key":"ref17","first-page":"120","article-title":"Design and Implementation of Machine Learning-Based Network Intrusion Detection","volume":"12","author":"Ambala","year":"2023","journal-title":"Int J Intell Syst Appl Eng"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2023.026769"},{"issue":"1","key":"ref19","first-page":"1889","article-title":"A Proposed Approach for Network Intrusion Detection System using SVM","volume":"11","author":"Deshmukh","year":"2021","journal-title":"*International Journal of Current Engineering and Technology*"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91738-8_42"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2024,6,24]]},"location":"Kamand, India","end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10723841.pdf?arnumber=10723841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T05:43:47Z","timestamp":1732686227000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10723841\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10723841","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}