{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:35:05Z","timestamp":1759991705072,"version":"3.29.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10725796","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["A Hybrid Prediction Model for Disseminating the Factors Related to Anomaly Detection in Software Defined Networks"],"prefix":"10.1109","author":[{"given":"S","family":"Darshan","sequence":"first","affiliation":[{"name":"Amrita School of Computing, Amrita Vishwa Vidyapeetham,Dept. of Computer Science and Engineering,Coimbatore,India"}]},{"given":"N","family":"Radhika","sequence":"additional","affiliation":[{"name":"Amrita School of Computing, Amrita Vishwa Vidyapeetham,Dept. of Computer Science and Engineering,Coimbatore,India"}]},{"given":"G","family":"Radhika","sequence":"additional","affiliation":[{"name":"Amrita School of Computing, Amrita Vishwa Vidyapeetham,Dept. of Computer Science and Engineering,Coimbatore,India"}]}],"member":"263","reference":[{"issue":"6","key":"ref1","first-page":"2466","article-title":"K-means clustering using nature-inspired optimization algorithms-A comparative survey","volume":"29","author":"Bhavani K","year":"2020","journal-title":"International Journal of Advanced Science and Technology"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.31838\/ijpr\/2020.12.01.196"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.3390\/s21082863"},{"issue":"1149","key":"ref4","first-page":"Q14.6","article-title":"Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques","volume-title":"Scientific Reports","volume":"14","author":"Venkatesan","year":"2024"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TII.2021.3084341"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/s00500-022-07181-x"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.32604\/iasc.2020.010114"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/globecom42002.2020.9322364"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.20944\/preprints202308.1089.v1","article-title":"Review of Advancing Anomaly Detection in SDN through Deep Learning Algorithms","author":"Tavangari","year":"2023"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.29007\/gklh"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/IoT52625.2021.9469714"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.7125\/40.9"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ICEDSS.2017.8073659"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/EWSDN.2014.24"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/GLOBECOM48099.2022.10001438"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.asoc.2024.111451"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.12677\/csa.2018.811187"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/IKT54664.2021.9685665"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ACCESS.2019.2943056"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/978-981-15-8586-9_14"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ICCW.2018.8403693"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/WINCOM59760.2023.10322912"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2024,6,24]]},"location":"Kamand, India","end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10725796.pdf?arnumber=10725796","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T07:59:38Z","timestamp":1732694378000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10725796\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10725796","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}