{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:55:50Z","timestamp":1773330950016,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T00:00:00Z","timestamp":1603238400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T00:00:00Z","timestamp":1603238400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T00:00:00Z","timestamp":1603238400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,21]]},"DOI":"10.1109\/ictc49870.2020.9289504","type":"proceedings-article","created":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T17:58:16Z","timestamp":1608573496000},"page":"515-519","source":"Crossref","is-referenced-by-count":37,"title":["A Machine Learning Framework for Prevention of Software-Defined Networking controller from DDoS Attacks and dimensionality reduction of big data"],"prefix":"10.1109","author":[{"given":"Jehad","family":"Ali","sequence":"first","affiliation":[]},{"given":"Byeong-hee","family":"Roh","sequence":"additional","affiliation":[]},{"given":"Byungkyu","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jimyung","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Adil","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"An Effective Hierarchical Control Plane for Software-Defined Networks Leveraging TOPSIS for End-to-End QoS Class-Mapping","author":"ali","year":"2019","journal-title":"IEEE Access"},{"key":"ref11","article-title":"A Framework for QoS-aware Class Mapping in Multidomain SDN","author":"ali","year":"2019","journal-title":"IEEE IEMCON UBC Canada"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2016.7797342"},{"key":"ref13","article-title":"ROBUST MULTI-MODAL FACE RECOGNITION WITH PRE-PROCESSED KINECT RGB-D IMAGES","volume":"36","author":"ahmad","year":"2017","journal-title":"Journal of Engineering and Applied Sciences"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062248"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1145\/1269899.1254895","article-title":"Sensitivity of PCA for traffic anomalydetection","volume":"35","author":"ringberg","year":"2007","journal-title":"ACM SIGMETRICS Perform Eval Rev"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2009.5341079"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.pisc.2016.05.010"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2006.872343"},{"key":"ref19","article-title":"DARPA 2000 Scenario Specific dataset","year":"0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s20061701"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2785660"},{"key":"ref6","article-title":"Detection of DDOS Attack Based on BP Neural Network in SDN Environment","author":"wang","year":"0","journal-title":"Computer Application Research"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963077"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0217631"},{"key":"ref7","first-page":"205","article-title":"DDoS detection and analysis in SDN-based environment using support vector machine classifier","author":"kokila","year":"2015","journal-title":"Proc 6th Int Conf Advances Computing and Communication"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106984"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.250"},{"key":"ref20","first-page":"272","article-title":"Random Forests and Decision Trees","volume":"9","author":"ali","year":"2012","journal-title":"IJCSIS"}],"event":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","location":"Jeju, Korea (South)","start":{"date-parts":[[2020,10,21]]},"end":{"date-parts":[[2020,10,23]]}},"container-title":["2020 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9289075\/9289076\/09289504.pdf?arnumber=9289504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T20:26:27Z","timestamp":1656361587000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9289504\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,21]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ictc49870.2020.9289504","relation":{},"subject":[],"published":{"date-parts":[[2020,10,21]]}}}