{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T05:27:37Z","timestamp":1744954057931,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,18]]},"DOI":"10.1109\/ijcnn52387.2021.9534424","type":"proceedings-article","created":{"date-parts":[[2021,9,21]],"date-time":"2021-09-21T20:40:52Z","timestamp":1632256852000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Network-Aware SDN Load Balancer with Deep Active Learning based Intrusion Detection Model"],"prefix":"10.1109","author":[{"given":"Usman","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Jerry Chun-Wei","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSITSS.2018.8768754"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.3390\/electronics9071091","article-title":"Intelligent load balancing techniques in software defined networks: A survey","volume":"9","author":"semong","year":"2020","journal-title":"Electronics"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CANDAR.2014.108"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2017.8094139"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-7262-5_48"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCT.2017.8117881"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2752-6_14"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5606"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-020-9487-4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2018.8494096"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2018.8543099"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3875"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.112"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/fi11030075"},{"key":"ref8","first-page":"17","article-title":"Elasticon; an elastic distributed sdn controller","author":"dixit","year":"0","journal-title":"ACM\/IEEE Symposium on Architectures for Networking and Communications Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2012.6664282"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.2989871"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2016.7737283"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1166"},{"key":"ref22","volume":"1","author":"geron","year":"2019","journal-title":"Hands-On Machine Learning with Scikit-Learn Keras and TensorFlow Concepts Tools and Techniques to Build Intelligent Systems"},{"key":"ref21","first-page":"5998","article-title":"Attention is all you need","author":"vaswani","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/s00500-014-1511-6","article-title":"Evaluation of machine learning classifiers for mobile malware detection","volume":"20","author":"narudin","year":"2020","journal-title":"Soft Computing"}],"event":{"name":"2021 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2021,7,18]]},"location":"Shenzhen, China","end":{"date-parts":[[2021,7,22]]}},"container-title":["2021 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9533266\/9533267\/09534424.pdf?arnumber=9534424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:46:10Z","timestamp":1652197570000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9534424\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,18]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ijcnn52387.2021.9534424","relation":{},"subject":[],"published":{"date-parts":[[2021,7,18]]}}}