{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T21:36:50Z","timestamp":1775079410658,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,3]]},"DOI":"10.1109\/imcom53663.2022.9721785","type":"proceedings-article","created":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T21:56:54Z","timestamp":1646085414000},"page":"1-8","source":"Crossref","is-referenced-by-count":16,"title":["Designing Ensemble Deep Learning Intrusion Detection System for DDoS attacks in Software Defined Networks"],"prefix":"10.1109","author":[{"given":"Uakomba","family":"Mbasuva","sequence":"first","affiliation":[{"name":"Namibia University of Science and Technology (NUST),Department of Computer Science,Windhoek,Namibia"}]},{"given":"Guy-Alain Lusilao","family":"Zodi","sequence":"additional","affiliation":[{"name":"Namibia University of Science and Technology (NUST),Department of Computer Science,Windhoek,Namibia"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ELECTRONICA.2019.8825601"},{"key":"ref11","article-title":"A comprehensive and effective mechanism for DDoS detection in SDN. International Conference on Wireless and Mobile Computing","author":"conti","year":"2017","journal-title":"Communication and Networking"},{"key":"ref12","first-page":"1284","article-title":"On the Impact of DDoS Attacks on Software-Defined Intemet-of-Vehicles Control Plane","author":"siddiqui","year":"2018","journal-title":"14th International Wireless Communications and Mobile Computing Conference IWCMC 2018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2976908"},{"key":"ref14","article-title":"Is Signature- and Rule-Based Intrusion Detection Sufficient","author":"gold","year":"2017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMITCon.2019.8862253"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2019.8697910"},{"key":"ref17","author":"tanner","year":"2018","journal-title":"Experimental research In Research Methods Information Systems and Contexts"},{"key":"ref18","author":"kuipers","year":"2014","journal-title":"Common Problems and Solutions in Experiments In Laboratory Experiments in the Social Sciences"},{"key":"ref19","first-page":"1","author":"bouckaert","year":"2018","journal-title":"WEKA Manual for Version 3-7-8"},{"key":"ref4","first-page":"915","article-title":"Suspicious Traffic Detection in SDN with Collaborative Techniques of Snort and Deep Neural Networks","author":"ujjan","year":"2019","journal-title":"Proceedings of 20th International Conference on High Performance Computing and Communications 16th International Conference on Smart City and 4th International Conference on Data Science and Systems HPCC\/SmartCity\/DSS 2018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2018.8404674"},{"key":"ref5","first-page":"1689","article-title":"Analyzing behavior of DDoS attacks to identify DDoS detection features in SDN","volume":"53","author":"neelam","year":"2017","journal-title":"2017 9th International Conference on Communication Systems and Networks (COMSNETS) Analyzing"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/UCET.2019.8881856"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2020.09.002"},{"key":"ref2","first-page":"2724","article-title":"A Review of Anomaly Detection Techniques and Distributed Denial of Service (DDoS) on Software Defined Network (SDN)","volume":"8","author":"hafizah","year":"2018","journal-title":"Technology and Applied Science Research"},{"key":"ref1","first-page":"630","article-title":"Flow based anomaly detection in software defined networking: A deep learning approach with feature selection method","author":"dey","year":"2020","journal-title":"4th International Conference on Electrical Engineering and Information and Communication Technology iCEEiCT 2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963077"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908225"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009849"}],"event":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","location":"Seoul, Korea, Republic of","start":{"date-parts":[[2022,1,3]]},"end":{"date-parts":[[2022,1,5]]}},"container-title":["2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9721625\/9721626\/09721785.pdf?arnumber=9721785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:10:30Z","timestamp":1655759430000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9721785\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,3]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/imcom53663.2022.9721785","relation":{},"subject":[],"published":{"date-parts":[[2022,1,3]]}}}