{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T06:57:36Z","timestamp":1770965856978,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/iscit.2019.8905209","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T14:23:42Z","timestamp":1574691822000},"page":"300-305","source":"Crossref","is-referenced-by-count":8,"title":["Effective Detection and Mitigation of SYN Flooding Attack in SDN"],"prefix":"10.1109","author":[{"given":"Nan Haymarn","family":"Oo","sequence":"first","affiliation":[{"name":"University of Computer Studies,Faculty of Computer Systems and Technologies,Yangon,Myanmar"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aung","family":"Htein Maw","sequence":"additional","affiliation":[{"name":"University of Computer Studies,Faculty of Computer Systems and Technologies,Yangon,Myanmar"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2014.6778942"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.26555\/ijain.v4i1.138"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2017.8115796"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2017.8169838"},{"key":"ref15","year":"2014","journal-title":"SFlow-RT"},{"key":"ref16","year":"2013","journal-title":"Software defined analytics"},{"key":"ref17","year":"0","journal-title":"ONOS"},{"key":"ref18","year":"0","journal-title":"Mininet"},{"key":"ref19","year":"0","journal-title":"Gnu wget 1 18 manual"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2701549"},{"key":"ref3","article-title":"Principles and practices for securing software-defined networks version 1.0","year":"2015","journal-title":"January"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378372"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2414-5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.389"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.10.014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEng.2017.31"},{"key":"ref1","first-page":"2","article-title":"Software-defined networking: The new norm for networks","volume":"2","year":"2012","journal-title":"ONF White Paper"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_9"},{"key":"ref20","year":"0","journal-title":"tcpdump"},{"key":"ref21","year":"0","journal-title":"Hping3 Security Tool"}],"event":{"name":"2019 19th International Symposium on Communications and Information Technologies (ISCIT)","location":"Ho Chi Minh City, Vietnam","start":{"date-parts":[[2019,9,25]]},"end":{"date-parts":[[2019,9,27]]}},"container-title":["2019 19th International Symposium on Communications and Information Technologies (ISCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8896981\/8905110\/08905209.pdf?arnumber=8905209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:42:12Z","timestamp":1755909732000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8905209\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iscit.2019.8905209","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}