{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:38:14Z","timestamp":1774539494551,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/netsoft.2018.8460090","type":"proceedings-article","created":{"date-parts":[[2018,9,13]],"date-time":"2018-09-13T17:43:41Z","timestamp":1536860621000},"page":"202-206","source":"Crossref","is-referenced-by-count":236,"title":["Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks"],"prefix":"10.1109","author":[{"given":"Tuan A","family":"Tang","sequence":"first","affiliation":[]},{"given":"Lotfi","family":"Mhamdi","sequence":"additional","affiliation":[]},{"given":"Des","family":"McLernon","sequence":"additional","affiliation":[]},{"given":"Syed Ali Raza","family":"Zaidi","sequence":"additional","affiliation":[]},{"given":"Mounir","family":"Ghogho","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.20532\/cit.2016.1002701"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-642-23644-0_9","article-title":"Revisiting traffic anomaly detection using software defined networking","author":"mehdi","year":"2011","journal-title":"International Workshop on Recent Advances in Intrusion Detection"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICoAC.2014.7229711"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CCE.2016.7562606"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.jnca.2016.12.024","article-title":"Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach","volume":"80","author":"aleroud","year":"2017","journal-title":"Journal of Network and Computer Applications"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"ref17","author":"niyaz","year":"2016","journal-title":"A deep learning based ddos detection system in software-defined networking (sdn)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"ref19","author":"hochreiter","year":"2001","journal-title":"Gradient Flow in Recurrent Nets The Difficulty of Learning Long-term Dependencies"},{"key":"ref28","year":"0","journal-title":"Cbench"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref27","year":"0","journal-title":"POX"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2453114"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-016-0546-3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2650206"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.008"},{"key":"ref1","year":"0","journal-title":"Software-Defined Networking Definition"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref22","author":"chung","year":"2014","journal-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"ref24","author":"chollet","year":"2015","journal-title":"Keras"},{"key":"ref23","article-title":"A detailed analysis of the kdd cup 99 data set","author":"tavallaee","year":"2009","journal-title":"Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications"},{"key":"ref26","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref25","author":"dozat","year":"2016","journal-title":"Incorporating nesterov momentum into adam"}],"event":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","location":"Montreal, QC","start":{"date-parts":[[2018,6,25]]},"end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8429968\/8458492\/08460090.pdf?arnumber=8460090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T07:01:41Z","timestamp":1643180501000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8460090\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/netsoft.2018.8460090","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}