{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:24:58Z","timestamp":1771705498044,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/nfv-sdn.2016.7919493","type":"proceedings-article","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T17:04:03Z","timestamp":1494608643000},"page":"167-172","source":"Crossref","is-referenced-by-count":120,"title":["Predicting network attack patterns in SDN using machine learning approach"],"prefix":"10.1109","author":[{"given":"Saurav","family":"Nanda","sequence":"first","affiliation":[]},{"given":"Faheem","family":"Zafari","sequence":"additional","affiliation":[]},{"given":"Casimer","family":"DeCusatis","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Wedaa","sequence":"additional","affiliation":[]},{"given":"Baijian","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"sommer","year":"2014","journal-title":"Anomaly Detection in the SDN Control Plane"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461195"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.144"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2011.6121762"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.11.051"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0034-4257(97)00049-7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.03.021"},{"key":"ref18","first-page":"101","article-title":"Comparing bayesian network classifiers","author":"cheng","year":"1999","journal-title":"Proceedings of the Fifteenth Conference on Uncertainty in Artificial Intelligence"},{"key":"ref19","volume":"210","author":"jensen","year":"1996","journal-title":"An Introduction to Bayesian Networks"},{"key":"ref28","year":"0","journal-title":"Long Tail Log Analysis Dashboard"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2491700"},{"key":"ref27","year":"0","journal-title":"Machine Learning Group University of Waikato"},{"key":"ref3","author":"abdou","year":"0","journal-title":"What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2421391"},{"key":"ref5","year":"0","journal-title":"LongTail Log Analysis"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2326417"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/NSEC.2014.6998241"},{"key":"ref9","author":"abdou","year":"0","journal-title":"What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks"},{"key":"ref1","author":"eskca","year":"0","journal-title":"Software Defined Networks Security An Analysis of Issues and Solutions"},{"key":"ref20","first-page":"439","article-title":"Research on choice of travel mode model based on naive bayesian method","volume":"2","author":"wu","year":"2011","journal-title":"Business Management and Electronic Information (BMEI) 2011 InternationalConference on"},{"key":"ref22","author":"mitchell","year":"0","journal-title":"Journal of Machine Learning 2003"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2003.1250241"},{"key":"ref24","author":"witten","year":"2005","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(87)80076-7"},{"key":"ref26","author":"kotsiantis","year":"2007","journal-title":"Supervised machine learning A review of classification techniques"},{"key":"ref25","first-page":"174","article-title":"The power of decision tables","author":"kohavi","year":"1995","journal-title":"Machine Learning Ecml-95"}],"event":{"name":"2016 IEEE Conference on Network Function Virtualization and Software-Defined Networks (NFV-SDN)","location":"Palo Alto, CA","start":{"date-parts":[[2016,11,7]]},"end":{"date-parts":[[2016,11,10]]}},"container-title":["2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7893447\/7919460\/07919493.pdf?arnumber=7919493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T21:32:12Z","timestamp":1506979932000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7919493\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/nfv-sdn.2016.7919493","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}