{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:38:58Z","timestamp":1740101938146,"version":"3.37.3"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,23]]},"DOI":"10.1109\/saci58269.2023.10158584","type":"proceedings-article","created":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T17:26:49Z","timestamp":1687886809000},"page":"000623-000630","source":"Crossref","is-referenced-by-count":1,"title":["Detection of Attacks in Software-Defined Networks (SDN)* : *How to conduct attacks in SDN environments"],"prefix":"10.1109","author":[{"given":"Jean Rosemond","family":"Dora","sequence":"first","affiliation":[{"name":"Slovak Academy of Sciences (SAV),Dept. Institute of Informatics (UISAV),Bratislava,Slovakia"}]},{"given":"Ladislav","family":"Hluchy","sequence":"additional","affiliation":[{"name":"Slovak Academy of Sciences (SAV),Dept. Institute of Informatics (UISAV),Bratislava,Slovakia"}]}],"member":"263","reference":[{"journal-title":"(IJACSA)","article-title":"Analysis of Different Attacks on Software Defined Network and Approaches to Mitigate using Intelligent Techniques","author":"Karthika","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991081"},{"journal-title":"University of Bradford","article-title":"Design and Analysis of Anomaly Detection and Mitigation Schemes for Distributed Denial of Service Attacks in Software Defined Network","author":"Sangodoyin","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3564048"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CIST.2018.8596479"},{"first-page":"1","article-title":"Distributed Denial of Service Attack Alleviated and Detected by Using Mininet and Software Defined Network","author":"Ilyas","key":"ref6"},{"volume-title":"Cyber Attacks Detection and Mitigation in SDN Environments","author":"Alshamrani","key":"ref7"},{"volume-title":"Behavioral Study of Software-Defined Network Parameters Using Exploratory Data Analysis and Regression-Based Sensitivity Analysis","author":"Akinsolu","key":"ref8","doi-asserted-by":"crossref","DOI":"10.3390\/math10142536"},{"first-page":"1","volume-title":"Know Your Enemy: Stealth Configuration-Information Gathering in SDN","author":"Conti","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022633"},{"volume-title":"Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined Networks","author":"Yoon","key":"ref11"},{"volume-title":"Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity","author":"Dora","key":"ref12","doi-asserted-by":"crossref","DOI":"10.3390\/jcp1020018"}],"event":{"name":"2023 IEEE 17th International Symposium on Applied Computational Intelligence and Informatics (SACI)","start":{"date-parts":[[2023,5,23]]},"location":"Timisoara, Romania","end":{"date-parts":[[2023,5,26]]}},"container-title":["2023 IEEE 17th International Symposium on Applied Computational Intelligence and Informatics (SACI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10158523\/10158534\/10158584.pdf?arnumber=10158584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T22:23:12Z","timestamp":1710368592000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10158584\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,23]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/saci58269.2023.10158584","relation":{},"subject":[],"published":{"date-parts":[[2023,5,23]]}}}