{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T19:09:34Z","timestamp":1772046574721,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/wimob.2018.8589104","type":"proceedings-article","created":{"date-parts":[[2018,12,27]],"date-time":"2018-12-27T18:05:41Z","timestamp":1545933941000},"page":"1-8","source":"Crossref","is-referenced-by-count":39,"title":["A New Machine Learning-based Collaborative DDoS Mitigation Mechanism in Software-Defined Network"],"prefix":"10.1109","author":[{"given":"Saif Saad","family":"Mohammed","sequence":"first","affiliation":[]},{"given":"Rasheed","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Oleg","family":"Senko","sequence":"additional","affiliation":[]},{"given":"Bagdat","family":"Bimaganbetov","sequence":"additional","affiliation":[]},{"given":"JooYoung","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Fatima","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Chaker Abdelaziz","family":"Kerrache","sequence":"additional","affiliation":[]},{"given":"Ezedin","family":"Barka","sequence":"additional","affiliation":[]},{"given":"Md Zakirul","family":"Alam Bhuiyan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254079"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2805600"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WMNC.2017.8248858"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126031"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732445"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NSEC.2014.6998241"},{"key":"ref16","article-title":"Ryu official site","year":"0"},{"key":"ref17","article-title":"Pox manual","year":"0"},{"key":"ref18","article-title":"Onos official site","year":"0"},{"key":"ref19","article-title":"Opendaylight official site","year":"0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899576"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2491300"},{"key":"ref6","article-title":"World&#x2019;s largest 1 tbps ddos attack launched from 152,000 hacked smart devices","author":"khandelwal","year":"2016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3132062.3132074"},{"key":"ref8","article-title":"5 biggest ddos attacks of the past decade","author":"knecht","year":"2017"},{"key":"ref7","article-title":"Dyn analysis summary of friday october 21 attack","author":"hilton","year":"2016"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2017.8115796"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.jnca.2017.10.003","article-title":"A survey: Hybrid sdn","volume":"100","author":"sandhya","year":"2017","journal-title":"Journal of Network and Computer Applications"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NetSys.2017.7903962"},{"key":"ref20","article-title":"Nsl-kdd dataset","year":"2015"},{"key":"ref21","article-title":"A study on nsl-kdd dataset for intrusion detection system based on classification algorithms","author":"dhanabal","year":"2015","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"}],"event":{"name":"2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","location":"Limassol","start":{"date-parts":[[2018,10,15]]},"end":{"date-parts":[[2018,10,17]]}},"container-title":["2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8540803\/8589078\/08589104.pdf?arnumber=8589104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T09:21:20Z","timestamp":1643275280000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8589104\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/wimob.2018.8589104","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}