{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T08:15:33Z","timestamp":1764749733506,"version":"3.46.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,20]]},"DOI":"10.1109\/wimob66857.2025.11257478","type":"proceedings-article","created":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T18:45:02Z","timestamp":1764701102000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Improving Trust and Detecting Malicious Data Sharing in Sdn Data Plane Communications using Lightweight Deep Learning"],"prefix":"10.1109","author":[{"given":"Brahim","family":"Anegdouil","sequence":"first","affiliation":[{"name":"International University of Rabat,TICLAB,Morocco"}]},{"given":"Anass","family":"Sebbar","sequence":"additional","affiliation":[{"name":"International University of Rabat,TICLAB,Morocco"}]},{"given":"Othmane","family":"Cherqi","sequence":"additional","affiliation":[{"name":"International University of Rabat,TICLAB,Morocco"}]},{"given":"Mohammed","family":"Boulmalf","sequence":"additional","affiliation":[{"name":"International University of Rabat,TICLAB,Morocco"}]}],"member":"263","reference":[{"volume-title":"Software-defined networking","year":"2025","key":"ref1"},{"volume-title":"P4: Programming protocol-independent packet processors","year":"2020","key":"ref2"},{"issue":"3","key":"ref3","first-page":"1634","article-title":"LUCID: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection","volume":"17","author":"D\u2019hondt","year":"2020","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"ref4","article-title":"Deep Learning at the Edge","author":"Mohammadi","year":"2019","journal-title":"arXiv preprint arXiv"},{"key":"ref5","article-title":"A comprehensive survey on machine learning-based malicious url detection","author":"Osun","year":"2023","journal-title":"arXiv preprint arXiv"},{"key":"ref6","article-title":"Lightweight deep learning for embedded security: A survey","author":"Chen","year":"2024","journal-title":"arXiv preprint arXiv"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2474118"},{"key":"ref8","first-page":"109","article-title":"SDNsec: Forwarding Accountability for the SDN Data Plane","volume-title":"Proc. 2nd ACM SIGCOMM Workshop on Hot Topics in SDN (HotSDN)","author":"Basin","year":"2013"},{"issue":"1","key":"ref9","first-page":"584","article-title":"A Survey on the Security of Stateful SDN Data Planes","volume":"19","author":"Bifulco","year":"2017","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1995.9508080335"},{"key":"ref11","first-page":"402","article-title":"A Trust Management Framework for SDN Controllers and Apps","volume-title":"2016 IEEE NetSoft Conf. and Workshops (NetSoft)","author":"Aliyu","year":"2016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/s17061346"},{"journal-title":"arXiv preprint arXiv","article-title":"Edge-Cloud Collaborative Computing on Distributed Intelligence and Model Optimization: A Survey","year":"2025","key":"ref13"},{"article-title":"Lightweight explainable intrusion detection for edge networks","volume-title":"Proc. 2025 IEEE Global Communications Conference (GLOBECOM)","author":"Li","key":"ref14"},{"key":"ref15","article-title":"A taxonomy and benchmarking of malicious url detection techniques","author":"Johnson","year":"2023","journal-title":"arXiv preprint arXiv"},{"article-title":"Covert channels in software-defined networking: A covert timing channel study","volume-title":"Proc. 2020 IEEE International Conference on Network Protocols (ICNP)","author":"Xu","key":"ref16"},{"article-title":"Graph-based anomaly detection in sdn traffic using gnn","volume-title":"Proc. 2024 ACM Conference on Computer and Communications Security (CCS)","author":"Zhang","key":"ref17"},{"key":"ref18","article-title":"Unsupervised Network Anomaly Detection with Autoencoders and Traffic Images","author":"Marcuzzi","year":"2025","journal-title":"arXiv preprint arXiv"},{"issue":"4","key":"ref19","first-page":"4108","article-title":"P4ip-detection: A p4-programmable data plane approach for in-network attack detection","volume":"19","author":"Bendzr","year":"2022","journal-title":"IEEE Transactions on Network and Service Management"},{"article-title":"P4-onids: High-performance network monitoring and intrusion detection system using p4","volume-title":"Proceedings of a Conference","author":"Oliveira","key":"ref20"},{"key":"ref21","article-title":"P4-hldmc: Framework for ddos and arp attack detection in sd-iot networks","author":"Chen","year":"2023","journal-title":"MDPI Journal"},{"key":"ref22","article-title":"Intelligent in-network attack detection on programmable switches with soterv2","author":"Junior","year":"2025","journal-title":"IEEE Transactions on Quarterly"},{"key":"ref23","article-title":"Detecting and Mitigating DDoS Attacks with AI: A Survey","author":"Souza","year":"2025","journal-title":"arXiv preprint arXiv"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s23010490"},{"journal-title":"University of South Carolina Cyberinfrastructure Lab","article-title":"A Hands-on Tutorial on P4 Programmable Data Planes","year":"2020","key":"ref25"},{"key":"ref26","article-title":"Using the OpenDaylight SDN Controller with the Mininet Network Emulator","volume-title":"Brian Linkletter\u2019s Blog","author":"Linkletter","year":"2016"},{"volume-title":"Real-time controller","year":"2019","author":"Forum","key":"ref27"}],"event":{"name":"2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","start":{"date-parts":[[2025,10,20]]},"location":"Marrakesh, Morocco","end":{"date-parts":[[2025,10,22]]}},"container-title":["2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11253544\/11257435\/11257478.pdf?arnumber=11257478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T08:11:24Z","timestamp":1764749484000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11257478\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,20]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/wimob66857.2025.11257478","relation":{},"subject":[],"published":{"date-parts":[[2025,10,20]]}}}