{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T08:45:26Z","timestamp":1759826726653,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,4]],"date-time":"2020-12-04T00:00:00Z","timestamp":1607040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,4]]},"DOI":"10.1145\/3444370.3444612","type":"proceedings-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T06:33:27Z","timestamp":1609828407000},"page":"451-458","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["REAL-GUARD"],"prefix":"10.1145","author":[{"given":"Qi","family":"Liu","sequence":"first","affiliation":[{"name":"College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China and School of Information Engineering, Inner Mongolia University of Science &amp; Technology, Baotou, Inner Mongolia, China"}]},{"given":"Hongwei","family":"Ruan","sequence":"additional","affiliation":[{"name":"College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China"}]},{"given":"Hua","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China"}]},{"given":"Xiaodi","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China"}]},{"given":"Xianrong","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2618874"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2839348"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2748159"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568520"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620741"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23309"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241223"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241225"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3124680.3124720"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053039"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.42"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502793"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3022227.3022230"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"H. Ma. H. Ding. Y. Yang. Z. Mi. M. Zhang.: SDN-Based ARP Attack Detection for Cloud Centers. 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom) pp. 1049--1054. Beijing China (2015).  H. Ma. H. Ding. Y. Yang. Z. Mi. M. Zhang.: SDN-Based ARP Attack Detection for Cloud Centers. 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom) pp. 1049--1054. Beijing China (2015).","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.195"},{"volume":"13","volume-title":"IEEE Transactions on Information Forensics and Security","author":"Zheng","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"Collaborative Intrusion Detection for Software Defined Networks. ICC 2019--2019 IEEE International Conference on Communications (ICC)","author":"Zhou","year":"2019"},{"key":"e_1_3_2_1_18_1","first-page":"1","volume-title":"Security & Communication Networks","author":"Yadong Z.","year":"2018"},{"issue":"1","key":"e_1_3_2_1_19_1","first-page":"171","volume":"56","author":"Hyun S.","year":"2018","journal-title":"Network Security Functions for Cloud-Based Security Services. IEEE Communications Magazine"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3040992.3041005"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2018.8460090"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC.2017.8282551"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.27"},{"volume-title":"The Design and Implementation of SECaaS with Data-Driven Method. MA","year":"2019","author":"Qi Liu","key":"e_1_3_2_1_25_1"}],"event":{"name":"CIAT 2020: 2020 International Conference on Cyberspace Innovation of Advanced Technologies","sponsor":["Sun Yat-Sen University","CARLETON UNIVERSITY INSTITUTE FOR INTERDISCIPLINARY STUDIES","Beijing University of Posts and Telecommunications","Guangdong University of Technology Guangdong University of Technology","Deakin University"],"location":"Guangzhou China","acronym":"CIAT 2020"},"container-title":["Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3444370.3444612","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3444370.3444612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:44Z","timestamp":1750193264000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3444370.3444612"}},"subtitle":["A Machine Learning based Real-time Mechanism for Combining Packet and Flow Features to Mitigating Network Attacks in SDN"],"short-title":[],"issued":{"date-parts":[[2020,12,4]]},"references-count":25,"alternative-id":["10.1145\/3444370.3444612","10.1145\/3444370"],"URL":"https:\/\/doi.org\/10.1145\/3444370.3444612","relation":{},"subject":[],"published":{"date-parts":[[2020,12,4]]},"assertion":[{"value":"2021-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}