{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T17:05:26Z","timestamp":1770743126160,"version":"3.49.0"},"reference-count":140,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T00:00:00Z","timestamp":1757376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Software-defined networking (SDN) is a transformative approach for managing modern network architectures, particularly in Internet-of-Things (IoT) applications. However, ensuring the optimal SDN performance and security often needs a robust sensitivity analysis (SA). To complement existing SA methods, this study proposes a new SA framework that integrates design of experiments (DOE) and machine-learning (ML) techniques. Although existing SA methods have been shown to be effective and scalable, most of these methods have yet to hybridize anomaly detection and classification (ADC) and data augmentation into a single, unified framework. To fill this gap, a targeted application of well-established existing techniques is proposed. This is achieved by hybridizing these existing techniques to undertake a more robust SA of a typified SDN-reliant IoT network. The proposed hybrid framework combines Latin hypercube sampling (LHS)-based DOE and generative adversarial network (GAN)-driven data augmentation to improve SA and support ADC in SDN-reliant IoT networks. Hence, it is called DOE-GAN-SA. In DOE-GAN-SA, LHS is used to ensure uniform parameter sampling, while GAN is used to generate synthetic data to augment data derived from typified real-world SDN-reliant IoT network scenarios. DOE-GAN-SA also employs a classification and regression tree (CART) to validate the GAN-generated synthetic dataset. Through the proposed framework, ADC is implemented, and an artificial neural network (ANN)-driven SA on an SDN-reliant IoT network is carried out. The performance of the SDN-reliant IoT network is analyzed under two conditions: namely, a normal operating scenario and a distributed-denial-of-service (DDoS) flooding attack scenario, using throughput, jitter, and response time as performance metrics. To statistically validate the experimental findings, hypothesis tests are conducted to confirm the significance of all the inferences. The results demonstrate that integrating LHS and GAN significantly enhances SA, enabling the identification of critical SDN parameters affecting the modeled SDN-reliant IoT network performance. Additionally, ADC is also better supported, achieving higher DDoS flooding attack detection accuracy through the incorporation of synthetic network observations that emulate real-time traffic. Overall, this work highlights the potential of hybridizing LHS-based DOE, GAN-driven data augmentation, and ANN-assisted SA for robust network behavioral analysis and characterization in a new hybrid framework.<\/jats:p>","DOI":"10.3390\/info16090783","type":"journal-article","created":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T09:32:01Z","timestamp":1757496721000},"page":"783","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Hybrid Framework for the Sensitivity Analysis of Software-Defined Networking Performance Metrics Using Design of Experiments and Machine Learning Techniques"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-0377-7565","authenticated-orcid":false,"given":"Chekwube","family":"Ezechi","sequence":"first","affiliation":[{"name":"Faculty of Natural and Applied Sciences, Lead City University, Ibadan 200255, Oyo State, Nigeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1164-5501","authenticated-orcid":false,"given":"Mobayode O.","family":"Akinsolu","sequence":"additional","affiliation":[{"name":"Faculty of Natural and Applied Sciences, Lead City University, Ibadan 200255, Oyo State, Nigeria"},{"name":"Faculty of Arts, Computing, and Engineering, Wrexham University, Wrexham LL11 2AW, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2429-8924","authenticated-orcid":false,"given":"Wilson","family":"Sakpere","sequence":"additional","affiliation":[{"name":"Faculty of Natural and Applied Sciences, Lead City University, Ibadan 200255, Oyo State, Nigeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7346-4701","authenticated-orcid":false,"given":"Abimbola O.","family":"Sangodoyin","sequence":"additional","affiliation":[{"name":"Faculty of Natural and Applied Sciences, Lead City University, Ibadan 200255, Oyo State, Nigeria"},{"name":"School of Engineering and Physical Sciences, University of Lincoln, Lincoln LN6 7TS, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7627-7581","authenticated-orcid":false,"given":"Uyoata E.","family":"Uyoata","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronics Engineering, Modibbo Adama University, Yola 640231, Adamawa State, Nigeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8977-937X","authenticated-orcid":false,"given":"Isaac","family":"Owusu-Nyarko","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, Regional Maritime University, Accra P.O. GP 1115, Ghana"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6782-9820","authenticated-orcid":false,"given":"Folahanmi T.","family":"Akinsolu","sequence":"additional","affiliation":[{"name":"Faculty of Natural and Applied Sciences, Lead City University, Ibadan 200255, Oyo State, Nigeria"}]}],"member":"1968","published-online":{"date-parts":[[2025,9,9]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/MCE.2018.2851738","article-title":"Secure Computing for the Internet of Things and Network Edges: Protecting Communication in the Worldwide Network of Devices","volume":"7","author":"Puthal","year":"2018","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_2","first-page":"450","article-title":"A Reliable Communication Framework and its Use in Internet of Things (IoT)","volume":"3","author":"Alam","year":"2018","journal-title":"EngRN Commun. Syst. (Topic)"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1016\/j.comnet.2014.10.015","article-title":"Software-Defined Networking: Challenges and research opportunities for Future Internet","volume":"75","author":"Hakiri","year":"2014","journal-title":"Comput. Netw."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","article-title":"Software-Defined Networking: A Comprehensive Survey","volume":"103","author":"Kreutz","year":"2014","journal-title":"Proc. IEEE"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MCOM.2015.7263373","article-title":"Software-defined internet of things for smart urban sensing","volume":"53","author":"Liu","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/s11042-023-15678-2","article-title":"SDN-based multi-level framework for smart home services","volume":"83","author":"Gilani","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"e5296","DOI":"10.1002\/dac.5296","article-title":"A comprehensive survey on software-defined networking for smart communities","volume":"38","author":"Chaudhary","year":"2025","journal-title":"Int. J. Commun. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Qin, Z., Denker, G., Giannelli, C., Bellavista, P., and Venkatasubramanian, N. (2014, January 5\u20139). A software defined networking architecture for the internet-of-things. Proceedings of the 2014 IEEE Network Operations and Management Symposium (NOMS), Krakow, Poland.","DOI":"10.1109\/NOMS.2014.6838365"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Sarica, A., and Angin, P. (2020). Explainable security in SDN-based IoT networks. Sensors, 20.","DOI":"10.3390\/s20247326"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Ezechi, C., Akinsolu, M.O., Sangodoyin, A.O., Akinsolu, F.T., and Sakpere, W. (2024). Software-defined networking in cyber-physical systems. Cyber Physical System 2.0: Communication and Computational Technologies, CRC Press.","DOI":"10.1201\/9781003559993-3"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Doorgakant, B., Fowdur, T.P., and Akinsolu, M.O. (2025). End-to-End Power Models for 5G Radio Access Network Architectures with a Perspective on 6G. Mathematics, 13.","DOI":"10.3390\/math13030466"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Sangodoyin, A., Sigwele, T., Pillai, P., Hu, Y., Awan, I., and Pagna Diss, J. (2018). DoS Attack Impact Assessment on Software Defined Networks. Wireless and Satellite Systems, Springer.","DOI":"10.1007\/978-3-319-76571-6_2"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MCOM.2013.6553676","article-title":"Are We Ready for SDN? Implementation Challenges for Software-Defined Networks","volume":"51","author":"Sezer","year":"2013","journal-title":"Commun. Mag. IEEE"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Kreutz, D., Ramos, F., and Ver\u00edssimo, P. (2013, January 16). Towards secure and dependable software-defined networks. Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, Hong Kong, China.","DOI":"10.1145\/2491185.2491199"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Bhattacharyya, D.K., and Kalita, J. (2016). DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance, CRC Press, Taylor & Francis Group.","DOI":"10.1201\/b20614"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"66641","DOI":"10.1109\/ACCESS.2018.2877710","article-title":"Understanding Internet DDoS Mitigation from Academic and Industrial Perspectives","volume":"6","author":"Cao","year":"2018","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"3554","DOI":"10.1109\/TIFS.2021.3082290","article-title":"Botnet Identification in DDoS Attacks With Multiple Emulation Dictionaries","volume":"16","author":"Cirillo","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"120331","DOI":"10.1109\/ACCESS.2020.3006358","article-title":"Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review","volume":"8","author":"Liao","year":"2020","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"106634","DOI":"10.1016\/j.compeleceng.2020.106634","article-title":"A Distributed Software Defined Networking Model to Improve the Scalability and Quality of Services for Flexible Green Energy Internet for Smart Grid Systems","volume":"84","author":"Qureshi","year":"2020","journal-title":"Comput. Electr. Eng."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1331","DOI":"10.1016\/j.ress.2005.11.031","article-title":"Calibration, validation, and sensitivity analysis: What\u2019s what","volume":"91","author":"Trucano","year":"2006","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Iooss, B., and Lema\u00eetre, P. (2015). A review on global sensitivity analysis methods. Uncertainty Management in Simulation-Optimization of Complex Systems: Algorithms and Applications, Springer.","DOI":"10.1007\/978-1-4899-7547-8_5"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"189","DOI":"10.13182\/04-54CR","article-title":"A comparative review of sensitivity and uncertainty analysis of large-scale systems\u2014I: Deterministic methods","volume":"147","author":"Cacuci","year":"2004","journal-title":"Nucl. Sci. Eng."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"204","DOI":"10.13182\/04-54CR","article-title":"A comparative review of sensitivity and uncertainty analysis of large-scale systems\u2014II: Statistical methods","volume":"147","author":"Cacuci","year":"2004","journal-title":"Nucl. Sci. Eng."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Saltelli, A. (2008). Global Sensitivity Analysis: The Primer, John Wiley & Sons.","DOI":"10.1002\/9780470725184"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Santner, T.J., Williams, B.J., Notz, W.I., and Williams, B.J. (2003). The Design and Analysis of Computer Experiments, Springer.","DOI":"10.1007\/978-1-4757-3799-8"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Ezechi, C., Akinsolu, M.O., Sakpere, W., Sangodoyin, A.O., and Akinsolu, F.T. (2024, January 20\u201322). Artificial Intelligence-Driven Sensitivity Analysis: Present-Day Approaches in Software-Defined Networking. Proceedings of the 2024 5th International Conference on Emerging Trends in Electrical, Electronic and Communications Engineering (ELECOM), Balaclava, Mauritius.","DOI":"10.1109\/ELECOM63163.2024.10892185"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Qin, C., Jin, Y., Tian, M., Ju, P., and Zhou, S. (2023). Comparative Study of Global Sensitivity Analysis and Local Sensitivity Analysis in Power System Parameter Identification. Energies, 16.","DOI":"10.3390\/en16165915"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1189","DOI":"10.1214\/aos\/1013203451","article-title":"Greedy function approximation: A gradient boosting machine","volume":"29","author":"Friedman","year":"2001","journal-title":"Ann. Stat."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/TNN.2004.836233","article-title":"Smooth function approximation using neural networks","volume":"16","author":"Ferrari","year":"2005","journal-title":"IEEE Trans. Neural Netw."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"102099","DOI":"10.1016\/j.simpat.2020.102099","article-title":"A deductive approach for the sensitivity analysis of software defined network parameters","volume":"103","author":"Sangodoyin","year":"2020","journal-title":"Simul. Model. Pract. Theory"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Williams, C.K., and Rasmussen, C.E. (2006). Gaussian Processes for Machine Learning, MIT Press.","DOI":"10.7551\/mitpress\/3206.001.0001"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"074502","DOI":"10.1115\/1.4050246","article-title":"Scalable fully Bayesian Gaussian process modeling and calibration with adaptive sequential Monte Carlo for industrial applications","volume":"143","author":"Pandita","year":"2021","journal-title":"J. Mech. Des."},{"key":"ref_33","unstructured":"Tukan, M., Zhou, S., Maalouf, A., Rus, D., Braverman, V., and Feldman, D. (2023, January 23\u201329). Provable data subset selection for efficient neural networks training. Proceedings of the International Conference on Machine Learning, PMLR, Honolulu, HI, USA."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"132644","DOI":"10.1109\/ACCESS.2022.3230908","article-title":"Network Traffic Modeling and Prediction Using Graph Gaussian Processes","volume":"10","author":"Mehrizi","year":"2022","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ress.2017.01.021","article-title":"Accelerated Monte Carlo system reliability analysis through machine-learning-based surrogate models of network connectivity","volume":"164","author":"Stern","year":"2017","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1137","DOI":"10.1016\/j.procs.2025.03.299","article-title":"SDN Intrusion Detection using Meta-Heuristic Optimization and K-Nearest Neighbors Classifier","volume":"260","author":"More","year":"2025","journal-title":"Procedia Comput. Sci."},{"key":"ref_37","unstructured":"Glushkovsky, A. (2021). Designing Complex Experiments by Applying Unsupervised Machine Learning. arXiv."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.jnca.2018.08.005","article-title":"Modelling software-defined networking: Software and hardware switches","volume":"122","author":"Singh","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Akinsolu, M., Sangodoyin, A., and Uyoata, U. (2022). Behavioral Study of Software-Defined Network Parameters Using Exploratory Data Analysis and Regression-Based Sensitivity Analysis. Mathematics, 10.","DOI":"10.3390\/math10142536"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/j.jss.2017.05.125","article-title":"Quality of service approaches in IoT: A systematic mapping","volume":"132","author":"White","year":"2017","journal-title":"J. Syst. Softw."},{"key":"ref_41","unstructured":"Montgomery, D.C. (2017). Design and Analysis of Experiments, John Wiley & Sons."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"101323","DOI":"10.1016\/j.iot.2024.101323","article-title":"Improving quality of service for Internet of Things (IoT) in real life application: A novel adaptation based Hybrid Evolutionary Algorithm","volume":"27","author":"Singh","year":"2024","journal-title":"Internet Things"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1186\/s40537-023-00805-5","article-title":"Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: A systematic review","volume":"10","author":"Ali","year":"2023","journal-title":"J. Big Data"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1080\/00401706.1987.10488205","article-title":"Large sample properties of simulations using Latin hypercube sampling","volume":"29","author":"Stein","year":"1987","journal-title":"Technometrics"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.compchemeng.2017.05.010","article-title":"Design of computer experiments: A review","volume":"106","author":"Garud","year":"2017","journal-title":"Comput. Chem. Eng."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/TETCI.2018.2864747","article-title":"A parallel surrogate model assisted evolutionary algorithm for electromagnetic design optimization","volume":"3","author":"Akinsolu","year":"2019","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Borisut, P., and Nuchitprasittichai, A. (2023). Adaptive Latin Hypercube Sampling for a Surrogate-Based Optimization with Artificial Neural Network. Processes, 11.","DOI":"10.3390\/pr11113232"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"667","DOI":"10.3390\/ai5020035","article-title":"Generative Adversarial Networks for Synthetic Data Generation in Finance: Evaluating Statistical Similarities and Quality Assessment","volume":"5","author":"Ramzan","year":"2024","journal-title":"AI"},{"key":"ref_49","unstructured":"Goodfellow, I.J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A.C., and Bengio, Y. (2014, January 8\u201313). Generative Adversarial Nets. Proceedings of the Neural Information Processing Systems, Montreal, QC, Canada."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1109\/JAS.2017.7510583","article-title":"Generative adversarial networks: Introduction and outlook","volume":"4","author":"Wang","year":"2017","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"9771","DOI":"10.1007\/s10462-023-10395-6","article-title":"Games of GANs: Game-theoretical models for generative adversarial networks","volume":"56","author":"Boroomand","year":"2023","journal-title":"Artif. Intell. Rev."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"161003","DOI":"10.1109\/ACCESS.2021.3131949","article-title":"Applications of generative adversarial networks in anomaly detection: A systematic literature review","volume":"9","author":"Sabuhi","year":"2021","journal-title":"IEEE Access"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"108149","DOI":"10.1016\/j.comnet.2021.108149","article-title":"Generative Adversarial Networks (GANs) in networking: A comprehensive survey & evaluation","volume":"194","author":"Navidan","year":"2021","journal-title":"Comput. Netw."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.1109\/TNET.2023.3319499","article-title":"A Self-Adaptive Robustness Optimization Method With Evolutionary Multi-Agent for IoT Topology","volume":"32","author":"Qiu","year":"2024","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_55","unstructured":"Shin, S.Y., Nejati, S., Sabetzadeh, M., Briand, L.C., Arora, C., and Zimmer, F. (July, January 29). Dynamic adaptation of software-defined networks for IoT systems: A search-based approach. Proceedings of the IEEE\/ACM 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Seoul, Republic of Korea."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"5591","DOI":"10.1109\/ACCESS.2016.2607786","article-title":"SDN and virtualization solutions for the Internet of Things: A survey","volume":"4","author":"Bizanis","year":"2016","journal-title":"IEEE Access"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Biswas, A., Md Abdullah Al, N., Imran, A., Sejuty, A.T., Fairooz, F., Puppala, S., and Talukder, S. (2023). Generative adversarial networks for data augmentation. Data Driven Approaches on Medical Imaging, Springer.","DOI":"10.1007\/978-3-031-47772-0_8"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.cose.2018.12.012","article-title":"Flow-based network traffic generation using generative adversarial networks","volume":"82","author":"Ring","year":"2019","journal-title":"Comput. Secur."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"83607","DOI":"10.1109\/ACCESS.2025.3569389","article-title":"Enhancing Internet Traffic Forecasting in MEC Environments With 5GT-Trans: Leveraging Synthetic Data and Transformer-Based Models","volume":"13","author":"Shukla","year":"2025","journal-title":"IEEE Access"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3657294","article-title":"GANs in the Panorama of Synthetic Data Generation Methods","volume":"21","author":"Vaz","year":"2024","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Fox, J., \u00d6kten, G., and Uzuno\u011flu, B. (2019, January 20\u201322). Global Sensitivity Analysis for Power Systems via Quasi-Monte Carlo Methods. Proceedings of the 2019 4th International Conference on System Reliability and Safety (ICSRS), Rome, Italy.","DOI":"10.1109\/ICSRS48664.2019.8987666"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"e1539","DOI":"10.1002\/wics.1539","article-title":"Modern Monte Carlo methods for efficient uncertainty quantification and propagation: A survey","volume":"13","author":"Zhang","year":"2021","journal-title":"Wiley Interdiscip. Rev. Comput. Stat."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"7946","DOI":"10.1109\/JIOT.2019.2907245","article-title":"High-Reliability and Low-Latency Wireless Communication for Internet of Things: Challenges, Fundamentals, and Enabling Technologies","volume":"6","author":"Ma","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/S0378-4754(00)00270-6","article-title":"Global sensitivity indices for nonlinear mathematical models and their Monte Carlo estimates","volume":"55","author":"Sobol","year":"2001","journal-title":"Math. Comput. Simul."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1016\/j.envsoft.2017.02.001","article-title":"Comparison of variance-based and moment-independent global sensitivity analysis approaches by application to the SWAT model","volume":"91","author":"Zadeh","year":"2017","journal-title":"Environ. Model. Softw."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"107300","DOI":"10.1016\/j.ress.2020.107300","article-title":"Variance-based sensitivity analysis: The quest for better estimators and designs between explorativity and economy","volume":"206","author":"Piano","year":"2021","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Phromphan, P., Suvisuthikasame, J., Kaewmongkol, M., Chanpichitwanich, W., and Sleesongsom, S. (2024). A New Latin Hypercube Sampling with Maximum Diversity Factor for Reliability-Based Design Optimization of HLM. Symmetry, 16.","DOI":"10.3390\/sym16070901"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"10694","DOI":"10.1109\/TMC.2024.3364655","article-title":"5GT-GAN-NET: Internet Traffic Data Forecasting With Supervised Loss Based Synthetic Data Over 5G","volume":"23","author":"Pandey","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Goyal, M., and Mahmoud, Q.H. (2024). A Systematic Review of Synthetic Data Generation Techniques Using Generative AI. Electronics, 13.","DOI":"10.3390\/electronics13173509"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Figueira, A., and Vaz, B. (2022). Survey on synthetic data generation, evaluation methods and GANs. Mathematics, 10.","DOI":"10.3390\/math10152733"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"122495","DOI":"10.1109\/ACCESS.2021.3109490","article-title":"Detection and Classification of DDoS Flooding Attacks on Software-Defined Networks: A Case Study for the Application of Machine Learning","volume":"9","author":"Sangodoyin","year":"2021","journal-title":"IEEE Access"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"100289","DOI":"10.1016\/j.iot.2020.100289","article-title":"A survey on the architecture, application, and security of software defined networking: Challenges and open issues","volume":"12","author":"Nisar","year":"2020","journal-title":"Internet Things"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"13129","DOI":"10.1007\/s10586-024-04596-z","article-title":"A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks","volume":"27","author":"Jain","year":"2024","journal-title":"Cluster Computing"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1109\/JSAC.2016.2525418","article-title":"Internet of Things in the 5G Era: Enablers, Architecture, and Business Models","volume":"34","author":"Palattella","year":"2016","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/ACCESS.2021.3137341","article-title":"Wireless sensor network as a mesh: Vision and challenges","volume":"10","author":"Nurlan","year":"2021","journal-title":"IEEE Access"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Neilson, B., and Rossiter, N. (2022). Automating Labour and the Spatial Politics of Data Centre Technologies. Topologies of Digital Work: How Digitalisation and Virtualisation Shape Working Spaces and Places, Springer.","DOI":"10.1007\/978-3-030-80327-8_4"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"1802","DOI":"10.1016\/j.jpdc.2013.09.002","article-title":"A new proposal to deal with congestion in InfiniBand-based fat-trees","volume":"74","author":"Garcia","year":"2014","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Lu, P.J., Lai, M.C., and Chang, J.S. (2022). A survey of high-performance interconnection networks in high-performance computer systems. Electronics, 11.","DOI":"10.3390\/electronics11091369"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Lombardi, M., Pascale, F., and Santaniello, D. (2021). Internet of things: A general overview between architectures, protocols and applications. Information, 12.","DOI":"10.3390\/info12020087"},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.iot.2018.09.005","article-title":"The internet of things, fog and cloud continuum: Integration and challenges","volume":"3","author":"Bittencourt","year":"2018","journal-title":"Internet Things"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Burhan, M., Rehman, R.A., Khan, B., and Kim, B.S. (2018). IoT elements, layered architectures and security issues: A comprehensive survey. Sensors, 18.","DOI":"10.3390\/s18092796"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"3069","DOI":"10.1109\/ACCESS.2017.2671030","article-title":"From Theory to Experimental Evaluation: Resource Management in Software-Defined Vehicular Networks","volume":"5","author":"Campolo","year":"2017","journal-title":"IEEE Access"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1109\/MNET.2018.1700277","article-title":"Assessing the Limits of Mininet-Based Environments for Network Experimentation","volume":"32","author":"Muelas","year":"2018","journal-title":"IEEE Netw."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Sommer, R., and Paxson, V. (2010, January 16\u201319). Outside the closed world: On using machine learning for network intrusion detection. Proceedings of the 2010 IEEE Symposium on Security and Privacy, Oakland, CA, USA.","DOI":"10.1109\/SP.2010.25"},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Koziel, S., and Yang, X.S. (2011). Computational Optimization, Methods and Algorithms, Springer.","DOI":"10.1007\/978-3-642-20859-1"},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Giunta, A., Wojtkiewicz, S., and Eldred, M. (2003, January 6\u20139). Overview of modern design of experiments methods for computational simulations. Proceedings of the 41st Aerospace Sciences Meeting and Exhibit, Reno, NV, USA.","DOI":"10.2514\/6.2003-649"},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.ress.2015.12.002","article-title":"The generalization of Latin hypercube sampling","volume":"148","author":"Shields","year":"2016","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_88","unstructured":"Akinsolu, M. (2019). Efficient Surrogate Model-Assisted Evolutionary Algorithm for Electromagnetic Design Automation with Applications. [Ph.D. Thesis, University of Chester]. Available online: https:\/\/chesterrep.openrepository.com\/handle\/10034\/623568."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1080\/07408170108936873","article-title":"A minimum bias Latin hypercube design","volume":"33","author":"Palmer","year":"2001","journal-title":"Iie Trans."},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Dalbey, K., and Karystinos, G. (2010, January 13\u201315). Fast generation of space-filling latin hypercube sample designs. Proceedings of the 13th AIAA\/ISSMO Multidisciplinary Analysis Optimization Conference, Ft. Worth, TX, USA.","DOI":"10.2514\/6.2010-9085"},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"3231","DOI":"10.1016\/j.jspi.2005.01.007","article-title":"A study on algorithms for optimization of Latin hypercubes","volume":"136","author":"Liefvendahl","year":"2006","journal-title":"J. Stat. Plan. Inference"},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1016\/j.probengmech.2009.01.004","article-title":"Correlation control in small-sample Monte Carlo type simulations I: A simulated annealing approach","volume":"24","year":"2009","journal-title":"Probabilistic Eng. Mech."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/0378-3758(94)90115-5","article-title":"Optimal Latin-hypercube designs for computer experiments","volume":"39","author":"Park","year":"1994","journal-title":"J. Stat. Plan. Inference"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/S0951-8320(03)00058-9","article-title":"Latin hypercube sampling and the propagation of uncertainty in analyses of complex systems","volume":"81","author":"Helton","year":"2003","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Pleming, J., and Manteufel, R. (2005, January 18\u201321). Replicated Latin hypercube sampling. Proceedings of the 46th AIAA\/ASME\/ASCE\/AHS\/ASC Structures, Structural Dynamics and Materials Conference, Austin, TX, USA.","DOI":"10.2514\/6.2005-1819"},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1016\/j.pedsph.2022.09.001","article-title":"Determining minimum sample size for the conditioned Latin hypercube sampling algorithm","volume":"34","author":"Saurette","year":"2024","journal-title":"Pedosphere"},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s42979-021-00557-0","article-title":"Ai-driven cybersecurity: An overview, security intelligence modeling and research directions","volume":"2","author":"Sarker","year":"2021","journal-title":"SN Comput. Sci."},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/s42979-021-00592-x","article-title":"Machine learning: Algorithms, real-world applications and research directions","volume":"2","author":"Sarker","year":"2021","journal-title":"SN Comput. Sci."},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Mohammed, M., Khan, M.B., and Bashier, E.B.M. (2016). Machine Learning: Algorithms and Applications, CRC Press.","DOI":"10.1201\/9781315371658"},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"3039","DOI":"10.1109\/COMST.2019.2926625","article-title":"Artificial neural networks-based machine learning for wireless networks: A tutorial","volume":"21","author":"Chen","year":"2019","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_101","doi-asserted-by":"crossref","unstructured":"van Gerven, M., and Bohte, S. (2017). Artificial Neural Networks as Models of Neural Information Processing. Front. Comput. Neurosci., 11.","DOI":"10.3389\/fncom.2017.00114"},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P.L., Iorkyase, E., Tachtatzis, C., and Atkinson, R. (2016, January 11\u201313). Threat analysis of IoT networks using artificial neural network intrusion detection system. Proceedings of the 2016 International Symposium on Networks, Computers and Communications (ISNCC), Yasmine Hammamet, Tunisia.","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Kang, M.J., and Kang, J.W. (2016). Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security. PLoS ONE, 11.","DOI":"10.1371\/journal.pone.0155781"},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"103160","DOI":"10.1016\/j.jnca.2021.103160","article-title":"A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique","volume":"191","author":"ElSayed","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"103320","DOI":"10.1016\/j.cose.2023.103320","article-title":"Deep-discovery: Anomaly discovery in software-defined networks using artificial neural networks","volume":"132","author":"Shaji","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_106","unstructured":"Russell, S.J., and Norvig, P. (2016). Artificial Intelligence: A Modern Approach, Pearson Education Limited."},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"LeCun","year":"2015","journal-title":"Nature"},{"key":"ref_108","first-page":"57","article-title":"Advanced applications of neural networks and artificial intelligence: A review","volume":"4","author":"Kumar","year":"2012","journal-title":"Int. J. Inf. Technol. Comput. Sci."},{"key":"ref_109","unstructured":"Goodfellow, I., Bengio, Y., and Courville, A. (2016). Deep Learning, MIT Press."},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/72.329697","article-title":"Training feedforward networks with the Marquardt algorithm","volume":"5","author":"Hagan","year":"1994","journal-title":"IEEE Trans. Neural Netw."},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"031012","DOI":"10.1115\/1.4035010","article-title":"Modified Levenberg\u2013Marquardt algorithm for backpropagation neural network training in dynamic model identification of mechanical systems","volume":"139","author":"Li","year":"2017","journal-title":"J. Dyn. Syst. Meas. Control"},{"key":"ref_112","unstructured":"Radford, A., Metz, L., and Chintala, S. (2015). Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks. arXiv."},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/MSP.2017.2765202","article-title":"Generative adversarial networks: An overview","volume":"35","author":"Creswell","year":"2018","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/3065386","article-title":"ImageNet classification with deep convolutional neural networks","volume":"60","author":"Krizhevsky","year":"2017","journal-title":"Commun. ACM"},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long short-term memory","volume":"9","author":"Hochreiter","year":"1997","journal-title":"Neural Comput."},{"key":"ref_116","unstructured":"Esteban, C., Hyland, S.L., and R\u00e4tsch, G. (2017). Real-valued (Medical) Time Series Generation with Recurrent Conditional GANs. arXiv."},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"103733","DOI":"10.1016\/j.cose.2024.103733","article-title":"Future of Generative Adversarial Networks (GAN) for Anomaly Detection in Network Security: A Review","volume":"139","author":"Lim","year":"2024","journal-title":"Comput. Secur."},{"key":"ref_118","doi-asserted-by":"crossref","first-page":"76071","DOI":"10.1109\/ACCESS.2023.3296707","article-title":"A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detection","volume":"11","author":"Dunmore","year":"2023","journal-title":"IEEE Access"},{"key":"ref_119","unstructured":"Goodfellow, I. (2016). Nips 2016 tutorial: Generative adversarial networks. arXiv."},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10115-007-0114-2","article-title":"Top 10 algorithms in data mining","volume":"14","author":"Wu","year":"2008","journal-title":"Knowl. Inf. Syst."},{"key":"ref_121","unstructured":"Breiman, L., Friedman, J.H., Olshen, R.A., and Stone, C.J. (1984). Classification and Regression Trees, Wadsworth International Group."},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1002\/widm.8","article-title":"Classification and regression trees","volume":"1","author":"Loh","year":"2011","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"key":"ref_123","unstructured":"Burkov, A. (2019). The Hundred-Page Machine Learning Book, Andriy Burkov."},{"key":"ref_124","unstructured":"The MathWorks, Inc. (2025, January 06). Statistics and Machine Learning Toolbox. Available online: https:\/\/uk.mathworks.com\/products\/statistics.html."},{"key":"ref_125","unstructured":"scikit-Learn (2025, January 06). scikit-Learn Machine Learning in Python. Available online: https:\/\/scikit-learn.org\/stable\/."},{"key":"ref_126","unstructured":"Sangodoyin, A.O. (2019). Design and Analysis of Anomaly Detection and Mitigation Schemes for Distributed Denial of Service Attacks in Software Defined Networks. [Ph.D. Thesis, University of Bradford]. Available online: https:\/\/bradscholars.brad.ac.uk\/handle\/10454\/18777."},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Akinsolu, M.O., and Zribi, K. (2023). A Generalized Framework for Adopting Regression-Based Predictive Modeling in Manufacturing Environments. Inventions, 8.","DOI":"10.3390\/inventions8010032"},{"key":"ref_128","doi-asserted-by":"crossref","unstructured":"Wilcoxon, F. (1992). Individual comparisons by ranking methods. Breakthroughs in Statistics: Methodology and Distribution, Springer.","DOI":"10.1007\/978-1-4612-4380-9_16"},{"key":"ref_129","doi-asserted-by":"crossref","unstructured":"Forbes, C., Evans, M., Hastings, N., and Peacock, B. (2011). Statistical Distributions, John Wiley & Sons.","DOI":"10.1002\/9780470627242"},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/TNSRE.2017.2776149","article-title":"A Novel Multi-Class EEG-Based Sleep Stage Classification System","volume":"26","author":"Memar","year":"2018","journal-title":"IEEE Trans. Neural Syst. Rehabil. Eng."},{"key":"ref_131","unstructured":"Augustine, M.T. (2024). A Survey on Universal Approximation Theorems. arXiv."},{"key":"ref_132","doi-asserted-by":"crossref","first-page":"3446","DOI":"10.1016\/j.eswa.2011.09.033","article-title":"An experimental comparison of classification algorithms for imbalanced credit scoring data sets","volume":"39","author":"Brown","year":"2012","journal-title":"Expert Syst. Appl."},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"103521","DOI":"10.1016\/j.cose.2023.103521","article-title":"Enhanced neural network-based attack investigation framework for network forensics: Identification, detection, and analysis of the attack","volume":"135","author":"Bhardwaj","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_134","first-page":"6036","article-title":"An efficient DDoS TCP flood attack detection and prevention system in a cloud environment","volume":"5","author":"Sahi","year":"2017","journal-title":"IEEE Access"},{"key":"ref_135","doi-asserted-by":"crossref","unstructured":"Nashat, D., and Khairy, S. (November, January 29). Detecting http flooding attacks based on uniform model. Proceedings of the 2021 International Conference on Networking and Network Applications (NaNA), Lijiang, China.","DOI":"10.1109\/NaNA53684.2021.00024"},{"key":"ref_136","doi-asserted-by":"crossref","unstructured":"Shen, Z.Y., Su, M.W., Cai, Y.Z., and Tasi, M.H. (2021, January 8\u201310). Mitigating SYN Flooding and UDP Flooding in P4-based SDN. Proceedings of the 2021 22nd Asia-Pacific Network Operations and Management Symposium (APNOMS), Tainan, Taiwan.","DOI":"10.23919\/APNOMS52696.2021.9562660"},{"key":"ref_137","doi-asserted-by":"crossref","unstructured":"Nouri, A., van Treeck, C., and Frisch, J. (2024). Sensitivity Assessment of Building Energy Performance Simulations Using MARS Meta-Modeling in Combination with Sobol\u2019Method. Energies, 17.","DOI":"10.3390\/en17030695"},{"key":"ref_138","doi-asserted-by":"crossref","first-page":"114009","DOI":"10.1016\/j.cma.2021.114009","article-title":"A generalized sensitivity analysis method based on variance and covariance decomposition of summatory functions for multi-input multi-output systems","volume":"385","author":"Liu","year":"2021","journal-title":"Comput. Methods Appl. Mech. Eng."},{"key":"ref_139","doi-asserted-by":"crossref","first-page":"1623","DOI":"10.1049\/rpg2.12468","article-title":"Sensitivity analysis for evaluation of the effect of sensors error on the wind turbine variables using Monte Carlo simulation","volume":"16","author":"Biazar","year":"2022","journal-title":"IET Renew. Power Gener."},{"key":"ref_140","doi-asserted-by":"crossref","unstructured":"Arman, S.A., Rahman, M.M., Rahman, S.F., Urmi, N.P., Urmee, P.P., Muslim, N., and Islam, S. (2020, January 5\u20137). Developing an IoT Networks-based Testbed for Software-Defined Networks. Proceedings of the 2020 IEEE Region 10 Symposium (TENSYMP), Dhaka, Banglades.","DOI":"10.1109\/TENSYMP50017.2020.9230874"}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/16\/9\/783\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:42:49Z","timestamp":1760035369000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/16\/9\/783"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,9]]},"references-count":140,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2025,9]]}},"alternative-id":["info16090783"],"URL":"https:\/\/doi.org\/10.3390\/info16090783","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,9]]}}}