{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:36:44Z","timestamp":1776105404919,"version":"3.50.1"},"reference-count":132,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Ministry of Higher Education Malaysia for Fundamental Research Grant Scheme","award":["FRGS\/1\/2022\/ICT11\/USM\/02\/1"],"award-info":[{"award-number":["FRGS\/1\/2022\/ICT11\/USM\/02\/1"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Software-defined networking (SDN) is a revolutionary innovation in network technology with many desirable features, including flexibility and manageability. Despite those advantages, SDN is vulnerable to distributed denial of service (DDoS), which constitutes a significant threat due to its impact on the SDN network. Despite many security approaches to detect DDoS attacks, it remains an open research challenge. Therefore, this study presents a systematic literature review (SLR) to systematically investigate and critically analyze the existing DDoS attack approaches based on machine learning (ML), deep learning (DL), or hybrid approaches published between 2014 and 2022. We followed a predefined SLR protocol in two stages on eight online databases to comprehensively cover relevant studies. The two stages involve automatic and manual searching, resulting in 70 studies being identified as definitive primary studies. The trend indicates that the number of studies on SDN DDoS attacks has increased dramatically in the last few years. The analysis showed that the existing detection approaches primarily utilize ensemble, hybrid, and single ML-DL. Private synthetic datasets, followed by unrealistic datasets, are the most frequently used to evaluate those approaches. In addition, the review argues that the limited literature studies demand additional focus on resolving the remaining challenges and open issues stated in this SLR.<\/jats:p>","DOI":"10.3390\/s23094441","type":"journal-article","created":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T12:12:11Z","timestamp":1682943131000},"page":"4441","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":63,"title":["A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2307-6302","authenticated-orcid":false,"given":"Abdullah Ahmed","family":"Bahashwan","sequence":"first","affiliation":[{"name":"National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor 11800, Penang, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7026-6408","authenticated-orcid":false,"given":"Mohammed","family":"Anbar","sequence":"additional","affiliation":[{"name":"National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor 11800, Penang, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4378-1954","authenticated-orcid":false,"given":"Selvakumar","family":"Manickam","sequence":"additional","affiliation":[{"name":"National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor 11800, Penang, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2516-1404","authenticated-orcid":false,"given":"Taief Alaa","family":"Al-Amiedy","sequence":"additional","affiliation":[{"name":"National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor 11800, Penang, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5901-3509","authenticated-orcid":false,"given":"Mohammad Adnan","family":"Aladaileh","sequence":"additional","affiliation":[{"name":"National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor 11800, Penang, Malaysia"},{"name":"Cybersecurity Department, School of Information Technology, American University of Madaba (AUM), Amman 11821, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2275-3201","authenticated-orcid":false,"given":"Iznan H.","family":"Hasbullah","sequence":"additional","affiliation":[{"name":"National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor 11800, Penang, Malaysia"}]}],"member":"1968","published-online":{"date-parts":[[2023,5,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1016\/j.comcom.2020.02.085","article-title":"New-flow based DDoS attacks in SDN: Taxonomy, rationales, and research challenges","volume":"154","author":"Singh","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"100741","DOI":"10.1016\/j.iot.2023.100741","article-title":"A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things","volume":"22","author":"Anbar","year":"2023","journal-title":"Internet Things"},{"key":"ref_3","unstructured":"Casado, M., Garfinkel, T., Akella, A., Freedman, M.J., Boneh, D., McKeown, N., and Shenker, S. (August, January 31). SANE: A Protection Architecture for Enterprise Networks. Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1109\/COMST.2015.2453114","article-title":"A Survey of Security in Software Defined Networks","volume":"18","author":"Natarajan","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1145\/1355734.1355746","article-title":"OpenFlow: Enabling Innovation in Campus Networks","volume":"38","author":"McKeown","year":"2008","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/j.future.2019.02.037","article-title":"DDoS detection and defense mechanism based on cognitive-inspired computing in SDN","volume":"97","author":"Cui","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_7","unstructured":"Nygren, A., Pfaff, B., Lantz, B., Heller, B., Barker, C., Beckmann, C., Cohn, D., Malek, D., Talayco, D., and Erickson, D. (2015). Openflow Switch Specification Version 1.5. 1, Open Networking Foundation."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"100279","DOI":"10.1016\/j.cosrev.2020.100279","article-title":"Detection and mitigation of DDoS attacks in SDN: A comprehensive review, research challenges and future directions","volume":"37","author":"Singh","year":"2020","journal-title":"Comput. Sci. Rev."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Aladaileh, M.A., Anbar, M., Hintaw, A.J., Hasbullah, I.H., Bahashwan, A.A., Al-Amiedy, T.A., and Ibrahim, D.R. (2023). Effectiveness of an Entropy-Based Approach for Detecting Low-and High-Rate DDoS Attacks against the SDN Controller: Experimental Analysis. Appl. Sci., 13.","DOI":"10.3390\/app13020775"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"102423","DOI":"10.1016\/j.cose.2021.102423","article-title":"A comprehensive survey of DDoS defense solutions in SDN: Taxonomy, research challenges, and future directions","volume":"110","author":"Kaur","year":"2021","journal-title":"Comput. Secur."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"e2163","DOI":"10.1002\/nem.2163","article-title":"A systematic review on distributed denial of service attack defense mechanisms in programmable networks","volume":"31","author":"Dalmazo","year":"2021","journal-title":"Int. J. Netw. Manag."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Alashhab, A.A., Zahid, M.S.M., Azim, M.A., Daha, M.Y., Isyaku, B., and Ali, S. (2022). A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks. Symmetry, 14.","DOI":"10.3390\/sym14081563"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"107706","DOI":"10.1016\/j.compeleceng.2022.107706","article-title":"A survey on DoS\/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets","volume":"99","author":"Alhijawi","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Ali, T.E., Chong, Y.W., and Manickam, S. (2023). Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review. Appl. Sci., 13.","DOI":"10.3390\/app13053183"},{"key":"ref_15","unstructured":"Al-Mashhadi, S., Anbar, M., Jalal, R.A., and Al-Ani, A. (2019, January 29\u201330). Design of cloud computing load balance system based on SDN technology. Proceedings of the Computational Science and Technology 2019 (ICCST2019), Kota Kinabalu, Malaysia."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Bahashwan, A.A., Anbar, M., and Abdullah, N. (2019, January 22\u201323). New architecture design of cloud computing using software defined networking and network function virtualization technology. Proceedings of the International Conference of Reliable Information and Communication Technology, Johor, Malaysia.","DOI":"10.1007\/978-3-030-33582-3_66"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","article-title":"Software-defined networking: A comprehensive survey","volume":"103","author":"Kreutz","year":"2015","journal-title":"Proc. IEEE"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"103156","DOI":"10.1016\/j.jnca.2021.103156","article-title":"Towards DDoS detection mechanisms in software-defined networking","volume":"190","author":"Cui","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"36256","DOI":"10.1109\/ACCESS.2018.2846236","article-title":"Controllers in SDN: A review report","volume":"6","author":"Paliwal","year":"2018","journal-title":"IEEE Access"},{"key":"ref_20","unstructured":"Richardson, L., and Ruby, S. (2008). RESTful Web Services, O\u2019Reilly Media, Inc."},{"key":"ref_21","unstructured":"POX (2022, July 26). Installing POX\u2014POX Manual Current Documentation. Available online: https:\/\/noxrepo.github.io\/pox-doc\/html\/."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1145\/1384609.1384625","article-title":"NOX: Towards an operating system for networks","volume":"38","author":"Gude","year":"2008","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_23","unstructured":"Floodlight (2022, July 26). Floodlight Controller\u2014Confluence. Available online: https:\/\/floodlight.atlassian.net\/wiki\/spaces\/floodlightcontroller\/overview."},{"key":"ref_24","unstructured":"OpenDaylight (2022, July 26). Home\u2014OpenDaylight platform (ODL). Available online: https:\/\/www.opendaylight.org\/."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/COMST.2014.2330903","article-title":"A survey on software-defined networking","volume":"17","author":"Xia","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_26","first-page":"83","article-title":"Information theory-based approaches to detect DDoS attacks on software-defined networking controller a review","volume":"15","author":"Aladaileh","year":"2021","journal-title":"Int. J. Educ. Inf. Technol."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1955","DOI":"10.1109\/COMST.2014.2320094","article-title":"A survey and a layered taxonomy of software-defined networking","volume":"16","author":"Jarraya","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Mousavi, S.M., and Marc, S. (2015, January 16\u201319). Early detection of DDoS attacks against SDN controllers. Proceedings of the 2015 International Conference on Computing, Networking and Communications (ICNC), Garden Grove, CA, USA.","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"102803","DOI":"10.1016\/j.jnca.2020.102803","article-title":"A survey of link flooding attacks in software defined network ecosystems","volume":"172","author":"Wang","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_30","unstructured":"Berde, P., Gerola, M., Hart, J., Higuchi, Y., Kobayashi, M., Koide, T., Lantz, B., O\u2019Connor, B., Radoslavov, P., and Snow, W. (2014, January 22). ONOS: Towards an Open, Distributed SDN OS. Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, Chicago, IL, USA."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"102563","DOI":"10.1016\/j.jnca.2020.102563","article-title":"A comprehensive survey of interface protocols for software defined networks","volume":"156","author":"Latif","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_32","unstructured":"Pfaff, B., and Davie, B. (2022, August 11). The Open Vswitch Database Management Protocol. Available online: http:\/\/www.ietf.org\/rfc\/rfc7047.txt."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1145\/2602204.2602211","article-title":"Openstate: Programming platform-independent stateful openflow applications inside the switch","volume":"44","author":"Bianchi","year":"2014","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_34","unstructured":"Smith, M., Dvorkin, M., Laribi, Y., Pandey, V., Garg, P., and Weidenbacher, N. (2022, August 26). OpFlex Control Protocol. Available online: https:\/\/datatracker.ietf.org\/doc\/draft-smith-opflex\/03\/."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Zubaydi, H.D., Anbar, M., and Wey, C.Y. (2017, January 8\u20139). Review on detection techniques against DDoS attacks on a software-defined networking controller. Proceedings of the 2017 Palestinian International Conference on Information and Communication Technology (PICICT), Gaza, Palestine.","DOI":"10.1109\/PICICT.2017.26"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comnet.2018.11.020","article-title":"BOND: Flexible failure recovery in software defined networks","volume":"149","author":"Li","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Al-Ani, A., Anbar, M., Laghari, S.A., and Al-Ani, A.K. (2020). Mechanism to prevent the abuse of IPv6 fragmentation in OpenFlow networks. PLoS ONE, 15.","DOI":"10.1371\/journal.pone.0232574"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Wazirali, R., Ahmad, R., and Alhiyari, S. (2021). SDN-openflow topology discovery: An overview of performance issues. Appl. Sci., 11.","DOI":"10.3390\/app11156999"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Klein, D., and Jarschel, M. (2013, January 5). An OpenFlow extension for the OMNeT++ INET framework. Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, Cannes, France.","DOI":"10.4108\/icst.simutools.2013.251722"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Benton, K., Camp, L.J., and Small, C. (2013, January 16). OpenFlow Vulnerability Assessment. Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, Hong Kong, China.","DOI":"10.1145\/2491185.2491222"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"143985","DOI":"10.1109\/ACCESS.2020.3013998","article-title":"Detection techniques of distributed denial of service attacks on software-defined networking controller\u2014A review","volume":"8","author":"Aladaileh","year":"2020","journal-title":"IEEE Access"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"103093","DOI":"10.1016\/j.jnca.2021.103093","article-title":"Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions","volume":"187","author":"Valdovinos","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","article-title":"Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges","volume":"18","author":"Yan","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_44","first-page":"1403","article-title":"Hasbullah, A.A.B.; Al-Sarawn, S. Dynamic Threshold-Based Approach to Detect Low-Rate DDoS Attacks on Software-Defined Networking Controller","volume":"73","author":"Aladaileh","year":"2022","journal-title":"Comput. Mater. Contin."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Aladaileh, M.A., Anbar, M., Hintaw, A.J., Hasbullah, I.H., Bahashwan, A.A., and Al-Sarawi, S. (2022). Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates. Appl. Sci., 12.","DOI":"10.3390\/app12126127"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1007\/s10922-017-9432-1","article-title":"Early detection of DDoS attacks against software defined network controllers","volume":"26","author":"Mousavi","year":"2018","journal-title":"J. Netw. Syst. Manag."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Bahashwan, A.A., Anbar, M., and Hanshi, S.M. (August, January 30). Overview of IPv6 based DDoS and DoS attacks detection mechanisms. Proceedings of the Advances in Cyber Security: First International Conference, ACeS 2019, Penang, Malaysia.","DOI":"10.1007\/978-981-15-2693-0_11"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Ahmed, M., Shatabda, S., Islam, A.K.M., Robin, M., and Islam, T. (TechRxiv, 2021). Intrusion Detection System in Software-Defined Networks Using Machine Learning and Deep Learning Techniques\u2014A Comprehensive Survey, TechRxiv.","DOI":"10.36227\/techrxiv.17153213.v1"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"e4150","DOI":"10.1002\/ett.4150","article-title":"Network intrusion detection system: A systematic study of machine learning and deep learning approaches","volume":"32","author":"Ahmad","year":"2021","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Liu, H., and Lang, B. (2019). Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey. Appl. Sci., 9.","DOI":"10.3390\/app9204396"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Elejla, O.E., Anbar, M., Hamouda, S., Faisal, S., Bahashwan, A.A., and Hasbullah, I.H. (2022). Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks. Appl. Sci., 12.","DOI":"10.3390\/app12126150"},{"key":"ref_52","first-page":"1","article-title":"Procedures for Performing Systematic Reviews","volume":"33","author":"Kitchenham","year":"2004","journal-title":"Keele"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","article-title":"Systematic literature reviews in software engineering\u2014A systematic literature review","volume":"51","author":"Kitchenham","year":"2009","journal-title":"Inf. Softw. Technol."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1016\/j.ijinfomgt.2016.06.005","article-title":"Understanding social commerce: A systematic literature review and directions for further research","volume":"36","author":"Busalim","year":"2016","journal-title":"Int. J. Inf. Manag."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/j.jss.2006.07.009","article-title":"Lessons from applying the systematic literature review process within the software engineering domain","volume":"80","author":"Brereton","year":"2007","journal-title":"J. Syst. Softw."},{"key":"ref_56","unstructured":"Kitchenham, B., and Charters, S.M. (2007). Guidelines for Performing Systematic Literature Reviews in Software Engineering, Keele University. Technical Report, ver. 2.3."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"173681","DOI":"10.1109\/ACCESS.2020.3024671","article-title":"Software Architecture Degradation in Open Source Software: A Systematic Literature Review","volume":"8","author":"Baabad","year":"2020","journal-title":"IEEE Access"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"102116","DOI":"10.1016\/j.cose.2020.102116","article-title":"A systematic review of PIN-entry methods resistant to shoulder-surfing attacks","volume":"101","author":"Binbeshr","year":"2021","journal-title":"Comput. Secur."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"104412","DOI":"10.1016\/j.micpro.2021.104412","article-title":"An optimized weighted voting based ensemble model for DDoS attack detection and mitigation in SDN environment","volume":"89","author":"Maheshwari","year":"2022","journal-title":"Microprocess. Microsyst."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"e5927","DOI":"10.1002\/cpe.5927","article-title":"Voting-based intrusion detection framework for securing software-defined networks","volume":"32","author":"Swami","year":"2020","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Firdaus, D., Munadi, R., and Purwanto, Y. (2020, January 10\u201311). DDoS Attack Detection in Software Defined Network using Ensemble K-means++ and Random Forest. Proceedings of the 2020 3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), Yogyakarta, Indonesia.","DOI":"10.1109\/ISRITI51436.2020.9315521"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Deepa, V., Sudar, K.M., and Deepalakshmi, P. (2019, January 30\u201331). Design of Ensemble Learning Methods for DDoS Detection in SDN Environment. Proceedings of the 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN), Vellore, India.","DOI":"10.1109\/ViTECoN.2019.8899682"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"103108","DOI":"10.1016\/j.jnca.2021.103108","article-title":"Automated DDOS attack detection in software defined networking","volume":"187","author":"Ahuja","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Phan, T.V., Bao, N.K., and Park, M. (2016, January 18\u201321). A Novel Hybrid Flow-Based Handler with DDoS Attacks in Software-Defined Networking. Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld), Toulouse, France.","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0069"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10922-021-09633-5","article-title":"Machine-Learning-enabled DDoS Attacks Detection in P4 Programmable Networks","volume":"30","author":"Musumeci","year":"2022","journal-title":"J. Netw. Syst. Manag."},{"key":"ref_66","first-page":"771","article-title":"DDoS Detection in SDN using Machine Learning Techniques","volume":"71","author":"Nadeem","year":"2022","journal-title":"Comput. Mater. Contin."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"2295","DOI":"10.1007\/s11277-021-08127-6","article-title":"Detection and Analysis of TCP-SYN DDoS Attack in Software-Defined Networking","volume":"118","author":"Swami","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Tonkal, O., Polat, H., Ba\u015faran, E., C\u00f6mert, Z., and Kocao\u011flu, R. (2021). Machine Learning Approach Equipped with Neighbourhood Component Analysis for DDoS Attack Detection in Software-Defined Networking. Electronics, 10.","DOI":"10.3390\/electronics10111227"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"122495","DOI":"10.1109\/ACCESS.2021.3109490","article-title":"Detection and Classification of DDoS Flooding Attacks on Software-Defined Networks: A Case Study for the Application of Machine Learning","volume":"9","author":"Sangodoyin","year":"2021","journal-title":"IEEE Access"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"132502","DOI":"10.1109\/ACCESS.2020.3009733","article-title":"An Evolutionary SVM Model for DDOS Attack Detection in Software Defined Networks","volume":"8","author":"Sahoo","year":"2020","journal-title":"IEEE Access"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.procs.2021.10.078","article-title":"Analysis of Machine Learning for Securing Software-Defined Networking","volume":"194","author":"Alamri","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Sudar, K., Beulah, M., Deepalakshmi, P., Nagaraj, P., and Chinnasamy, P. (2021, January 27\u201329). Detection of Distributed Denial of Service Attacks in SDN using Machine Learning Techniques. Proceedings of the 2021 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India.","DOI":"10.1109\/ICCCI50826.2021.9402517"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Polat, H., Polat, O., and Cetin, A. (2020). Detecting DDoS Attacks in Software-Defined Networks Through Feature Selection Methods and Machine Learning Models. Sustainability, 12.","DOI":"10.3390\/su12031035"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"155859","DOI":"10.1109\/ACCESS.2020.3019330","article-title":"A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning","volume":"8","author":"Valdovinos","year":"2020","journal-title":"IEEE Access"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"161908","DOI":"10.1109\/ACCESS.2020.3021435","article-title":"A New Framework for DDoS Attack Detection and Defense in SDN Environment","volume":"8","author":"Tan","year":"2020","journal-title":"IEEE Access"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"194269","DOI":"10.1109\/ACCESS.2020.3033942","article-title":"Bandwidth Control Mechanism and Extreme Gradient Boosting Algorithm for Protecting Software-Defined Networks Against DDoS Attacks","volume":"8","author":"Alamri","year":"2020","journal-title":"IEEE Access"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"100172","DOI":"10.1109\/ACCESS.2020.2997939","article-title":"Artificial Immune Systems and Fuzzy Logic to Detect Flooding Attacks in Software-Defined Networks","volume":"8","author":"Scaranti","year":"2020","journal-title":"IEEE Access"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Ahmad, A., Harjula, E., Ylianttila, M., and Ahmad, I. (2020, January 7\u201311). Evaluation of Machine Learning Techniques for Security in SDN. Proceedings of the 2020 IEEE Globecom Workshops, Taipei, Taiwan.","DOI":"10.1109\/GCWkshps50303.2020.9367477"},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"103285","DOI":"10.1016\/j.micpro.2020.103285","article-title":"Flow-based anomaly intrusion detection using machine learning model with software defined networking for OpenFlow network","volume":"79","author":"Satheesh","year":"2020","journal-title":"Microprocess. Microsyst."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"e5402","DOI":"10.1002\/cpe.5402","article-title":"Machine Learning Algorithms to Detect DDoS Attacks in SDN","volume":"32","author":"Santos","year":"2020","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Alshamrani, A., Chowdhary, A., Pisharody, S., Lu, D., and Huang, D. (2017, January 21\u201325). A Defense System for Defeating DDoS Attacks in SDN Based Networks. Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access, Miami, FL, USA.","DOI":"10.1145\/3132062.3132074"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"69620","DOI":"10.1109\/ACCESS.2018.2878576","article-title":"Fast Defense System Against Attacks in Software Defined Networks","volume":"6","author":"Novaes","year":"2018","journal-title":"IEEE Access"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Sahoo, K.S., Iqbal, A., Maiti, P., and Sahoo, B. (2018, January 19\u201321). A Machine Learning Approach for Predicting DDoS Traffic in Software Defined Networks. Proceedings of the 2018 International Conference on Information Technology (ICIT), Bhubaneswar, India.","DOI":"10.1109\/ICIT.2018.00049"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Nurwarsito, H., and Nadhif, M.F. (2021, January 22\u201323). DDoS Attack Early Detection and Mitigation System on SDN using Random Forest Algorithm and Ryu Framework. Proceedings of the 2021 8th International Conference on Computer and Communication Engineering (ICCCE), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICCCE50029.2021.9467167"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"86","DOI":"10.2991\/ijndc.k.200325.001","article-title":"Analysis of Features Dataset for DDoS Detection by using ASVM Method on Software Defined Networking","volume":"8","author":"Oo","year":"2020","journal-title":"Int. J. Netw. Distrib. Comput."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"17404","DOI":"10.1109\/ACCESS.2020.2967478","article-title":"Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network","volume":"8","author":"Zhijun","year":"2020","journal-title":"IEEE Access"},{"key":"ref_87","first-page":"1","article-title":"Advanced Support Vector Machine- (ASVM-) Based Detection for Distributed Denial of Service (DDoS) Attack on Software Defined Networking (SDN)","volume":"2019","author":"Kamolphiwong","year":"2019","journal-title":"J. Comput. Netw. Commun."},{"key":"ref_88","unstructured":"RT, K., Thamarai Selvi, S., and Govindarajan, K. (2014, January 17\u201319). DDoS detection and analysis in SDN-based environment using support vector machine classifier. Proceedings of the 2014 Sixth International Conference on Advanced Computing (ICoAC), Chennai, India."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"34699","DOI":"10.1109\/ACCESS.2019.2895092","article-title":"SGS: Safe-Guard Scheme for Protecting Control Plane Against DDoS Attacks in Software-Defined Networking","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"160536","DOI":"10.1109\/ACCESS.2019.2950945","article-title":"Efficient DDoS Detection Based on K-FKNN in Software Defined Networks","volume":"7","author":"Xu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"5039","DOI":"10.1109\/ACCESS.2019.2963077","article-title":"DDoS Attack Detection Method Based on Improved KNN With the Degree of DDoS Attack in Software-Defined Networks","volume":"8","author":"Dong","year":"2019","journal-title":"IEEE Access"},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"50","DOI":"10.4018\/IJISP.2020070104","article-title":"Neural Network-Based Approach for Detection and Mitigation of DDoS Attacks in SDN Environments","volume":"14","author":"Hannache","year":"2020","journal-title":"Int. J. Inf. Secur. Priv. (IJISP)"},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Yang, L., and Zhao, H. (2018, January 16\u201318). DDoS Attack Identification and Defense Using SDN Based on Machine Learning Method. Proceedings of the 2018 15th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN), Yichang, China.","DOI":"10.1109\/I-SPAN.2018.00036"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.jnca.2017.04.016","article-title":"Distributed-SOM: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacks","volume":"91","author":"Phan","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.jnca.2016.04.005","article-title":"SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks","volume":"68","author":"Cui","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"923","DOI":"10.32604\/iasc.2022.024668","article-title":"Ensemble Deep Learning Models for Mitigating DDoS Attack in Software-Defined Network","volume":"33","author":"Fatmah","year":"2022","journal-title":"Intell. Autom. Soft Comput."},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Mbasuva, U., and Zodi, G.A.L. (2022, January 3\u20135). Designing Ensemble Deep Learning Intrusion Detection System for DDoS attacks in Software Defined Networks. Proceedings of the 2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM), Seoul, Korea.","DOI":"10.1109\/IMCOM53663.2022.9721785"},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Haider, S., Akhunzada, A., Ahmed, G., and Raza, M. (2019, January 21\u201322). Deep Learning based Ensemble Convolutional Neural Network Solution for Distributed Denial of Service Detection in SDNs. Proceedings of the 2019 UK\/China Emerging Technologies (UCET), Glasgow, UK.","DOI":"10.1109\/UCET.2019.8881856"},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Abdallah, M., An Le Khac, N., Jahromi, H., and Delia Jurcut, A. (2021, January 17\u201320). A Hybrid CNN-LSTM Based Approach for Anomaly Detection Systems in SDNs. Proceedings of the 16th International Conference on Availability, Reliability and Security, Vienna, Austria.","DOI":"10.1145\/3465481.3469190"},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"53972","DOI":"10.1109\/ACCESS.2020.2976908","article-title":"A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks","volume":"8","author":"Haider","year":"2020","journal-title":"IEEE Access"},{"key":"ref_101","doi-asserted-by":"crossref","unstructured":"Nugraha, B., and Murthy, R.N. (2020, January 10\u201312). Deep Learning-based Slow DDoS Attack Detection in SDN-based Networks. Proceedings of the 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Leganes, Spain.","DOI":"10.1109\/NFV-SDN50289.2020.9289894"},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.procs.2021.07.032","article-title":"Deep learning algorithms for detecting denial of service attacks in software-defined networks","volume":"191","author":"Farhat","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Gadze, J.D., Bamfo-Asante, A.A., Agyemang, J.O., Nunoo-Mensah, H., and Opare, K.A.B. (2021). An Investigation into the Application of Deep Learning in the Detection and Mitigation of DDOS Attack on SDN Controllers. Technologies, 9.","DOI":"10.3390\/technologies9010014"},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Elsayed, M.S., Le-Khac, N.A., Dev, S., and Jurcut, A.D. (September, January 31). DDoSNet: A Deep-Learning Model for Detecting Network Attacks. Proceedings of the 2020 IEEE 21st International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM), Cork, Ireland.","DOI":"10.1109\/WoWMoM49955.2020.00072"},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M., and El Moussa, F. (2020). DeepIDS: Deep Learning Approach for Intrusion Detection in Software Defined Networking. Electronics, 9.","DOI":"10.3390\/electronics9091533"},{"key":"ref_106","unstructured":"Tang, T.A., McLernon, D., Mhamdi, L., Zaidi, S.A.R., and Ghogho, M. (2019). Deep Learning Applications for Cyber Security, Springer."},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"e3497","DOI":"10.1002\/dac.3497","article-title":"Detection and defense of DDoS attack\u2013based on deep learning in OpenFlow-based SDN","volume":"31","author":"Li","year":"2018","journal-title":"Int. J. Commun. Syst."},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., and Ghogho, M. (2018, January 25\u201329). Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks. Proceedings of the 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), Montreal, QC, Canada.","DOI":"10.1109\/NETSOFT.2018.8460090"},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.future.2021.11.009","article-title":"Software-defined DDoS detection with information entropy analysis and optimized deep learning","volume":"129","author":"Liu","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Wang, H., and Li, W. (2021). DDosTC: A Transformer-Based Network Attack Detection Hybrid Mechanism in SDN. Sensors, 21.","DOI":"10.3390\/s21155047"},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"14301","DOI":"10.1109\/ACCESS.2022.3148134","article-title":"Convolutional Neural Network Based Algorithm for Early Warning Proactive System Security in Software Defined Networks","volume":"10","author":"Janabi","year":"2022","journal-title":"IEEE Access"},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"102942","DOI":"10.1016\/j.jnca.2020.102942","article-title":"A GRU deep learning system against attacks in software defined networks","volume":"177","author":"Assis","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.future.2021.06.047","article-title":"Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments","volume":"125","author":"Novaes","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"Ahuja, N., Singal, G., and Mukhopadhyay, D. (2021, January 28\u201329). DLSDN: Deep Learning for DDOS attack detection in Software Defined Networking. Proceedings of the 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India.","DOI":"10.1109\/Confluence51648.2021.9376879"},{"key":"ref_115","doi-asserted-by":"crossref","unstructured":"Elsayed, M.S., Jahromi, H.Z., Nazir, M.M., and Jurcut, A.D. (2021, January 6\u20137). The role of CNN for intrusion detection systems: An improved CNN learning approach for SDNs. Proceedings of the International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures, Virtual Event.","DOI":"10.1007\/978-3-030-78459-1_7"},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42979-021-00467-1","article-title":"Deep neural network (DNN) solution for real-time detection of distributed denial of service (DDoS) attacks in software defined networks (SDNs)","volume":"2","author":"Makuvaza","year":"2021","journal-title":"SN Comput. Sci."},{"key":"ref_117","doi-asserted-by":"crossref","unstructured":"Itagi, V., Javali, M., Madhukeshwar, H., Shettar, P., Somashekar, P., and Narayan, D. (2021, January 19\u201320). DDoS Attack Detection in SDN Environment using Bi-directional Recurrent Neural Network. Proceedings of the 2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER), Nitte, India.","DOI":"10.1109\/DISCOVER52564.2021.9663667"},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Liu, Y., Dong, M., Ota, K., Li, J., and Wu, J. (2018, January 17\u201319). Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks. Proceedings of the 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Barcelona, Spain.","DOI":"10.1109\/CAMAD.2018.8514971"},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"1491","DOI":"10.1007\/s00521-018-3383-7","article-title":"LION IDS: A meta-heuristics approach to detect DDoS attacks against Software-Defined Networks","volume":"31","author":"Arivudainambi","year":"2019","journal-title":"Neural Comput. Appl."},{"key":"ref_120","first-page":"1","article-title":"A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN)","volume":"4","author":"Niyaz","year":"2016","journal-title":"ICST Trans. Secur. Saf."},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., and Ghogho, M. (2016, January 26\u201329). Deep learning approach for Network Intrusion Detection in Software Defined Networking. Proceedings of the 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), Fez, Morocco.","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"ref_122","doi-asserted-by":"crossref","unstructured":"MohanaPriya, P., and Shalinie, S.M. (2017, January 16\u201318). Restricted Boltzmann Machine based detection system for DDoS attack in Software Defined Networks. Proceedings of the 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN), Chennai, India.","DOI":"10.1109\/ICSCN.2017.8085731"},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"103160","DOI":"10.1016\/j.jnca.2021.103160","article-title":"A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique","volume":"191","author":"ElSayed","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_124","doi-asserted-by":"crossref","first-page":"108495","DOI":"10.1109\/ACCESS.2021.3101650","article-title":"SDN-Based Architecture for Transport and Application Layer DDoS Attack Detection by Using Machine and Deep Learning","volume":"9","year":"2021","journal-title":"IEEE Access"},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Mhamdi, L., McLernon, D., El-Moussa, F., Zaidi, S.A.R., Ghogho, M., and Tang, T. (2020, January 27\u201330). A deep learning approach combining autoencoder with one-class SVM for DDoS attack detection in SDNs. Proceedings of the 2020 IEEE Eighth International Conference on Communications and Networking (ComNet), Hammamet, Tunisia.","DOI":"10.1109\/ComNet47917.2020.9306073"},{"key":"ref_126","doi-asserted-by":"crossref","first-page":"83765","DOI":"10.1109\/ACCESS.2020.2992044","article-title":"Long short-term memory and fuzzy logic for anomaly detection and mitigation in software-defined network environment","volume":"8","author":"Novaes","year":"2020","journal-title":"IEEE Access"},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Said Elsayed, M., Le-Khac, N.A., Dev, S., and Jurcut, A.D. (2020). Network Anomaly Detection Using LSTM Based Autoencoder, Association for Computing Machinery.","DOI":"10.1145\/3416013.3426457"},{"key":"ref_128","unstructured":"Karan, B., Narayan, D., and Hiremath, P. (2018, January 20\u201322). Detection of DDoS Attacks in Software Defined Networks. Proceedings of the 2018 3rd International Conference on Computational Systems and Information Technology for Sustainable Solutions (CSITSS), Bengaluru, India."},{"key":"ref_129","doi-asserted-by":"crossref","unstructured":"Al-Amiedy, T.A., Anbar, M., Belaton, B., Kabla, A.H.H., Hasbullah, I.H., and Alashhab, Z.R. (2022). A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things. Sensors, 22.","DOI":"10.3390\/s22093400"},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"165263","DOI":"10.1109\/ACCESS.2020.3022633","article-title":"InSDN: A novel SDN intrusion dataset","volume":"8","author":"Elsayed","year":"2020","journal-title":"IEEE Access"},{"key":"ref_131","first-page":"17632","article-title":"DDOS attack SDN Dataset","volume":"1","author":"Ahuja","year":"2020","journal-title":"Mendeley Data"},{"key":"ref_132","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1109\/COMST.2020.2988293","article-title":"A survey of machine and deep learning methods for internet of things (IoT) security","volume":"22","author":"Mohamed","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/9\/4441\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:27:48Z","timestamp":1760124468000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/9\/4441"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":132,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2023,5]]}},"alternative-id":["s23094441"],"URL":"https:\/\/doi.org\/10.3390\/s23094441","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,1]]}}}