{"id":"https://openalex.org/W4404102101","doi":"https://doi.org/10.1109/nof62948.2024.10741358","title":"Precision DDoS Detection through Gaussian Noise-Augmented Neural Networks","display_name":"Precision DDoS Detection through Gaussian Noise-Augmented Neural Networks","publication_year":2024,"publication_date":"2024-10-02","ids":{"openalex":"https://openalex.org/W4404102101","doi":"https://doi.org/10.1109/nof62948.2024.10741358"},"language":"en","primary_location":{"id":"doi:10.1109/nof62948.2024.10741358","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nof62948.2024.10741358","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Network of the Future (NoF)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092220871","display_name":"Ali Alfatemi","orcid":null},"institutions":[{"id":"https://openalex.org/I164389053","display_name":"Fordham University","ror":"https://ror.org/03qnxaf80","country_code":"US","type":"education","lineage":["https://openalex.org/I164389053"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ali Alfatemi","raw_affiliation_strings":["Fordham University,Computer &#x0026; Information Science Dept.,Bronx,NY,USA,10458"],"affiliations":[{"raw_affiliation_string":"Fordham University,Computer &#x0026; Information Science Dept.,Bronx,NY,USA,10458","institution_ids":["https://openalex.org/I164389053"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100914780","display_name":"Diogo Oliveira","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Diogo Oliveira","raw_affiliation_strings":["Penn State University,College of IST,Monaca,PA,USA,15601"],"affiliations":[{"raw_affiliation_string":"Penn State University,College of IST,Monaca,PA,USA,15601","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017529726","display_name":"Mohamed Rahouti","orcid":"https://orcid.org/0000-0001-9701-5505"},"institutions":[{"id":"https://openalex.org/I164389053","display_name":"Fordham University","ror":"https://ror.org/03qnxaf80","country_code":"US","type":"education","lineage":["https://openalex.org/I164389053"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohamed Rahouti","raw_affiliation_strings":["Fordham University,Computer &#x0026; Information Science Dept.,New York, NY,USA,10023"],"affiliations":[{"raw_affiliation_string":"Fordham University,Computer &#x0026; Information Science Dept.,New York, NY,USA,10023","institution_ids":["https://openalex.org/I164389053"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083262615","display_name":"Abdelatif Hafid","orcid":"https://orcid.org/0000-0002-1377-1387"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Abdelatif Hafid","raw_affiliation_strings":["ESISA,ESISA Analytica Laboratory,Fez,Morocco,30000"],"affiliations":[{"raw_affiliation_string":"ESISA,ESISA Analytica Laboratory,Fez,Morocco,30000","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022742519","display_name":"Nasir Ghani","orcid":"https://orcid.org/0000-0002-9475-7439"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nasir Ghani","raw_affiliation_strings":["University of South Florida,Electrical Engineering Dept.,Tampa,FL,USA,33620"],"affiliations":[{"raw_affiliation_string":"University of South Florida,Electrical Engineering Dept.,Tampa,FL,USA,33620","institution_ids":["https://openalex.org/I2613432"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5092220871"],"corresponding_institution_ids":["https://openalex.org/I164389053"],"apc_list":null,"apc_paid":null,"fwci":2.1264,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.8941119,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"178","last_page":"185"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6933109164237976},{"id":"https://openalex.org/keywords/gaussian-noise","display_name":"Gaussian noise","score":0.5364896059036255},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5193770527839661},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.516925036907196},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4726647138595581},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4266894459724426},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.4246661961078644},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.34943801164627075},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07661250233650208}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6933109164237976},{"id":"https://openalex.org/C4199805","wikidata":"https://www.wikidata.org/wiki/Q2725903","display_name":"Gaussian noise","level":2,"score":0.5364896059036255},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5193770527839661},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.516925036907196},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4726647138595581},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4266894459724426},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.4246661961078644},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.34943801164627075},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07661250233650208},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/nof62948.2024.10741358","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nof62948.2024.10741358","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Network of the Future (NoF)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.6200000047683716,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W2147878151","https://openalex.org/W2762568740","https://openalex.org/W2766235013","https://openalex.org/W2789828921","https://openalex.org/W2791319097","https://openalex.org/W2886504452","https://openalex.org/W2898400810","https://openalex.org/W2901539244","https://openalex.org/W2926701059","https://openalex.org/W2975191072","https://openalex.org/W2982682021","https://openalex.org/W3094037037","https://openalex.org/W3172076356","https://openalex.org/W4210779665","https://openalex.org/W4214893216","https://openalex.org/W4225728612","https://openalex.org/W4225781802","https://openalex.org/W4226315262","https://openalex.org/W4280575251","https://openalex.org/W4295308370","https://openalex.org/W4318052012","https://openalex.org/W4362639200","https://openalex.org/W4387969885","https://openalex.org/W6630873519","https://openalex.org/W6674330103"],"related_works":["https://openalex.org/W2765763546","https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4390188535","https://openalex.org/W4256682929","https://openalex.org/W1970319972","https://openalex.org/W2572355887","https://openalex.org/W2953254336","https://openalex.org/W2112030392"],"abstract_inverted_index":{"The":[0,43,94],"detection":[1],"of":[2,5,63,73,83,100,107],"Distributed":[3],"Denial":[4],"Service":[6],"(DDoS)":[7],"attacks":[8],"is":[9,60],"a":[10,33,46],"critical":[11],"challenge":[12],"in":[13,103],"network":[14,35,91,109],"security,":[15],"requiring":[16],"effective":[17],"and":[18,24,54,70,81],"efficient":[19],"solutions":[20],"to":[21,49],"safeguard":[22],"data":[23],"services.":[25],"This":[26],"paper":[27],"addresses":[28],"this":[29,84],"problem":[30],"by":[31],"introducing":[32],"neural":[34,108],"model":[36,44],"specifically":[37],"designed":[38],"for":[39,89,111],"DDoS":[40],"attack":[41],"detection.":[42],"employs":[45],"streamlined":[47],"architecture":[48],"ensure":[50],"rapid":[51],"processing":[52],"times":[53],"high":[55],"performance.":[56],"A":[57],"key":[58],"innovation":[59],"the":[61,68,74,79,97,105],"integration":[62],"Gaussian":[64],"noise,":[65],"which":[66],"enhances":[67],"robustness":[69],"generalization":[71],"capabilities":[72],"model.":[75],"Extensive":[76],"experiments":[77],"validate":[78],"effectiveness":[80],"resilience":[82],"approach,":[85],"demonstrating":[86],"its":[87],"practicality":[88],"real-world":[90],"security":[92],"applications.":[93],"findings":[95],"highlight":[96],"significant":[98],"role":[99],"noise":[101],"regularization":[102],"improving":[104],"reliability":[106],"models":[110],"detecting":[112],"cyber":[113],"threats.":[114]},"counts_by_year":[{"year":2025,"cited_by_count":6}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
