{"id":"https://openalex.org/W4404222346","doi":"https://doi.org/10.32604/cmc.2024.057185","title":"Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking","display_name":"Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4404222346","doi":"https://doi.org/10.32604/cmc.2024.057185"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2024.057185","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2024.057185","pdf_url":"https://cdn.techscience.press/files/cmc/2024/TSP_CMC-81-2/TSP_CMC_57185/TSP_CMC_57185.pdf","source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cdn.techscience.press/files/cmc/2024/TSP_CMC-81-2/TSP_CMC_57185/TSP_CMC_57185.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110645550","display_name":"Hira Akhtar Butt","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hira Akhtar Butt","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108160159","display_name":"Khoula Said Al Harthy","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Khoula Said Al Harthy","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Mumtaz Ali Shah","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mumtaz Ali Shah","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103089150","display_name":"Mudassar Hussain","orcid":"https://orcid.org/0000-0002-8605-9075"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mudassar Hussain","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007077685","display_name":"Rashid Amin","orcid":"https://orcid.org/0000-0002-3143-689X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rashid Amin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5082514217","display_name":"Mujeeb Ur Rehman","orcid":"https://orcid.org/0000-0002-4228-385X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mujeeb Ur Rehman","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5110645550"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.7403,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.93934686,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"81","issue":"2","first_page":"3003","last_page":"3031"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9710000157356262,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8609880208969116},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7343869209289551},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.5827370882034302},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5731911063194275},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5187456607818604},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.472842276096344},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4364013075828552},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2664228677749634},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2602713704109192},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.11588108539581299}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8609880208969116},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7343869209289551},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.5827370882034302},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5731911063194275},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5187456607818604},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.472842276096344},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4364013075828552},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2664228677749634},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2602713704109192},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.11588108539581299}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2024.057185","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2024.057185","pdf_url":"https://cdn.techscience.press/files/cmc/2024/TSP_CMC-81-2/TSP_CMC_57185/TSP_CMC_57185.pdf","source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2024.057185","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2024.057185","pdf_url":"https://cdn.techscience.press/files/cmc/2024/TSP_CMC-81-2/TSP_CMC_57185/TSP_CMC_57185.pdf","source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4404222346.pdf","grobid_xml":"https://content.openalex.org/works/W4404222346.grobid-xml"},"referenced_works_count":43,"referenced_works":["https://openalex.org/W1901616594","https://openalex.org/W1993072051","https://openalex.org/W2088252378","https://openalex.org/W2135850590","https://openalex.org/W2137345105","https://openalex.org/W2155883880","https://openalex.org/W2162969618","https://openalex.org/W2172238468","https://openalex.org/W2299450638","https://openalex.org/W2482204222","https://openalex.org/W2531142914","https://openalex.org/W2552631155","https://openalex.org/W2768149277","https://openalex.org/W2896953488","https://openalex.org/W2938258273","https://openalex.org/W3004079980","https://openalex.org/W3032266608","https://openalex.org/W3047861058","https://openalex.org/W3093459272","https://openalex.org/W3118026702","https://openalex.org/W3126855403","https://openalex.org/W3136867180","https://openalex.org/W3148181069","https://openalex.org/W3161554626","https://openalex.org/W3181610599","https://openalex.org/W3209291644","https://openalex.org/W4200206556","https://openalex.org/W4205666904","https://openalex.org/W4243150065","https://openalex.org/W4362639200","https://openalex.org/W4383873907","https://openalex.org/W4386408881","https://openalex.org/W6632461232","https://openalex.org/W6677516838","https://openalex.org/W6678523554","https://openalex.org/W6750657446","https://openalex.org/W6752497734","https://openalex.org/W6755851146","https://openalex.org/W6770305447","https://openalex.org/W6782217683","https://openalex.org/W6846363342","https://openalex.org/W6869608176","https://openalex.org/W6930911446"],"related_works":["https://openalex.org/W2767068794","https://openalex.org/W4229489764","https://openalex.org/W3114854705","https://openalex.org/W2735897973","https://openalex.org/W4213341501","https://openalex.org/W1543555101","https://openalex.org/W3195575042","https://openalex.org/W2898113880","https://openalex.org/W2793567886","https://openalex.org/W4308272253"],"abstract_inverted_index":{"Detecting":[0],"sophisticated":[1],"cyberattacks,":[2],"mainly":[3],"Distributed":[4],"Denial":[5],"of":[6],"Service":[7],"(DDoS)":[8],"attacks,":[9],"with":[10],"unexpected":[11],"patterns":[12],"remains":[13],"challenging":[14],"in":[15],"modern":[16],"networks.":[17],"Traditional":[18],"detection":[19],"systems":[20],"often":[21],"struggle":[22],"to":[23],"mitigate":[24],"such":[25],"attacks...":[26],"|":[27],"Find,":[28],"read":[29],"and":[30],"cite":[31],"all":[32],"the":[33],"research":[34],"you":[35],"need":[36],"on":[37],"Tech":[38],"Science":[39],"Press":[40]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
