Deep Learning-Based Approach for Detecting DDoS Attack on Software-Defined Networking Controller

datacite.relatedItem.firstPage296
datacite.relatedItem.issue6
datacite.relatedItem.relatedIdentifierTypeISSN
datacite.relatedItem.relatedItemIdentifier2079-8954
datacite.relatedItem.relationTypeIsPublishedIn
datacite.relatedItem.titleSystems
datacite.relatedItem.volume11
dc.contributor.authorAmran Mansoor
dc.contributor.authorMohammed Anbar
dc.contributor.authorAbdullah Bahashwan
dc.contributor.authorBasim Alabsi
dc.contributor.authorShaza Rihan
dc.date.accessioned2025-05-22T11:41:57Z
dc.date.available2025-05-22T11:41:57Z
dc.date.issued2023
dc.identifier.doihttps://doi.org/10.3390/systems11060296
dc.identifier.otherjz000180-0293
dc.identifier.urihttps://tustorage.ulb.tu-darmstadt.de/handle/tustorage/38540
dc.publisherMDPI AG
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.subject.ddc600
dc.titleDeep Learning-Based Approach for Detecting DDoS Attack on Software-Defined Networking Controller
dc.typeArticle
dcat.distribution.pdfhttps://tustorage.ulb.tu-darmstadt.de/handle/tustorage/38541
dcat.distribution.supplierxmlhttps://tustorage.ulb.tu-darmstadt.de/handle/tustorage/38542
dspace.entity.typeDataset
relation.isDistributionOfDataset8737e13a-1111-483f-b440-d4423f49da2b
relation.isDistributionOfDataset7e5fa84a-0f0c-42b4-949b-778d0ad1b4fa
relation.isDistributionOfDataset37779fff-6dcb-46ce-aa56-295a3657d3ad
relation.isDistributionOfDataset.latestForDiscovery8737e13a-1111-483f-b440-d4423f49da2b
wdm.archivematicaaipuuid.original44c6e199-64ad-49f3-ab3b-24dff16ae8c3

Files

Collections