{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T14:54:12Z","timestamp":1724511252042},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/camad.2018.8514971","type":"proceedings-article","created":{"date-parts":[[2018,11,20]],"date-time":"2018-11-20T01:45:18Z","timestamp":1542678318000},"source":"Crossref","is-referenced-by-count":38,"title":["Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks"],"prefix":"10.1109","author":[{"given":"Yandong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Mianxiong","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Kaoru","family":"Ota","sequence":"additional","affiliation":[]},{"given":"Jianhua","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2747158"},{"key":"ref11","article-title":"Big data analysis based security situational awareness for smart grid","author":"wu","year":"2016","journal-title":"IEEE Transactions on Big Data"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254023"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524500"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2015.01.013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.842221"},{"key":"ref4","article-title":"Ip traceback-based intelligent packet filtering: a novel technique for defending against internet ddos attacks","author":"sung","year":"2003","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199329"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838409"},{"key":"ref5","article-title":"Pushback: Router-based defense against ddos attacks","author":"ioannidis","year":"2001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2799000"},{"key":"ref7","article-title":"Detecting and mitigating target link-flooding attacks using sdn","author":"wang","year":"2018","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"ref1","article-title":"February 28th ddos incident report","author":"kottler","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2014.6876752"}],"event":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","location":"Barcelona","start":{"date-parts":[[2018,9,17]]},"end":{"date-parts":[[2018,9,19]]}},"container-title":["2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8500732\/8514932\/08514971.pdf?arnumber=8514971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T23:27:22Z","timestamp":1598225242000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8514971\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/camad.2018.8514971","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}