Journal articles on the topic 'Stretched Deep Networks (SDN)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Stretched Deep Networks (SDN).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Uhongora, Uakomba, Ronald Mulinde, Yee Wei Law, and Jill Slay. "Deep-learning-based Intrusion Detection for Software-defined Networking Space Systems." European Conference on Cyber Warfare and Security 22, no. 1 (June 19, 2023): 639–47. http://dx.doi.org/10.34190/eccws.22.1.1085.
Full textYaser, Ahmed Latif, Hamdy M. Mousa, and Mahmoud Hussein. "Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder." Future Internet 14, no. 8 (August 12, 2022): 240. http://dx.doi.org/10.3390/fi14080240.
Full textHande, Yogita, and Akkalashmi Muddana. "A Survey on Intrusion Detection System for Software Defined Networks (SDN)." International Journal of Business Data Communications and Networking 16, no. 1 (January 2020): 28–47. http://dx.doi.org/10.4018/ijbdcn.2020010103.
Full textShen, Fan, and Levi Perigo. "Dynamic SDN Controller Placement based on Deep Reinforcement Learning." International Journal of Next-Generation Networks 15, no. 1 (March 30, 2023): 1–13. http://dx.doi.org/10.5121/ijngn.2023.15101.
Full textZhang, Tianyi, and Yong Wang. "RLFAT: A Transformer-Based Relay Link Forged Attack Detection Mechanism in SDN." Electronics 12, no. 10 (May 15, 2023): 2247. http://dx.doi.org/10.3390/electronics12102247.
Full textLi, Jinlong, Xiaochen Yuan, Jinfeng Li, Guoheng Huang, Ping Li, and Li Feng. "CD-SDN: Unsupervised Sensitivity Disparity Networks for Hyper-Spectral Image Change Detection." Remote Sensing 14, no. 19 (September 26, 2022): 4806. http://dx.doi.org/10.3390/rs14194806.
Full textHarja, Danaswara Prawira, Andrian Rakhmatsyah, and Muhammad Arief Nugroho. "Implementasi untuk Meningkatkan Keamanan Jaringan Menggunakan Deep Packet Inspection pada Software Defined Networks." Indonesian Journal on Computing (Indo-JC) 4, no. 1 (March 22, 2019): 133. http://dx.doi.org/10.21108/indojc.2019.4.1.286.
Full textZhang, Lianming, Yong Lu, Dian Zhang, Haoran Cheng, and Pingping Dong. "DSOQR: Deep Reinforcement Learning for Online QoS Routing in SDN-Based Networks." Security and Communication Networks 2022 (November 29, 2022): 1–11. http://dx.doi.org/10.1155/2022/4457645.
Full textChaganti, Rajasekhar, Wael Suliman, Vinayakumar Ravi, and Amit Dua. "Deep Learning Approach for SDN-Enabled Intrusion Detection System in IoT Networks." Information 14, no. 1 (January 9, 2023): 41. http://dx.doi.org/10.3390/info14010041.
Full textLei, Kai, Yuzhi Liang, and Wei Li. "Congestion Control in SDN-Based Networks via Multi-Task Deep Reinforcement Learning." IEEE Network 34, no. 4 (July 2020): 28–34. http://dx.doi.org/10.1109/mnet.011.1900408.
Full textFu, Qiongxiao, Enchang Sun, Kang Meng, Meng Li, and Yanhua Zhang. "Deep Q-Learning for Routing Schemes in SDN-Based Data Center Networks." IEEE Access 8 (2020): 103491–99. http://dx.doi.org/10.1109/access.2020.2995511.
Full textPei, Jianing, Peilin Hong, Miao Pan, Jiangqing Liu, and Jingsong Zhou. "Optimal VNF Placement via Deep Reinforcement Learning in SDN/NFV-Enabled Networks." IEEE Journal on Selected Areas in Communications 38, no. 2 (February 2020): 263–78. http://dx.doi.org/10.1109/jsac.2019.2959181.
Full textUmair, Muhammad Basit, Zeshan Iqbal, Farrukh Zeeshan Khan, Muhammad Attique Khan, and Seifedine Kadry. "A Deep Learning Based Method for Network Application Classification in Software-Defined IoT." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 30, no. 03 (June 2022): 463–77. http://dx.doi.org/10.1142/s0218488522400165.
Full textLi, Guoyan, Yihui Shang, Yi Liu, and Xiangru Zhou. "A Network Traffic Prediction Model Based on Graph Neural Network in Software-Defined Networking." International Journal of Information Security and Privacy 16, no. 1 (January 1, 2022): 1–17. http://dx.doi.org/10.4018/ijisp.309130.
Full textXu, Chenglin, Cheng Xu, and Bo Li. "Multi-Agent Deep Q-Network Based Dynamic Controller Placement for Node Variable Software-Defined Mobile Edge-Cloud Computing Networks." Mathematics 11, no. 5 (March 4, 2023): 1247. http://dx.doi.org/10.3390/math11051247.
Full textLei, Fangyuan, Jun Cai, Qingyun Dai, and Huimin Zhao. "Deep Learning Based Proactive Caching for Effective WSN-Enabled Vision Applications." Complexity 2019 (May 2, 2019): 1–12. http://dx.doi.org/10.1155/2019/5498606.
Full textSong, Inseok, Prohim Tam, Seungwoo Kang, Seyha Ros, and Seokhoon Kim. "DRL-Based Backbone SDN Control Methods in UAV-Assisted Networks for Computational Resource Efficiency." Electronics 12, no. 13 (July 6, 2023): 2984. http://dx.doi.org/10.3390/electronics12132984.
Full textShazly, Khadija, Dina A. Salem, Nacereddine Hammami, and Ahmed I. B. ElSeddawy. "A Review on Distributed Denial of Service Detection in Software Defined Network." International Journal of Wireless and Ad Hoc Communication 5, no. 2 (2022): 08–18. http://dx.doi.org/10.54216/ijwac.050201.
Full textMousa, Amthal K., and Mohammed Najm Abdullah. "An Improved Deep Learning Model for DDoS Detection Based on Hybrid Stacked Autoencoder and Checkpoint Network." Future Internet 15, no. 8 (August 19, 2023): 278. http://dx.doi.org/10.3390/fi15080278.
Full textNegera, Worku Gachena, Friedhelm Schwenker, Taye Girma Debelee, Henock Mulugeta Melaku, and Yehualashet Megeresa Ayano. "Review of Botnet Attack Detection in SDN-Enabled IoT Using Machine Learning." Sensors 22, no. 24 (December 14, 2022): 9837. http://dx.doi.org/10.3390/s22249837.
Full textLing, Carlos, Konrad Tollmar, and Linus Gisslén. "Using Deep Convolutional Neural Networks to Detect Rendered Glitches in Video Games." Proceedings of the AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment 16, no. 1 (October 1, 2020): 66–73. http://dx.doi.org/10.1609/aiide.v16i1.7409.
Full textYe, Jin, Xiangyang Cheng, Jian Zhu, Luting Feng, and Ling Song. "A DDoS Attack Detection Method Based on SVM in Software Defined Network." Security and Communication Networks 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/9804061.
Full textChen, Junyan, Cenhuishan Liao, Yong Wang, Lei Jin, Xiaoye Lu, Xiaolan Xie, and Rui Yao. "AQMDRL: Automatic Quality of Service Architecture Based on Multistep Deep Reinforcement Learning in Software-Defined Networking." Sensors 23, no. 1 (December 30, 2022): 429. http://dx.doi.org/10.3390/s23010429.
Full textMansoor, Amran, Mohammed Anbar, Abdullah Ahmed Bahashwan, Basim Ahmad Alabsi, and Shaza Dawood Ahmed Rihan. "Deep Learning-Based Approach for Detecting DDoS Attack on Software-Defined Networking Controller." Systems 11, no. 6 (June 9, 2023): 296. http://dx.doi.org/10.3390/systems11060296.
Full textChuang, Hsiu-Min, Fanpyn Liu, and Chung-Hsien Tsai. "Early Detection of Abnormal Attacks in Software-Defined Networking Using Machine Learning Approaches." Symmetry 14, no. 6 (June 8, 2022): 1178. http://dx.doi.org/10.3390/sym14061178.
Full textEt. al., Shilpa P. Khedkar,. "A Deep Learning method for effective channel allotment for SDN based IOT." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 1721–28. http://dx.doi.org/10.17762/turcomat.v12i2.1508.
Full textMAJDOUB, MANEL, ALI EL KAMEL, and HABIB YOUSSEF. "DQR: An Efficient Deep Q-Based Routing Approach in Multi-Controller Software Defined WAN (SD-WAN)." Journal of Interconnection Networks 20, no. 04 (December 2020): 2150002. http://dx.doi.org/10.1142/s021926592150002x.
Full textKou, Liang, Shanshuo Ding, Ting Wu, Wei Dong, and Yuyu Yin. "An Intrusion Detection Model for Drone Communication Network in SDN Environment." Drones 6, no. 11 (November 4, 2022): 342. http://dx.doi.org/10.3390/drones6110342.
Full textSaleh, Sherine Nagy, and Cherine Fathy. "A Novel Deep-Learning Model for Remote Driver Monitoring in SDN-Based Internet of Autonomous Vehicles Using 5G Technologies." Applied Sciences 13, no. 2 (January 8, 2023): 875. http://dx.doi.org/10.3390/app13020875.
Full textUllah, Ihtisham, Basit Raza, Sikandar Ali, Irshad Ahmed Abbasi, Samad Baseer, and Azeem Irshad. "Software Defined Network Enabled Fog-to-Things Hybrid Deep Learning Driven Cyber Threat Detection System." Security and Communication Networks 2021 (December 3, 2021): 1–15. http://dx.doi.org/10.1155/2021/6136670.
Full textKhattab M. Ali Alheeti, Abdulkareem Alzahrani, Maha Alamri, Aythem Khairi Kareem, and Duaa Al_Dosary. "A Comparative Study for SDN Security Based on Machine Learning." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 11 (June 7, 2023): 131–40. http://dx.doi.org/10.3991/ijim.v17i11.39065.
Full textHou, Jiacheng, Tianhao Tao, Haoye Lu, and Amiya Nayak. "Intelligent Caching with Graph Neural Network-Based Deep Reinforcement Learning on SDN-Based ICN." Future Internet 15, no. 8 (July 26, 2023): 251. http://dx.doi.org/10.3390/fi15080251.
Full textSaqib, Muhammad, Farrukh Zeeshan Khan, Muneer Ahmed, and Raja Majid Mehmood. "A critical review on security approaches to software-defined wireless sensor networking." International Journal of Distributed Sensor Networks 15, no. 12 (December 2019): 155014771988990. http://dx.doi.org/10.1177/1550147719889906.
Full textMeng, Xiangli, Lingda Wu, and Shaobo Yu. "Research on Resource Allocation Method of Space Information Networks Based on Deep Reinforcement Learning." Remote Sensing 11, no. 4 (February 21, 2019): 448. http://dx.doi.org/10.3390/rs11040448.
Full textRavi, Vinayakumar, Rajasekhar Chaganti, and Mamoun Alazab. "Deep Learning Feature Fusion Approach for an Intrusion Detection System in SDN-Based IoT Networks." IEEE Internet of Things Magazine 5, no. 2 (June 2022): 24–29. http://dx.doi.org/10.1109/iotm.003.2200001.
Full textDing, Pengpeng, Jinguo Li, Liangliang Wang, Mi Wen, and Yuyao Guan. "HYBRID-CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid." Security and Communication Networks 2020 (August 3, 2020): 1–20. http://dx.doi.org/10.1155/2020/8850550.
Full textChen, Yi-Ren, Amir Rezapour, Wen-Guey Tzeng, and Shi-Chun Tsai. "RL-Routing: An SDN Routing Algorithm Based on Deep Reinforcement Learning." IEEE Transactions on Network Science and Engineering 7, no. 4 (October 1, 2020): 3185–99. http://dx.doi.org/10.1109/tnse.2020.3017751.
Full textŻotkiewicz, Mateusz, Wiktor Szałyga, Jaroslaw Domaszewicz, Andrzej Bąk, Zbigniew Kopertowski, and Stanisław Kozdrowski. "Artificial Intelligence Control Logic in Next-Generation Programmable Networks." Applied Sciences 11, no. 19 (October 2, 2021): 9163. http://dx.doi.org/10.3390/app11199163.
Full textSun, Penghao, Zehua Guo, Julong Lan, Junfei Li, Yuxiang Hu, and Thar Baker. "ScaleDRL: A Scalable Deep Reinforcement Learning Approach for Traffic Engineering in SDN with Pinning Control." Computer Networks 190 (May 2021): 107891. http://dx.doi.org/10.1016/j.comnet.2021.107891.
Full textChen, Dr Joy Iong Zong, and Dr Smys S. "Social Multimedia Security and Suspicious Activity Detection in SDN using Hybrid Deep Learning Technique." June 2020 2, no. 2 (May 27, 2020): 108–15. http://dx.doi.org/10.36548/jitdw.2020.2.004.
Full textDey, Samrat Kumar, and Md Mahbubur Rahman. "Effects of Machine Learning Approach in Flow-Based Anomaly Detection on Software-Defined Networking." Symmetry 12, no. 1 (December 18, 2019): 7. http://dx.doi.org/10.3390/sym12010007.
Full textGuo, Xuancheng, Hui Lin, Zhiyang Li, and Min Peng. "Deep-Reinforcement-Learning-Based QoS-Aware Secure Routing for SDN-IoT." IEEE Internet of Things Journal 7, no. 7 (July 2020): 6242–51. http://dx.doi.org/10.1109/jiot.2019.2960033.
Full textRizal, Rizal, Martanto Martanto, and Yudhistira Arie Wijaya. "ANALISA DATASET SOFTWARE DEFINED NETWORK INTRUSION MENGGUNAKAN ALGORITMA DEEP LEARNING H2O." JATI (Jurnal Mahasiswa Teknik Informatika) 6, no. 2 (October 31, 2022): 747–57. http://dx.doi.org/10.36040/jati.v6i2.5724.
Full textNovaes, Matheus P., Luiz F. Carvalho, Jaime Lloret, and Mario Lemes Proença. "Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments." Future Generation Computer Systems 125 (December 2021): 156–67. http://dx.doi.org/10.1016/j.future.2021.06.047.
Full textElubeyd, Hani, and Derya Yiltas-Kaplan. "Hybrid Deep Learning Approach for Automatic Dos/DDoS Attacks Detection in Software-Defined Networks." Applied Sciences 13, no. 6 (March 16, 2023): 3828. http://dx.doi.org/10.3390/app13063828.
Full textKhasawneh, Natheer, Mohammad Fraiwan, Luay Fraiwan, Basheer Khassawneh, and Ali Ibnian. "Detection of COVID-19 from Chest X-ray Images Using Deep Convolutional Neural Networks." Sensors 21, no. 17 (September 3, 2021): 5940. http://dx.doi.org/10.3390/s21175940.
Full textEl Kamel, Ali, Hamdi Eltaief, and Habib Youssef. "On-the-fly (D)DoS attack mitigation in SDN using Deep Neural Network-based rate limiting." Computer Communications 182 (January 2022): 153–69. http://dx.doi.org/10.1016/j.comcom.2021.11.003.
Full textZhang, Nan, Heikki Hämmäinen, and Hannu Flinck. "Cost efficiency of SDN-enabled service function chaining." info 18, no. 5 (August 8, 2016): 45–55. http://dx.doi.org/10.1108/info-03-2016-0011.
Full textAlonso, Ricardo S., Inés Sittón-Candanedo, Roberto Casado-Vara, Javier Prieto, and Juan M. Corchado. "Deep Reinforcement Learning for the Management of Software-Defined Networks and Network Function Virtualization in an Edge-IoT Architecture." Sustainability 12, no. 14 (July 15, 2020): 5706. http://dx.doi.org/10.3390/su12145706.
Full textMabel John, Prathima, and Rama Mohan Babu Kasturi Nagappasetty. "An intelligent system to detect slow denial of service attacks in software-defined networks." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (June 1, 2023): 3099. http://dx.doi.org/10.11591/ijece.v13i3.pp3099-3110.
Full text