ENHANCING NETWORK SECURITY IN SDN ENVIRONMENTS: DEVELOPING A DEEP LEARNING-BASED INTRUSION DETECTION SYSTEM FOR EFFECTIVE ANOMALY DETECTION Article Swipe
Shumaila Riffat,Dr. Nasrullah
·
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.5281/zenodo.17878011
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.5281/zenodo.17878011
Related Topics
Concepts
Metadata
- Type
- article
- Landing Page
- https://doi.org/10.5281/zenodo.17878011
- OA Status
- green
- OpenAlex ID
- https://openalex.org/W7114781478
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W7114781478Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.5281/zenodo.17878011Digital Object Identifier
- Title
-
ENHANCING NETWORK SECURITY IN SDN ENVIRONMENTS: DEVELOPING A DEEP LEARNING-BASED INTRUSION DETECTION SYSTEM FOR EFFECTIVE ANOMALY DETECTIONWork title
- Type
-
articleOpenAlex work type
- Publication year
-
2025Year of publication
- Publication date
-
2025-12-10Full publication date if available
- Authors
-
Shumaila Riffat,Dr. NasrullahList of authors in order
- Landing page
-
https://doi.org/10.5281/zenodo.17878011Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.5281/zenodo.17878011Direct OA link when available
- Concepts
-
Intrusion detection system, Computer science, Anomaly detection, Network security, Anomaly-based intrusion detection system, Computer network, Computer security, Intrusion prevention system, Key (lock), Feature (linguistics), Information security, Denial-of-service attack, Data securityTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
Full payload
| id | https://openalex.org/W7114781478 |
|---|---|
| doi | https://doi.org/10.5281/zenodo.17878011 |
| ids.doi | https://doi.org/10.5281/zenodo.17878011 |
| ids.openalex | https://openalex.org/W7114781478 |
| fwci | 0.0 |
| type | article |
| title | ENHANCING NETWORK SECURITY IN SDN ENVIRONMENTS: DEVELOPING A DEEP LEARNING-BASED INTRUSION DETECTION SYSTEM FOR EFFECTIVE ANOMALY DETECTION |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.44769933819770813 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T10714 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.04539499431848526 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Software-Defined Networks and 5G |
| topics[2].id | https://openalex.org/T12203 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.034107908606529236 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Mobile Agent-Based Network Management |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C35525427 |
| concepts[0].level | 2 |
| concepts[0].score | 0.6644014120101929 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[0].display_name | Intrusion detection system |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.6146696209907532 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C739882 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5303543210029602 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3560506 |
| concepts[2].display_name | Anomaly detection |
| concepts[3].id | https://openalex.org/C182590292 |
| concepts[3].level | 2 |
| concepts[3].score | 0.4705077111721039 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q989632 |
| concepts[3].display_name | Network security |
| concepts[4].id | https://openalex.org/C137524506 |
| concepts[4].level | 3 |
| concepts[4].score | 0.4678495526313782 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q2247688 |
| concepts[4].display_name | Anomaly-based intrusion detection system |
| concepts[5].id | https://openalex.org/C31258907 |
| concepts[5].level | 1 |
| concepts[5].score | 0.3941178619861603 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[5].display_name | Computer network |
| concepts[6].id | https://openalex.org/C38652104 |
| concepts[6].level | 1 |
| concepts[6].score | 0.37366265058517456 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[6].display_name | Computer security |
| concepts[7].id | https://openalex.org/C27061796 |
| concepts[7].level | 3 |
| concepts[7].score | 0.3488514721393585 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[7].display_name | Intrusion prevention system |
| concepts[8].id | https://openalex.org/C26517878 |
| concepts[8].level | 2 |
| concepts[8].score | 0.3243464529514313 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[8].display_name | Key (lock) |
| concepts[9].id | https://openalex.org/C2776401178 |
| concepts[9].level | 2 |
| concepts[9].score | 0.263936847448349 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q12050496 |
| concepts[9].display_name | Feature (linguistics) |
| concepts[10].id | https://openalex.org/C527648132 |
| concepts[10].level | 2 |
| concepts[10].score | 0.2600956857204437 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q189900 |
| concepts[10].display_name | Information security |
| concepts[11].id | https://openalex.org/C38822068 |
| concepts[11].level | 3 |
| concepts[11].score | 0.2581414580345154 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[11].display_name | Denial-of-service attack |
| concepts[12].id | https://openalex.org/C10511746 |
| concepts[12].level | 3 |
| concepts[12].score | 0.25432780385017395 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q899388 |
| concepts[12].display_name | Data security |
| keywords[0].id | https://openalex.org/keywords/intrusion-detection-system |
| keywords[0].score | 0.6644014120101929 |
| keywords[0].display_name | Intrusion detection system |
| keywords[1].id | https://openalex.org/keywords/anomaly-detection |
| keywords[1].score | 0.5303543210029602 |
| keywords[1].display_name | Anomaly detection |
| keywords[2].id | https://openalex.org/keywords/network-security |
| keywords[2].score | 0.4705077111721039 |
| keywords[2].display_name | Network security |
| keywords[3].id | https://openalex.org/keywords/anomaly-based-intrusion-detection-system |
| keywords[3].score | 0.4678495526313782 |
| keywords[3].display_name | Anomaly-based intrusion detection system |
| keywords[4].id | https://openalex.org/keywords/intrusion-prevention-system |
| keywords[4].score | 0.3488514721393585 |
| keywords[4].display_name | Intrusion prevention system |
| keywords[5].id | https://openalex.org/keywords/key |
| keywords[5].score | 0.3243464529514313 |
| keywords[5].display_name | Key (lock) |
| language | |
| locations[0].id | doi:10.5281/zenodo.17878011 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400562 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| locations[0].source.host_organization | https://openalex.org/I67311998 |
| locations[0].source.host_organization_name | European Organization for Nuclear Research |
| locations[0].source.host_organization_lineage | https://openalex.org/I67311998 |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | |
| locations[0].raw_type | article-journal |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | False |
| locations[0].is_published | |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | https://doi.org/10.5281/zenodo.17878011 |
| indexed_in | datacite |
| authorships[0].author.id | |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Shumaila Riffat,Dr. Nasrullah |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Shumaila Riffat,Dr. Nasrullah |
| authorships[0].is_corresponding | True |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.5281/zenodo.17878011 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-12-11T00:00:00 |
| display_name | ENHANCING NETWORK SECURITY IN SDN ENVIRONMENTS: DEVELOPING A DEEP LEARNING-BASED INTRUSION DETECTION SYSTEM FOR EFFECTIVE ANOMALY DETECTION |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-12-11T23:13:37.075516 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.44769933819770813 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.5281/zenodo.17878011 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400562 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| best_oa_location.source.host_organization | https://openalex.org/I67311998 |
| best_oa_location.source.host_organization_name | European Organization for Nuclear Research |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I67311998 |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | |
| best_oa_location.raw_type | article-journal |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.5281/zenodo.17878011 |
| primary_location.id | doi:10.5281/zenodo.17878011 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400562 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| primary_location.source.host_organization | https://openalex.org/I67311998 |
| primary_location.source.host_organization_name | European Organization for Nuclear Research |
| primary_location.source.host_organization_lineage | https://openalex.org/I67311998 |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | |
| primary_location.raw_type | article-journal |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | https://doi.org/10.5281/zenodo.17878011 |
| publication_date | 2025-12-10 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index | |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 1 |
| citation_normalized_percentile.value | 0.83484408 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |