Overhead Reduction Technique for Software-Defined Network Based Intrusion Detection Systems Article Swipe
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.1109/access.2022.3184722
In Software-Defined Networks, the Intrusion Detection System is receiving growing attention, due to the expansion of the internet and cloud storage. This system is vital for institutions that use cloud services and have many users. Although the Intrusion Detection System offers several security features, its performance is lagging behind in large enterprise networks. Existing approaches are based on centralised processing and use many features to implement a protection system. Therefore, system overload and poor performance occur on the controller and OpenFlow switches. As a result, the current solutions create issues that must be considered, especially when they are implemented on large networks. Furthermore, enhancements in security applications improve the reliability of networks. Following a literature review of the existing Intrusion Detection Systems, this paper presents a new model that offers decentralised processing and exchanges data over an independent channel, in order to solve issues relating to system overload and poor performance. Our model utilises an appropriate feature selection method to reduce the number of extracted features and minimise the data transmitted over the channels. Additionally, the Naive Bayes algorithm has been employed for flow classification purposes, since it is a fast classifier. We successfully implemented our framework, using the Mininet emulator, which provides a suitable networking environment. Evaluations indicate that our proposed system can detect various attacks with an accuracy of 98.46% and nominal decreasing rates of 1.5% in throughput and 0.7% in latency analyses, when the model is implemented in wide range networks.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1109/access.2022.3184722
- https://ieeexplore.ieee.org/ielx7/6287639/6514899/09801851.pdf
- OA Status
- gold
- Cited By
- 22
- References
- 29
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4285181607
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4285181607Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1109/access.2022.3184722Digital Object Identifier
- Title
-
Overhead Reduction Technique for Software-Defined Network Based Intrusion Detection SystemsWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2022Year of publication
- Publication date
-
2022-01-01Full publication date if available
- Authors
-
Ahmed H. Janabi, Triantafyllos Kanakis, Mark JohnsonList of authors in order
- Landing page
-
https://doi.org/10.1109/access.2022.3184722Publisher landing page
- PDF URL
-
https://ieeexplore.ieee.org/ielx7/6287639/6514899/09801851.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://ieeexplore.ieee.org/ielx7/6287639/6514899/09801851.pdfDirect OA link when available
- Concepts
-
Computer science, Intrusion detection system, Cloud computing, Computer network, Overhead (engineering), Interoperability, Distributed computing, Embedded system, Real-time computing, Computer security, Operating systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
22Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 7, 2024: 10, 2023: 4, 2022: 1Per-year citation counts (last 5 years)
- References (count)
-
29Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4285181607 |
|---|---|
| doi | https://doi.org/10.1109/access.2022.3184722 |
| ids.doi | https://doi.org/10.1109/access.2022.3184722 |
| ids.openalex | https://openalex.org/W4285181607 |
| fwci | 4.71331839 |
| type | article |
| title | Overhead Reduction Technique for Software-Defined Network Based Intrusion Detection Systems |
| biblio.issue | |
| biblio.volume | 10 |
| biblio.last_page | 66491 |
| biblio.first_page | 66481 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T10714 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9998999834060669 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Software-Defined Networks and 5G |
| topics[2].id | https://openalex.org/T11241 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9993000030517578 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1711 |
| topics[2].subfield.display_name | Signal Processing |
| topics[2].display_name | Advanced Malware Detection Techniques |
| is_xpac | False |
| apc_list.value | 1850 |
| apc_list.currency | USD |
| apc_list.value_usd | 1850 |
| apc_paid.value | 1850 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 1850 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8581633567810059 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C35525427 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6422276496887207 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[1].display_name | Intrusion detection system |
| concepts[2].id | https://openalex.org/C79974875 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5870116949081421 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[2].display_name | Cloud computing |
| concepts[3].id | https://openalex.org/C31258907 |
| concepts[3].level | 1 |
| concepts[3].score | 0.4313862919807434 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[3].display_name | Computer network |
| concepts[4].id | https://openalex.org/C2779960059 |
| concepts[4].level | 2 |
| concepts[4].score | 0.4197431802749634 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q7113681 |
| concepts[4].display_name | Overhead (engineering) |
| concepts[5].id | https://openalex.org/C20136886 |
| concepts[5].level | 2 |
| concepts[5].score | 0.4147432744503021 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q749647 |
| concepts[5].display_name | Interoperability |
| concepts[6].id | https://openalex.org/C120314980 |
| concepts[6].level | 1 |
| concepts[6].score | 0.404202401638031 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q180634 |
| concepts[6].display_name | Distributed computing |
| concepts[7].id | https://openalex.org/C149635348 |
| concepts[7].level | 1 |
| concepts[7].score | 0.3535003662109375 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q193040 |
| concepts[7].display_name | Embedded system |
| concepts[8].id | https://openalex.org/C79403827 |
| concepts[8].level | 1 |
| concepts[8].score | 0.32304614782333374 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q3988 |
| concepts[8].display_name | Real-time computing |
| concepts[9].id | https://openalex.org/C38652104 |
| concepts[9].level | 1 |
| concepts[9].score | 0.23213976621627808 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[9].display_name | Computer security |
| concepts[10].id | https://openalex.org/C111919701 |
| concepts[10].level | 1 |
| concepts[10].score | 0.166180819272995 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[10].display_name | Operating system |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8581633567810059 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/intrusion-detection-system |
| keywords[1].score | 0.6422276496887207 |
| keywords[1].display_name | Intrusion detection system |
| keywords[2].id | https://openalex.org/keywords/cloud-computing |
| keywords[2].score | 0.5870116949081421 |
| keywords[2].display_name | Cloud computing |
| keywords[3].id | https://openalex.org/keywords/computer-network |
| keywords[3].score | 0.4313862919807434 |
| keywords[3].display_name | Computer network |
| keywords[4].id | https://openalex.org/keywords/overhead |
| keywords[4].score | 0.4197431802749634 |
| keywords[4].display_name | Overhead (engineering) |
| keywords[5].id | https://openalex.org/keywords/interoperability |
| keywords[5].score | 0.4147432744503021 |
| keywords[5].display_name | Interoperability |
| keywords[6].id | https://openalex.org/keywords/distributed-computing |
| keywords[6].score | 0.404202401638031 |
| keywords[6].display_name | Distributed computing |
| keywords[7].id | https://openalex.org/keywords/embedded-system |
| keywords[7].score | 0.3535003662109375 |
| keywords[7].display_name | Embedded system |
| keywords[8].id | https://openalex.org/keywords/real-time-computing |
| keywords[8].score | 0.32304614782333374 |
| keywords[8].display_name | Real-time computing |
| keywords[9].id | https://openalex.org/keywords/computer-security |
| keywords[9].score | 0.23213976621627808 |
| keywords[9].display_name | Computer security |
| keywords[10].id | https://openalex.org/keywords/operating-system |
| keywords[10].score | 0.166180819272995 |
| keywords[10].display_name | Operating system |
| language | en |
| locations[0].id | doi:10.1109/access.2022.3184722 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2485537415 |
| locations[0].source.issn | 2169-3536 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2169-3536 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | IEEE Access |
| locations[0].source.host_organization | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_name | Institute of Electrical and Electronics Engineers |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://ieeexplore.ieee.org/ielx7/6287639/6514899/09801851.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | IEEE Access |
| locations[0].landing_page_url | https://doi.org/10.1109/access.2022.3184722 |
| locations[1].id | pmh:oai:doaj.org/article:39b1d28bed2149a4a1dae8b0dc796d36 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | cc-by-sa |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | https://openalex.org/licenses/cc-by-sa |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | IEEE Access, Vol 10, Pp 66481-66491 (2022) |
| locations[1].landing_page_url | https://doaj.org/article/39b1d28bed2149a4a1dae8b0dc796d36 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5023443547 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-2773-9780 |
| authorships[0].author.display_name | Ahmed H. Janabi |
| authorships[0].countries | GB, IQ |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I166455938 |
| authorships[0].affiliations[0].raw_affiliation_string | IT Unit, Al-Mustaqbal University College, Babylon, Iraq |
| authorships[0].affiliations[1].institution_ids | https://openalex.org/I35870678 |
| authorships[0].affiliations[1].raw_affiliation_string | Department of Computing, University of Northampton, Northampton, U.K. |
| authorships[0].institutions[0].id | https://openalex.org/I35870678 |
| authorships[0].institutions[0].ror | https://ror.org/04jp2hx10 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I35870678 |
| authorships[0].institutions[0].country_code | GB |
| authorships[0].institutions[0].display_name | University of Northampton |
| authorships[0].institutions[1].id | https://openalex.org/I166455938 |
| authorships[0].institutions[1].ror | https://ror.org/0170edc15 |
| authorships[0].institutions[1].type | education |
| authorships[0].institutions[1].lineage | https://openalex.org/I166455938 |
| authorships[0].institutions[1].country_code | IQ |
| authorships[0].institutions[1].display_name | University of Babylon |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Ahmed H. Janabi |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Computing, University of Northampton, Northampton, U.K., IT Unit, Al-Mustaqbal University College, Babylon, Iraq |
| authorships[1].author.id | https://openalex.org/A5072332319 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-3492-037X |
| authorships[1].author.display_name | Triantafyllos Kanakis |
| authorships[1].countries | GB |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I35870678 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Computing, University of Northampton, Northampton, U.K. |
| authorships[1].institutions[0].id | https://openalex.org/I35870678 |
| authorships[1].institutions[0].ror | https://ror.org/04jp2hx10 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I35870678 |
| authorships[1].institutions[0].country_code | GB |
| authorships[1].institutions[0].display_name | University of Northampton |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Triantafyllos Kanakis |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of Computing, University of Northampton, Northampton, U.K. |
| authorships[2].author.id | https://openalex.org/A5101613657 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-9840-717X |
| authorships[2].author.display_name | Mark Johnson |
| authorships[2].countries | GB |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I35870678 |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Computing, University of Northampton, Northampton, U.K. |
| authorships[2].institutions[0].id | https://openalex.org/I35870678 |
| authorships[2].institutions[0].ror | https://ror.org/04jp2hx10 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I35870678 |
| authorships[2].institutions[0].country_code | GB |
| authorships[2].institutions[0].display_name | University of Northampton |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Mark Johnson |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Computing, University of Northampton, Northampton, U.K. |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://ieeexplore.ieee.org/ielx7/6287639/6514899/09801851.pdf |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Overhead Reduction Technique for Software-Defined Network Based Intrusion Detection Systems |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2093262417, https://openalex.org/W2123131699, https://openalex.org/W650116260, https://openalex.org/W2378329187, https://openalex.org/W4390790060, https://openalex.org/W2134191509, https://openalex.org/W3209454962, https://openalex.org/W79697243, https://openalex.org/W2314257840, https://openalex.org/W2365800294 |
| cited_by_count | 22 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 7 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 10 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 4 |
| counts_by_year[3].year | 2022 |
| counts_by_year[3].cited_by_count | 1 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1109/access.2022.3184722 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2485537415 |
| best_oa_location.source.issn | 2169-3536 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2169-3536 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | IEEE Access |
| best_oa_location.source.host_organization | https://openalex.org/P4310319808 |
| best_oa_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| best_oa_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://ieeexplore.ieee.org/ielx7/6287639/6514899/09801851.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | IEEE Access |
| best_oa_location.landing_page_url | https://doi.org/10.1109/access.2022.3184722 |
| primary_location.id | doi:10.1109/access.2022.3184722 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2485537415 |
| primary_location.source.issn | 2169-3536 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2169-3536 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | IEEE Access |
| primary_location.source.host_organization | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://ieeexplore.ieee.org/ielx7/6287639/6514899/09801851.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | IEEE Access |
| primary_location.landing_page_url | https://doi.org/10.1109/access.2022.3184722 |
| publication_date | 2022-01-01 |
| publication_year | 2022 |
| referenced_works | https://openalex.org/W2956030019, https://openalex.org/W4200614416, https://openalex.org/W3087753814, https://openalex.org/W2958285686, https://openalex.org/W2948384692, https://openalex.org/W2977970678, https://openalex.org/W2938258273, https://openalex.org/W2994694149, https://openalex.org/W3200355093, https://openalex.org/W3194105363, https://openalex.org/W3158970569, https://openalex.org/W3175818073, https://openalex.org/W2799843691, https://openalex.org/W2755605905, https://openalex.org/W1564899748, https://openalex.org/W2293559422, https://openalex.org/W4214893216, https://openalex.org/W2518836861, https://openalex.org/W2578602113, https://openalex.org/W2548037070, https://openalex.org/W2989690704, https://openalex.org/W2963200950, https://openalex.org/W3126568636, https://openalex.org/W4206602744, https://openalex.org/W4225341315, https://openalex.org/W4210541099, https://openalex.org/W3121065372, https://openalex.org/W3042540017, https://openalex.org/W2897881766 |
| referenced_works_count | 29 |
| abstract_inverted_index.a | 66, 83, 113, 125, 189, 203 |
| abstract_inverted_index.As | 82 |
| abstract_inverted_index.In | 0 |
| abstract_inverted_index.We | 192 |
| abstract_inverted_index.an | 136, 154, 218 |
| abstract_inverted_index.be | 92 |
| abstract_inverted_index.in | 49, 104, 139, 228, 232, 240 |
| abstract_inverted_index.is | 7, 23, 46, 188, 238 |
| abstract_inverted_index.it | 187 |
| abstract_inverted_index.of | 15, 110, 116, 163, 220, 226 |
| abstract_inverted_index.on | 57, 76, 99 |
| abstract_inverted_index.to | 12, 64, 141, 145, 159 |
| abstract_inverted_index.Our | 151 |
| abstract_inverted_index.and | 18, 31, 60, 72, 79, 132, 148, 166, 222, 230 |
| abstract_inverted_index.are | 55, 97 |
| abstract_inverted_index.can | 213 |
| abstract_inverted_index.due | 11 |
| abstract_inverted_index.for | 25, 182 |
| abstract_inverted_index.has | 179 |
| abstract_inverted_index.its | 44 |
| abstract_inverted_index.new | 126 |
| abstract_inverted_index.our | 195, 210 |
| abstract_inverted_index.the | 3, 13, 16, 36, 77, 85, 108, 117, 161, 168, 172, 175, 198, 236 |
| abstract_inverted_index.use | 28, 61 |
| abstract_inverted_index.This | 21 |
| abstract_inverted_index.been | 180 |
| abstract_inverted_index.data | 134, 169 |
| abstract_inverted_index.fast | 190 |
| abstract_inverted_index.flow | 183 |
| abstract_inverted_index.have | 32 |
| abstract_inverted_index.many | 33, 62 |
| abstract_inverted_index.must | 91 |
| abstract_inverted_index.over | 135, 171 |
| abstract_inverted_index.poor | 73, 149 |
| abstract_inverted_index.that | 27, 90, 128, 209 |
| abstract_inverted_index.they | 96 |
| abstract_inverted_index.this | 122 |
| abstract_inverted_index.when | 95, 235 |
| abstract_inverted_index.wide | 241 |
| abstract_inverted_index.with | 217 |
| abstract_inverted_index.Bayes | 177 |
| abstract_inverted_index.Naive | 176 |
| abstract_inverted_index.based | 56 |
| abstract_inverted_index.cloud | 19, 29 |
| abstract_inverted_index.large | 50, 100 |
| abstract_inverted_index.model | 127, 152, 237 |
| abstract_inverted_index.occur | 75 |
| abstract_inverted_index.order | 140 |
| abstract_inverted_index.paper | 123 |
| abstract_inverted_index.range | 242 |
| abstract_inverted_index.rates | 225 |
| abstract_inverted_index.since | 186 |
| abstract_inverted_index.solve | 142 |
| abstract_inverted_index.using | 197 |
| abstract_inverted_index.vital | 24 |
| abstract_inverted_index.which | 201 |
| abstract_inverted_index.System | 6, 39 |
| abstract_inverted_index.behind | 48 |
| abstract_inverted_index.create | 88 |
| abstract_inverted_index.detect | 214 |
| abstract_inverted_index.issues | 89, 143 |
| abstract_inverted_index.method | 158 |
| abstract_inverted_index.number | 162 |
| abstract_inverted_index.offers | 40, 129 |
| abstract_inverted_index.reduce | 160 |
| abstract_inverted_index.review | 115 |
| abstract_inverted_index.system | 22, 70, 146, 212 |
| abstract_inverted_index.users. | 34 |
| abstract_inverted_index.Mininet | 199 |
| abstract_inverted_index.attacks | 216 |
| abstract_inverted_index.current | 86 |
| abstract_inverted_index.feature | 156 |
| abstract_inverted_index.growing | 9 |
| abstract_inverted_index.improve | 107 |
| abstract_inverted_index.lagging | 47 |
| abstract_inverted_index.latency | 233 |
| abstract_inverted_index.nominal | 223 |
| abstract_inverted_index.result, | 84 |
| abstract_inverted_index.several | 41 |
| abstract_inverted_index.system. | 68 |
| abstract_inverted_index.various | 215 |
| abstract_inverted_index.Although | 35 |
| abstract_inverted_index.Existing | 53 |
| abstract_inverted_index.OpenFlow | 80 |
| abstract_inverted_index.Systems, | 121 |
| abstract_inverted_index.accuracy | 219 |
| abstract_inverted_index.channel, | 138 |
| abstract_inverted_index.employed | 181 |
| abstract_inverted_index.existing | 118 |
| abstract_inverted_index.features | 63, 165 |
| abstract_inverted_index.indicate | 208 |
| abstract_inverted_index.internet | 17 |
| abstract_inverted_index.minimise | 167 |
| abstract_inverted_index.overload | 71, 147 |
| abstract_inverted_index.presents | 124 |
| abstract_inverted_index.proposed | 211 |
| abstract_inverted_index.provides | 202 |
| abstract_inverted_index.relating | 144 |
| abstract_inverted_index.security | 42, 105 |
| abstract_inverted_index.services | 30 |
| abstract_inverted_index.storage. | 20 |
| abstract_inverted_index.suitable | 204 |
| abstract_inverted_index.utilises | 153 |
| abstract_inverted_index.Detection | 5, 38, 120 |
| abstract_inverted_index.Following | 112 |
| abstract_inverted_index.Intrusion | 4, 37, 119 |
| abstract_inverted_index.Networks, | 2 |
| abstract_inverted_index.algorithm | 178 |
| abstract_inverted_index.analyses, | 234 |
| abstract_inverted_index.channels. | 173 |
| abstract_inverted_index.emulator, | 200 |
| abstract_inverted_index.exchanges | 133 |
| abstract_inverted_index.expansion | 14 |
| abstract_inverted_index.extracted | 164 |
| abstract_inverted_index.features, | 43 |
| abstract_inverted_index.implement | 65 |
| abstract_inverted_index.networks. | 52, 101, 111, 243 |
| abstract_inverted_index.purposes, | 185 |
| abstract_inverted_index.receiving | 8 |
| abstract_inverted_index.selection | 157 |
| abstract_inverted_index.solutions | 87 |
| abstract_inverted_index.switches. | 81 |
| abstract_inverted_index.Therefore, | 69 |
| abstract_inverted_index.approaches | 54 |
| abstract_inverted_index.attention, | 10 |
| abstract_inverted_index.controller | 78 |
| abstract_inverted_index.decreasing | 224 |
| abstract_inverted_index.enterprise | 51 |
| abstract_inverted_index.especially | 94 |
| abstract_inverted_index.framework, | 196 |
| abstract_inverted_index.literature | 114 |
| abstract_inverted_index.networking | 205 |
| abstract_inverted_index.processing | 59, 131 |
| abstract_inverted_index.protection | 67 |
| abstract_inverted_index.throughput | 229 |
| abstract_inverted_index.Evaluations | 207 |
| abstract_inverted_index.appropriate | 155 |
| abstract_inverted_index.centralised | 58 |
| abstract_inverted_index.classifier. | 191 |
| abstract_inverted_index.considered, | 93 |
| abstract_inverted_index.implemented | 98, 194, 239 |
| abstract_inverted_index.independent | 137 |
| abstract_inverted_index.performance | 45, 74 |
| abstract_inverted_index.reliability | 109 |
| abstract_inverted_index.transmitted | 170 |
| abstract_inverted_index.Furthermore, | 102 |
| abstract_inverted_index.applications | 106 |
| abstract_inverted_index.enhancements | 103 |
| abstract_inverted_index.environment. | 206 |
| abstract_inverted_index.institutions | 26 |
| abstract_inverted_index.performance. | 150 |
| abstract_inverted_index.successfully | 193 |
| abstract_inverted_index.Additionally, | 174 |
| abstract_inverted_index.decentralised | 130 |
| abstract_inverted_index.classification | 184 |
| abstract_inverted_index.0.7% | 231 |
| abstract_inverted_index.1.5% | 227 |
| abstract_inverted_index.Software-Defined | 1 |
| abstract_inverted_index.98.46% | 221 |
| cited_by_percentile_year.max | 99 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 3 |
| citation_normalized_percentile.value | 0.92399169 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |