Support Vector Machine (SVM) based Detection for Volumetric Bandwidth Distributed Denial of Service (DVB-DDOS) attack within gigabit Passive Optical Network Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.22441/sinergi.2025.1.017
The dynamic bandwidth allocation (DBA) algorithm is highly impactful in improving the network performance of gigabit passive optical networks (GPON). Network security is an important component of today’s networks to combat security attacks, including GPON. However, the literature contains reports highlighting its vulnerability to specific attacks, thereby raising concerns. In this work, we argue that the impact of a volumetric bandwidth distributed denial of service (DVB-DDOS) attack can be mitigated by improving the dynamic bandwidth assignment (DBA) scheme, which is used in PON to manage the US bandwidth at the optical line terminal (OLT). Thus, this study uses a support vector machine (SVM), a machine learning approach, to learn the optical network unit (ONU) traffic demand patterns and presents a hybrid security-aware DBA (HSA-DBA) scheme that is capable of distinguishing malicious ONUs from normal ONUs. In this article, we consider the deployment of the HSA-DBA scheme in OMNET++ to acquire the monitoring data samples used to train the ML technique for the effective classification of ONUs. The simulation findings revealed a mean upstream delay improvement of up to 63% due to the security feature offered by the mechanism. Besides, significant reductions for the upstream delay performance recorded at 63% TCONT2, 65% TCONT3, and 95% TCONT4 and for frame loss rate reduction for normal ONU traffic, respectively, were observed in comparison to the non-secure DBA mechanism. This research provides a significant stride towards secure GPONs, ensuring reliable defense mechanisms are in place, which paves the way for more resilient future broadband network infrastructures.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.22441/sinergi.2025.1.017
- https://publikasi.mercubuana.ac.id/index.php/sinergi/article/download/26933/9195
- OA Status
- diamond
- References
- 27
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4406299039
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4406299039Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.22441/sinergi.2025.1.017Digital Object Identifier
- Title
-
Support Vector Machine (SVM) based Detection for Volumetric Bandwidth Distributed Denial of Service (DVB-DDOS) attack within gigabit Passive Optical NetworkWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-01-04Full publication date if available
- Authors
-
Sumayya Bibi, Nadiatulhuda Zulkifli, Ghazanfar Ali Safdar, Sajid IqbalList of authors in order
- Landing page
-
https://doi.org/10.22441/sinergi.2025.1.017Publisher landing page
- PDF URL
-
https://publikasi.mercubuana.ac.id/index.php/sinergi/article/download/26933/9195Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://publikasi.mercubuana.ac.id/index.php/sinergi/article/download/26933/9195Direct OA link when available
- Concepts
-
Denial-of-service attack, Computer science, Passive optical network, Dynamic bandwidth allocation, Computer network, Bandwidth (computing), Network security, Real-time computing, The Internet, Wavelength-division multiplexing, Physics, Optoelectronics, Wavelength, World Wide WebTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
27Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4406299039 |
|---|---|
| doi | https://doi.org/10.22441/sinergi.2025.1.017 |
| ids.doi | https://doi.org/10.22441/sinergi.2025.1.017 |
| ids.openalex | https://openalex.org/W4406299039 |
| fwci | 0.0 |
| type | article |
| title | Support Vector Machine (SVM) based Detection for Volumetric Bandwidth Distributed Denial of Service (DVB-DDOS) attack within gigabit Passive Optical Network |
| biblio.issue | 1 |
| biblio.volume | 29 |
| biblio.last_page | 185 |
| biblio.first_page | 185 |
| topics[0].id | https://openalex.org/T10767 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 0.9961000084877014 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2208 |
| topics[0].subfield.display_name | Electrical and Electronic Engineering |
| topics[0].display_name | Advanced Photonic Communication Systems |
| topics[1].id | https://openalex.org/T10232 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.9954000115394592 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2208 |
| topics[1].subfield.display_name | Electrical and Electronic Engineering |
| topics[1].display_name | Optical Network Technologies |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C38822068 |
| concepts[0].level | 3 |
| concepts[0].score | 0.7586593627929688 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[0].display_name | Denial-of-service attack |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.7348329424858093 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C204827203 |
| concepts[2].level | 4 |
| concepts[2].score | 0.7312672138214111 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q1027795 |
| concepts[2].display_name | Passive optical network |
| concepts[3].id | https://openalex.org/C145062175 |
| concepts[3].level | 3 |
| concepts[3].score | 0.6233204007148743 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q5318947 |
| concepts[3].display_name | Dynamic bandwidth allocation |
| concepts[4].id | https://openalex.org/C31258907 |
| concepts[4].level | 1 |
| concepts[4].score | 0.6007969379425049 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[4].display_name | Computer network |
| concepts[5].id | https://openalex.org/C2776257435 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5013227462768555 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1576430 |
| concepts[5].display_name | Bandwidth (computing) |
| concepts[6].id | https://openalex.org/C182590292 |
| concepts[6].level | 2 |
| concepts[6].score | 0.41797637939453125 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q989632 |
| concepts[6].display_name | Network security |
| concepts[7].id | https://openalex.org/C79403827 |
| concepts[7].level | 1 |
| concepts[7].score | 0.34339529275894165 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3988 |
| concepts[7].display_name | Real-time computing |
| concepts[8].id | https://openalex.org/C110875604 |
| concepts[8].level | 2 |
| concepts[8].score | 0.10046365857124329 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[8].display_name | The Internet |
| concepts[9].id | https://openalex.org/C160724564 |
| concepts[9].level | 3 |
| concepts[9].score | 0.08077698945999146 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q1620670 |
| concepts[9].display_name | Wavelength-division multiplexing |
| concepts[10].id | https://openalex.org/C121332964 |
| concepts[10].level | 0 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q413 |
| concepts[10].display_name | Physics |
| concepts[11].id | https://openalex.org/C49040817 |
| concepts[11].level | 1 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q193091 |
| concepts[11].display_name | Optoelectronics |
| concepts[12].id | https://openalex.org/C6260449 |
| concepts[12].level | 2 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q41364 |
| concepts[12].display_name | Wavelength |
| concepts[13].id | https://openalex.org/C136764020 |
| concepts[13].level | 1 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[13].display_name | World Wide Web |
| keywords[0].id | https://openalex.org/keywords/denial-of-service-attack |
| keywords[0].score | 0.7586593627929688 |
| keywords[0].display_name | Denial-of-service attack |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.7348329424858093 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/passive-optical-network |
| keywords[2].score | 0.7312672138214111 |
| keywords[2].display_name | Passive optical network |
| keywords[3].id | https://openalex.org/keywords/dynamic-bandwidth-allocation |
| keywords[3].score | 0.6233204007148743 |
| keywords[3].display_name | Dynamic bandwidth allocation |
| keywords[4].id | https://openalex.org/keywords/computer-network |
| keywords[4].score | 0.6007969379425049 |
| keywords[4].display_name | Computer network |
| keywords[5].id | https://openalex.org/keywords/bandwidth |
| keywords[5].score | 0.5013227462768555 |
| keywords[5].display_name | Bandwidth (computing) |
| keywords[6].id | https://openalex.org/keywords/network-security |
| keywords[6].score | 0.41797637939453125 |
| keywords[6].display_name | Network security |
| keywords[7].id | https://openalex.org/keywords/real-time-computing |
| keywords[7].score | 0.34339529275894165 |
| keywords[7].display_name | Real-time computing |
| keywords[8].id | https://openalex.org/keywords/the-internet |
| keywords[8].score | 0.10046365857124329 |
| keywords[8].display_name | The Internet |
| keywords[9].id | https://openalex.org/keywords/wavelength-division-multiplexing |
| keywords[9].score | 0.08077698945999146 |
| keywords[9].display_name | Wavelength-division multiplexing |
| language | en |
| locations[0].id | doi:10.22441/sinergi.2025.1.017 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210230916 |
| locations[0].source.issn | 1410-2331, 2460-1217 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1410-2331 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | SINERGI |
| locations[0].source.host_organization | https://openalex.org/P4310314960 |
| locations[0].source.host_organization_name | Mercu Buana University |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310314960 |
| locations[0].source.host_organization_lineage_names | Mercu Buana University |
| locations[0].license | cc-by-nc |
| locations[0].pdf_url | https://publikasi.mercubuana.ac.id/index.php/sinergi/article/download/26933/9195 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | SINERGI |
| locations[0].landing_page_url | https://doi.org/10.22441/sinergi.2025.1.017 |
| locations[1].id | pmh:oai:doaj.org/article:46d0ae4c46b343bba211d5f37734f28d |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | Jurnal Ilmiah SINERGI, Vol 29, Iss 1, Pp 185-196 (2025) |
| locations[1].landing_page_url | https://doaj.org/article/46d0ae4c46b343bba211d5f37734f28d |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5017204924 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Sumayya Bibi |
| authorships[0].countries | MY |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I4576418 |
| authorships[0].affiliations[0].raw_affiliation_string | Faculty of Electrical Engineering, Universiti Teknologi Malaysia |
| authorships[0].institutions[0].id | https://openalex.org/I4576418 |
| authorships[0].institutions[0].ror | https://ror.org/026w31v75 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I4576418 |
| authorships[0].institutions[0].country_code | MY |
| authorships[0].institutions[0].display_name | University of Technology Malaysia |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Sumayya Bibi |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Faculty of Electrical Engineering, Universiti Teknologi Malaysia |
| authorships[1].author.id | https://openalex.org/A5063593782 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-9689-0543 |
| authorships[1].author.display_name | Nadiatulhuda Zulkifli |
| authorships[1].countries | MY |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I4576418 |
| authorships[1].affiliations[0].raw_affiliation_string | Faculty of Electrical Engineering, Universiti Teknologi Malaysia |
| authorships[1].institutions[0].id | https://openalex.org/I4576418 |
| authorships[1].institutions[0].ror | https://ror.org/026w31v75 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I4576418 |
| authorships[1].institutions[0].country_code | MY |
| authorships[1].institutions[0].display_name | University of Technology Malaysia |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Nadiatulhuda Zulkifli |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Faculty of Electrical Engineering, Universiti Teknologi Malaysia |
| authorships[2].author.id | https://openalex.org/A5087501959 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-8969-1044 |
| authorships[2].author.display_name | Ghazanfar Ali Safdar |
| authorships[2].countries | GB |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I147554453 |
| authorships[2].affiliations[0].raw_affiliation_string | University of Bedfordshire |
| authorships[2].institutions[0].id | https://openalex.org/I147554453 |
| authorships[2].institutions[0].ror | https://ror.org/0400avk24 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I147554453 |
| authorships[2].institutions[0].country_code | GB |
| authorships[2].institutions[0].display_name | University of Bedfordshire |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Ghazanfar Ali Safdar |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | University of Bedfordshire |
| authorships[3].author.id | https://openalex.org/A5072097752 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-8464-2275 |
| authorships[3].author.display_name | Sajid Iqbal |
| authorships[3].countries | SA |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I4626487 |
| authorships[3].affiliations[0].raw_affiliation_string | King Faisal University |
| authorships[3].institutions[0].id | https://openalex.org/I4626487 |
| authorships[3].institutions[0].ror | https://ror.org/00dn43547 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I4626487 |
| authorships[3].institutions[0].country_code | SA |
| authorships[3].institutions[0].display_name | King Faisal University |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Sajid Iqbal |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | King Faisal University |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://publikasi.mercubuana.ac.id/index.php/sinergi/article/download/26933/9195 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Support Vector Machine (SVM) based Detection for Volumetric Bandwidth Distributed Denial of Service (DVB-DDOS) attack within gigabit Passive Optical Network |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10767 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 0.9961000084877014 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2208 |
| primary_topic.subfield.display_name | Electrical and Electronic Engineering |
| primary_topic.display_name | Advanced Photonic Communication Systems |
| related_works | https://openalex.org/W2020352445, https://openalex.org/W2141211540, https://openalex.org/W2029299146, https://openalex.org/W1999486158, https://openalex.org/W2159483143, https://openalex.org/W2389261828, https://openalex.org/W3176276356, https://openalex.org/W2789466699, https://openalex.org/W2073876121, https://openalex.org/W2128382336 |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | doi:10.22441/sinergi.2025.1.017 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210230916 |
| best_oa_location.source.issn | 1410-2331, 2460-1217 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1410-2331 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | SINERGI |
| best_oa_location.source.host_organization | https://openalex.org/P4310314960 |
| best_oa_location.source.host_organization_name | Mercu Buana University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310314960 |
| best_oa_location.source.host_organization_lineage_names | Mercu Buana University |
| best_oa_location.license | cc-by-nc |
| best_oa_location.pdf_url | https://publikasi.mercubuana.ac.id/index.php/sinergi/article/download/26933/9195 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | SINERGI |
| best_oa_location.landing_page_url | https://doi.org/10.22441/sinergi.2025.1.017 |
| primary_location.id | doi:10.22441/sinergi.2025.1.017 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210230916 |
| primary_location.source.issn | 1410-2331, 2460-1217 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1410-2331 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | SINERGI |
| primary_location.source.host_organization | https://openalex.org/P4310314960 |
| primary_location.source.host_organization_name | Mercu Buana University |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310314960 |
| primary_location.source.host_organization_lineage_names | Mercu Buana University |
| primary_location.license | cc-by-nc |
| primary_location.pdf_url | https://publikasi.mercubuana.ac.id/index.php/sinergi/article/download/26933/9195 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | SINERGI |
| primary_location.landing_page_url | https://doi.org/10.22441/sinergi.2025.1.017 |
| publication_date | 2025-01-04 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W3184210698, https://openalex.org/W2981296049, https://openalex.org/W2889385764, https://openalex.org/W4206095692, https://openalex.org/W3094001387, https://openalex.org/W4206564259, https://openalex.org/W3175345899, https://openalex.org/W3195804786, https://openalex.org/W3103002388, https://openalex.org/W4386474788, https://openalex.org/W3127638224, https://openalex.org/W4364304795, https://openalex.org/W4386322360, https://openalex.org/W4320005545, https://openalex.org/W4381568796, https://openalex.org/W4321021187, https://openalex.org/W4213425792, https://openalex.org/W2981733755, https://openalex.org/W4205666304, https://openalex.org/W3217728647, https://openalex.org/W2987109489, https://openalex.org/W2913728734, https://openalex.org/W4211078419, https://openalex.org/W3082563635, https://openalex.org/W4386433008, https://openalex.org/W4402563027, https://openalex.org/W4232624463 |
| referenced_works_count | 27 |
| abstract_inverted_index.a | 58, 98, 103, 119, 170, 228 |
| abstract_inverted_index.In | 49, 135 |
| abstract_inverted_index.ML | 158 |
| abstract_inverted_index.US | 86 |
| abstract_inverted_index.an | 23 |
| abstract_inverted_index.at | 88, 197 |
| abstract_inverted_index.be | 68 |
| abstract_inverted_index.by | 70, 185 |
| abstract_inverted_index.in | 9, 81, 146, 218, 239 |
| abstract_inverted_index.is | 6, 22, 79, 126 |
| abstract_inverted_index.of | 14, 26, 57, 63, 128, 142, 164, 175 |
| abstract_inverted_index.to | 29, 43, 83, 107, 148, 155, 177, 180, 220 |
| abstract_inverted_index.up | 176 |
| abstract_inverted_index.we | 52, 138 |
| abstract_inverted_index.63% | 178, 198 |
| abstract_inverted_index.65% | 200 |
| abstract_inverted_index.95% | 203 |
| abstract_inverted_index.DBA | 122, 223 |
| abstract_inverted_index.ONU | 213 |
| abstract_inverted_index.PON | 82 |
| abstract_inverted_index.The | 0, 166 |
| abstract_inverted_index.and | 117, 202, 205 |
| abstract_inverted_index.are | 238 |
| abstract_inverted_index.can | 67 |
| abstract_inverted_index.due | 179 |
| abstract_inverted_index.for | 160, 191, 206, 211, 245 |
| abstract_inverted_index.its | 41 |
| abstract_inverted_index.the | 11, 36, 55, 72, 85, 89, 109, 140, 143, 150, 157, 161, 181, 186, 192, 221, 243 |
| abstract_inverted_index.way | 244 |
| abstract_inverted_index.ONUs | 131 |
| abstract_inverted_index.This | 225 |
| abstract_inverted_index.data | 152 |
| abstract_inverted_index.from | 132 |
| abstract_inverted_index.line | 91 |
| abstract_inverted_index.loss | 208 |
| abstract_inverted_index.mean | 171 |
| abstract_inverted_index.more | 246 |
| abstract_inverted_index.rate | 209 |
| abstract_inverted_index.that | 54, 125 |
| abstract_inverted_index.this | 50, 95, 136 |
| abstract_inverted_index.unit | 112 |
| abstract_inverted_index.used | 80, 154 |
| abstract_inverted_index.uses | 97 |
| abstract_inverted_index.were | 216 |
| abstract_inverted_index.(DBA) | 4, 76 |
| abstract_inverted_index.(ONU) | 113 |
| abstract_inverted_index.GPON. | 34 |
| abstract_inverted_index.ONUs. | 134, 165 |
| abstract_inverted_index.Thus, | 94 |
| abstract_inverted_index.argue | 53 |
| abstract_inverted_index.delay | 173, 194 |
| abstract_inverted_index.frame | 207 |
| abstract_inverted_index.learn | 108 |
| abstract_inverted_index.paves | 242 |
| abstract_inverted_index.study | 96 |
| abstract_inverted_index.train | 156 |
| abstract_inverted_index.which | 78, 241 |
| abstract_inverted_index.work, | 51 |
| abstract_inverted_index.(OLT). | 93 |
| abstract_inverted_index.(SVM), | 102 |
| abstract_inverted_index.GPONs, | 233 |
| abstract_inverted_index.TCONT4 | 204 |
| abstract_inverted_index.attack | 66 |
| abstract_inverted_index.combat | 30 |
| abstract_inverted_index.demand | 115 |
| abstract_inverted_index.denial | 62 |
| abstract_inverted_index.future | 248 |
| abstract_inverted_index.highly | 7 |
| abstract_inverted_index.hybrid | 120 |
| abstract_inverted_index.impact | 56 |
| abstract_inverted_index.manage | 84 |
| abstract_inverted_index.normal | 133, 212 |
| abstract_inverted_index.place, | 240 |
| abstract_inverted_index.scheme | 124, 145 |
| abstract_inverted_index.secure | 232 |
| abstract_inverted_index.stride | 230 |
| abstract_inverted_index.vector | 100 |
| abstract_inverted_index.(GPON). | 19 |
| abstract_inverted_index.HSA-DBA | 144 |
| abstract_inverted_index.Network | 20 |
| abstract_inverted_index.OMNET++ | 147 |
| abstract_inverted_index.TCONT2, | 199 |
| abstract_inverted_index.TCONT3, | 201 |
| abstract_inverted_index.acquire | 149 |
| abstract_inverted_index.capable | 127 |
| abstract_inverted_index.defense | 236 |
| abstract_inverted_index.dynamic | 1, 73 |
| abstract_inverted_index.feature | 183 |
| abstract_inverted_index.gigabit | 15 |
| abstract_inverted_index.machine | 101, 104 |
| abstract_inverted_index.network | 12, 111, 250 |
| abstract_inverted_index.offered | 184 |
| abstract_inverted_index.optical | 17, 90, 110 |
| abstract_inverted_index.passive | 16 |
| abstract_inverted_index.raising | 47 |
| abstract_inverted_index.reports | 39 |
| abstract_inverted_index.samples | 153 |
| abstract_inverted_index.scheme, | 77 |
| abstract_inverted_index.service | 64 |
| abstract_inverted_index.support | 99 |
| abstract_inverted_index.thereby | 46 |
| abstract_inverted_index.towards | 231 |
| abstract_inverted_index.traffic | 114 |
| abstract_inverted_index.Besides, | 188 |
| abstract_inverted_index.However, | 35 |
| abstract_inverted_index.article, | 137 |
| abstract_inverted_index.attacks, | 32, 45 |
| abstract_inverted_index.consider | 139 |
| abstract_inverted_index.contains | 38 |
| abstract_inverted_index.ensuring | 234 |
| abstract_inverted_index.learning | 105 |
| abstract_inverted_index.networks | 18, 28 |
| abstract_inverted_index.observed | 217 |
| abstract_inverted_index.patterns | 116 |
| abstract_inverted_index.presents | 118 |
| abstract_inverted_index.provides | 227 |
| abstract_inverted_index.recorded | 196 |
| abstract_inverted_index.reliable | 235 |
| abstract_inverted_index.research | 226 |
| abstract_inverted_index.revealed | 169 |
| abstract_inverted_index.security | 21, 31, 182 |
| abstract_inverted_index.specific | 44 |
| abstract_inverted_index.terminal | 92 |
| abstract_inverted_index.traffic, | 214 |
| abstract_inverted_index.upstream | 172, 193 |
| abstract_inverted_index.(HSA-DBA) | 123 |
| abstract_inverted_index.algorithm | 5 |
| abstract_inverted_index.approach, | 106 |
| abstract_inverted_index.bandwidth | 2, 60, 74, 87 |
| abstract_inverted_index.broadband | 249 |
| abstract_inverted_index.component | 25 |
| abstract_inverted_index.concerns. | 48 |
| abstract_inverted_index.effective | 162 |
| abstract_inverted_index.impactful | 8 |
| abstract_inverted_index.important | 24 |
| abstract_inverted_index.improving | 10, 71 |
| abstract_inverted_index.including | 33 |
| abstract_inverted_index.malicious | 130 |
| abstract_inverted_index.mitigated | 69 |
| abstract_inverted_index.reduction | 210 |
| abstract_inverted_index.resilient | 247 |
| abstract_inverted_index.technique | 159 |
| abstract_inverted_index.today’s | 27 |
| abstract_inverted_index.findings | 168 |
| abstract_inverted_index.(DVB-DDOS) | 65 |
| abstract_inverted_index.allocation | 3 |
| abstract_inverted_index.assignment | 75 |
| abstract_inverted_index.comparison | 219 |
| abstract_inverted_index.deployment | 141 |
| abstract_inverted_index.literature | 37 |
| abstract_inverted_index.mechanism. | 187, 224 |
| abstract_inverted_index.mechanisms | 237 |
| abstract_inverted_index.monitoring | 151 |
| abstract_inverted_index.non-secure | 222 |
| abstract_inverted_index.reductions | 190 |
| abstract_inverted_index.simulation | 167 |
| abstract_inverted_index.volumetric | 59 |
| abstract_inverted_index.distributed | 61 |
| abstract_inverted_index.improvement | 174 |
| abstract_inverted_index.performance | 13, 195 |
| abstract_inverted_index.significant | 229 |
| abstract_inverted_index.highlighting | 40 |
| abstract_inverted_index.significant | 189 |
| abstract_inverted_index.respectively, | 215 |
| abstract_inverted_index.vulnerability | 42 |
| abstract_inverted_index.classification | 163 |
| abstract_inverted_index.distinguishing | 129 |
| abstract_inverted_index.security-aware | 121 |
| abstract_inverted_index.infrastructures. | 251 |
| cited_by_percentile_year | |
| countries_distinct_count | 3 |
| institutions_distinct_count | 4 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/9 |
| sustainable_development_goals[0].score | 0.6299999952316284 |
| sustainable_development_goals[0].display_name | Industry, innovation and infrastructure |
| citation_normalized_percentile.value | 0.0099945 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |