[1] M. Abdallah, N. An Le Khac, H. Jahromi, A. Delia Jurcut, A hybrid CNN-LSTM based approach for anomaly
detection systems in SDNs, In Proceedings of the 16th International Conference on Availability, Reliability and
Security, (2021), 1-7.
https://doi.org/10.1145/3465481.3469190
[3] M. Alonso, H. Amaris, D. Martin, A. de la Escalera, Proximal policy optimization for energy management of electric
vehicles and PV storage units, Energies, 16(15) (2023), 5689.
https://doi.org/10.3390/en16155689
[4] H. Chen, P. Chen, B. Wang, X. Yu, X. Chen, D. Ma, Z. Zheng, Graph neural network based robust anomaly
detection at service level in SDN driven microservice system, Computer Networks, 239 (2024), 110135. https:
//doi.\org/10.1016/j.comnet.2023.110135
[5] L. Chen, Z. Wang, R. Huo, T. Huang, An adversarial DBN-LSTM method for detecting and defending against DDoS
attacks in SDN environments, Algorithms, 16(4) (2023), 197.
https://doi.org/10.3390/a16040197
[6] A. Dadhania, P. Dave, J. Bhatia, R. Mehta, M. Kumhar, S. Tanwar, A. Alabdulatif, Software defined network and
graph neural network-based anomaly detection scheme for high speed networks, Cyber Security and Applications, 3
(2025), 100079.
https://doi.org/10.1016/j.csa.2024.100079
[7] M. Dom´ınguez-Dorado, J. Calle-Cancho, J. Galeano-Brajones, F. J. Rodr´ıguez-P´ere, D. Cort´es-Polo, Detection and
mitigation of security threats using virtualized network functions in software-defined networks, Applied Sciences,
14(1) (2023), 374.
https://doi.org/10.3390/app14010374
[8] Z. Elgamal, A. Q. M. Sabri, M. Tubishat, D. Tbaishat, S. N. Makhadmeh, O. A. Alomari, Improved reptile search
optimization algorithm using chaotic map and simulated annealing for feature selection in medical field, IEEE Access,
10 (2022), 51428-51446.
https://doi.org/10.1109/ACCESS.2022.3174854
[9] R. Guo, X. Zhu, T. Liu, Automatic detection of crop lodging from multitemporal satellite data based on the isolation
forest algorithm, Computers and Electronics in Agriculture, 215 (2023), 108415. https://doi.org/10.1016/j.
compag.2023.108415
[10] A. Hirsi, M. A. Alhartomi, L. Audah, A. Salh, N. Bin Mad Sahar, S. Ahmed, G. O. Ansa, A. Farah, Comprehensive
analysis of ddos anomaly detection in software-defined networks, IEEE Access, (2025). https://doi.org/10.1109/
ACCESS.2025.3535943
[11] T. Jafarian, M. Masdari, A. Ghaffari, K. Majidzadeh, SADM-SDNC: Security anomaly detection and mitigation
in software-defined networking using C-support vector classification, Computing, 103(4) (2021), 641-673. https:
//doi.org/10.1007/s00607-020-00866-x
[12] S. Jiang, L. Yang, X. Gao, Y. Zhou, T. Feng, Y. Song, K. Liu, G. Cheng, BSD-Guard: A collaborative blockchainbased
approach for detection and mitigation of SDN-Targeted DDoS attacks, Security and Communication Networks,
2022(1) (2022), 1608689.
https://doi.org/10.1155/2022/1608689
[13] A. V. Kachavimath, D. G. Narayan, A hybrid deep learning model with consensus-based feature selection for DDoS
attacks detection in SDN, Procedia Computer Science, 252 (2025), 643-652. https://doi.org/10.1016/j.procs.
2025.01.024
[14] Y. Medjadba, H. Drid, M. Rahouti, Intrusion detection in software-defined networking using hybrid Bayesian model
averaging for reliable uncertainty quantification, Computer Networks, (2025), 111436. https://doi.org/10.1016/
j.comnet.2025.111436
[15] A. A. Najar, S. M. Naik, Cyber-secure SDN: A CNN-based approach for efficient detection and mitigation of DDoS
attacks, Computers and Security, 139 (2024), 103716.
https://doi.org/10.1016/j.cose.2024.103716
[17] C. Pazhanimuthu, G. Saravanan, K. P. Suresh, R. S. Kumar, Performance analysis of voltage profile improvement
in AVR system using zebra optimization algorithms based on PID controller, e-Prime-Advances in Electrical
Engineering, Electronics and Energy, 6 (2023), 100380.
https://doi.org/10.1016/j.prime.2023.100380
[18] L. Praharaj, D. Gupta, M. Gupta, Efficient federated transfer learning-based network anomaly detection for cooperative smart farming infrastructure, Smart Agricultural Technology, 10 (2025), 100727. https://doi.org/10.
101\6/j.atech.2024.100727
[20] K. Wang, Y. Fu, X. Duan, T. Liu, Detection and mitigation of DDoS attacks based on multi-dimensional characteristics
in SDN, Scientific Reports, 14(1) (2024), 16421.
https://doi.org/10.1038/s41598-024-66907-z
[22] J. Wang, L. Wang, SDN-Defend: A lightweight online attack detection and mitigation system for DDoS attacks in
SDN, Sensors, 22(21) (2022), 8287.
https://doi.org/10.3390/s22218287
[23] X. Wang, H. Wang, B. Bhandari, L. Cheng, AI-empowered methods for smart energy consumption: A review
of load forecasting, anomaly detection and demand response, International Journal of Precision Engineering and
Manufacturing-Green Technology, 11(3) (2024), 963-993.
https://doi.org/10.1007/s40684-023-00537-0
[24] W. Yang, Y. Shan, J. Wang, Y. Yao, An industrial network intrusion detection algorithm based on IGWO-GRU,
Cluster Computing, 27(6) (2024), 7199-7217.
[26] S. Zavrak, M. Iskefiyeli, Flow-based intrusion detection on software-defined networks: A multivariate time series
anomaly detection approach, Neural Computing and Applications, 35(16) (2023), 12175-12193. https://doi.org/
10\.1007/s00521-023-08376-5
[27] Z. Zulfiqar, S. U. Malik, S. A. Moqurrab, Z. Zulfiqar, U. Yaseen, G. Srivastava, DeepDetect: An innovative hybrid
deep learning framework for anomaly detection in IoT networks, Journal of Computational Science, 83 (2024),
102426. https://doi.org/10.1016/j.jocs.2024.102426