<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1909-8367</journal-id>
<journal-title><![CDATA[Entre Ciencia e Ingeniería]]></journal-title>
<abbrev-journal-title><![CDATA[Entre Ciencia e Ingenieria]]></abbrev-journal-title>
<issn>1909-8367</issn>
<publisher>
<publisher-name><![CDATA[Universidad Católica de Pereira]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1909-83672022000100017</article-id>
<article-id pub-id-type="doi">10.31908/19098367.2655</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Inteligencia artificial para el control de tráfico en redes de datos: Una Revisión]]></article-title>
<article-title xml:lang="en"><![CDATA[Artificial intelligence for traffic control in data networks: A Review]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[León]]></surname>
<given-names><![CDATA[D. A.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Martínezq]]></surname>
<given-names><![CDATA[J. G.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ardila]]></surname>
<given-names><![CDATA[I. A.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Mosquera]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Distrital Francisco José De Caldas  ]]></institution>
<addr-line><![CDATA[Bogotá ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Distrital Francisco José De Caldas  ]]></institution>
<addr-line><![CDATA[Bogotá ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad Distrital Francisco José De Caldas  ]]></institution>
<addr-line><![CDATA[Bogotá ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af4">
<institution><![CDATA[,Universidad Distrital Francisco José De Caldas  ]]></institution>
<addr-line><![CDATA[Bogotá ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2022</year>
</pub-date>
<volume>16</volume>
<numero>31</numero>
<fpage>17</fpage>
<lpage>24</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S1909-83672022000100017&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S1909-83672022000100017&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S1909-83672022000100017&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen El control del tráfico en las redes de datos ha cobrado gran importancia en los últimos tiempos debido al uso masivo que se le está dando a las redes informáticas en distintos ámbitos de la sociedad. Con el fin de realizar un control de tráfico efectivo, se suele hacer uso de diferentes técnicas que permiten, entre otras cosas, clasificar, predecir y monitorear el tráfico de la red. Estas técnicas han ido evolucionando y actualmente se apoyan en métodos de inteligencia artificial, lo cual ha permitido mejorar los resultados obtenidos con las técnicas convencionales. El presente artículo recopila los diferentes aportes realizados por el campo de la inteligencia artificial al mejoramiento de estas técnicas y a la gestión de redes en general. Se describen los aportes realizados en aspectos tales como la seguridad, la predicción y clasificación del tráfico de datos, así como la optimización del ruteo en una red informática.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Traffic control in data networks has recently become very important due to the massive use of computer networks in different areas of society. Different techniques are usually used to carry out effective traffic control, allowing, among other things, to classify, predict and monitor network traffic. These techniques have evolved and are currently supported by artificial intelligence tools, which have made it possible to improve the results obtained with conventional techniques. This paper collects the different contributions made by the field of artificial intelligence to the improvement of these techniques and network management in general. The article describes the contributions made in aspects such as security, prediction, and classification of data traffic, as well as the optimization of routing in a computer network.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Gestión de tráfico]]></kwd>
<kwd lng="es"><![CDATA[técnicas de control de tráfico]]></kwd>
<kwd lng="es"><![CDATA[inteligencia artificial]]></kwd>
<kwd lng="es"><![CDATA[aprendizaje automático]]></kwd>
<kwd lng="es"><![CDATA[aprendizaje profundo]]></kwd>
<kwd lng="en"><![CDATA[Traffic management]]></kwd>
<kwd lng="en"><![CDATA[traffic control techniques]]></kwd>
<kwd lng="en"><![CDATA[artificial intelligence]]></kwd>
<kwd lng="en"><![CDATA[machine learning]]></kwd>
<kwd lng="en"><![CDATA[deep learning]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>[1]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[Y. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Su]]></surname>
<given-names><![CDATA[D. H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Study of Traffic Control and Congestion Control in Broadband ISDN]]></source>
<year>1992</year>
<publisher-loc><![CDATA[Gaithersburg ]]></publisher-loc>
<publisher-name><![CDATA[National Institute of Standards and Technology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<label>[2]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Poretsky]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Perser]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Erramilli]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Khurana]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Terminology for Benchmarking Network-layer Traffic Control Mechanisms]]></source>
<year>2006</year>
<publisher-name><![CDATA[Internet Engineering Task Force]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<label>[3]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Farrel]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Vasseur]]></surname>
<given-names><![CDATA[J. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Ash]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Path Computation Element (PCE)-Based Architecture]]></source>
<year>2006</year>
<publisher-name><![CDATA[Internet Engineering Task Force]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>[4]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Russell]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Principles of Computer Networking]]></source>
<year>1989</year>
<publisher-loc><![CDATA[UK ]]></publisher-loc>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<label>[5]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brownlee]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Mills]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Ruth]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Traffic Flow Measurement: Architecture]]></source>
<year>1999</year>
<publisher-name><![CDATA[Internet Engineering Task Force]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<label>[6]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Noormohammadpour]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Raghavendra]]></surname>
<given-names><![CDATA[C. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Datacenter Traffic Control: Understanding Techniques and Tradeoffs]]></article-title>
<source><![CDATA[IEEE Commun. Surveys &amp; Tutorials]]></source>
<year>2018</year>
<volume>20</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1492-525</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>[7]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Moore]]></surname>
<given-names><![CDATA[A. W.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Machine Learning Approach for Efficient Traffic Classification]]></source>
<year>2007</year>
<conf-name><![CDATA[ 15International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems]]></conf-name>
<conf-date>2007</conf-date>
<conf-loc> </conf-loc>
<page-range>310-7</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>[8]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Amaral]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Pinto]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Bernardo]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Tavares]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Mamede]]></surname>
<given-names><![CDATA[H. S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Machine Learning in Software Defined Networks: Data collection and traffic classification]]></source>
<year>2016</year>
<conf-name><![CDATA[ 24International Conference on Network Protocols (ICNP)]]></conf-name>
<conf-date>2016</conf-date>
<conf-loc> </conf-loc>
<page-range>1-5</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>[9]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Blake]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Black]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Carlson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Davies]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[An Architecture for Differentiated Services]]></source>
<year>1998</year>
<publisher-name><![CDATA[Internet Engineering Task Force]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<label>[10]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shafiq]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Laghari]]></surname>
<given-names><![CDATA[A. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Yao]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Karn]]></surname>
<given-names><![CDATA[N. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Abdessamia]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Network Traffic Classification techniques and comparative analysis using Machine Learning algorithms]]></source>
<year>2016</year>
<conf-name><![CDATA[ 2IEEE International Conference on Computer and Communications (ICCC)]]></conf-name>
<conf-date>2016</conf-date>
<conf-loc> </conf-loc>
<page-range>2451-5</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>[11]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bengio]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Courville]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Vincent]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Representation Learning: A Review and New Perspectives]]></article-title>
<source><![CDATA[IEEE Transactions on Pattern Analysis and Machine Intelligence]]></source>
<year>2013</year>
<volume>35</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1798-828</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>[12]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Su]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Internet Traffic Classification Based on Incremental Support Vector Machines]]></article-title>
<source><![CDATA[Mobile Netw Appl]]></source>
<year>2018</year>
<volume>23</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>789-96</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>[13]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Qu]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Improved Network Traffic Classification Model Based on a Support Vector Machine]]></article-title>
<source><![CDATA[Symmetry]]></source>
<year>2020</year>
<volume>12</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>301</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>[14]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dong]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Multi class SVM algorithm with active learning for network traffic classification]]></article-title>
<source><![CDATA[Expert Systems with Applications]]></source>
<year>2021</year>
<volume>176</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B15">
<label>[15]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Punitha]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Mala]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Traffic classification in server farm using supervised learning techniques]]></article-title>
<source><![CDATA[Neural Comput &amp; Applic]]></source>
<year>2020</year>
<volume>33</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1279-96</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>[16]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Saber]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Fergani]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Abbas]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Encrypted Traffic Classification: Combining Over-and Under-Sampling through a PCA-SVM]]></source>
<year>2018</year>
<page-range>1-5</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>[17]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ang]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Valla]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Neggatu]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Moore]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Network Traffic Classification via Neural Networks]]></source>
<year>2017</year>
<publisher-loc><![CDATA[Cambridge, Reino Unido ]]></publisher-loc>
<publisher-name><![CDATA[Universidad de Cambridge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<label>[18]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Xiao]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Ni]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Xia]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Byte Segment Neural Network for Network Traffic Classification]]></source>
<year>2018</year>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>[19]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Moreira]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodrigues]]></surname>
<given-names><![CDATA[L. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Rosa]]></surname>
<given-names><![CDATA[P. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Aguiar]]></surname>
<given-names><![CDATA[R. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Silva]]></surname>
<given-names><![CDATA[F. d. O.]]></given-names>
</name>
</person-group>
<source><![CDATA[Packet Vision: a convolutional neural network approach for network traffic classification]]></source>
<year>2020</year>
<conf-name><![CDATA[ 33SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)]]></conf-name>
<conf-date>2020</conf-date>
<conf-loc> </conf-loc>
<page-range>256-63</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>[20]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mengmeng]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Xiangzhan]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Likun]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Robot Communication: Network Traffic Classification Based on Deep Neural Network]]></article-title>
<source><![CDATA[Frontiers in Neurorobotics]]></source>
<year>2021</year>
<volume>15</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B21">
<label>[21]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Network Traffic Classification and Control Technology Based on Decision Tree]]></source>
<year>2019</year>
<conf-name><![CDATA[ International Conference on Applications and Techniques in Cyber Intelligence ATCI]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1701-5</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>[22]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tong]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Qu]]></surname>
<given-names><![CDATA[Y. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Prasanna]]></surname>
<given-names><![CDATA[V. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Accelerating Decision Tree Based Traffic Classification on FPGA and Multicore Platforms]]></article-title>
<source><![CDATA[IEEE Transactions on Parallel and Distributed Systems]]></source>
<year>2017</year>
<volume>28</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>3046-59</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>[23]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nair]]></surname>
<given-names><![CDATA[L. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sajeev]]></surname>
<given-names><![CDATA[G. P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Internet Traffic Classification by Aggregating Correlated Decision Tree Classifier]]></source>
<year>2015</year>
<conf-name><![CDATA[ Seventh International Conference on Computational Intelligence, Modelling and Simulation (CIMSim)]]></conf-name>
<conf-date>2015</conf-date>
<conf-loc> </conf-loc>
<page-range>135-40</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>[24]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Performance Analysis of Unsupervised Machine Learning Techniques for Network Traffic Classification]]></source>
<year>2015</year>
<page-range>401-4</page-range></nlm-citation>
</ref>
<ref id="B25">
<label>[25]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Hao]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Song]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Improved EM method for internet traffic classification]]></source>
<year>2016</year>
<conf-name><![CDATA[ 8International Conference on Knowledge and Smart Technology (KST)]]></conf-name>
<conf-date>2016</conf-date>
<conf-loc> </conf-loc>
<page-range>13-7</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>[26]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vinayakumar]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Soman]]></surname>
<given-names><![CDATA[K. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Poornachandran]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Applying deep learning approaches for network traffic prediction]]></source>
<year>2017</year>
<conf-name><![CDATA[ International Conference on Advances in Computing, Communications and Informatics (ICACCI)]]></conf-name>
<conf-date>2017</conf-date>
<conf-loc> </conf-loc>
<page-range>2353-8</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>[27]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Prado]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Salem]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Santos]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Computer network traffic prediction: a comparison between traditional and deep learning neural networks]]></article-title>
<source><![CDATA[International Journal of Big Data Intelligence]]></source>
<year>2016</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>28-37</page-range></nlm-citation>
</ref>
<ref id="B28">
<label>[27]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Prado]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Salem]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Santos]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Multilayer Perceptron and Stacked Autoencoder for Internet Traffic Prediction]]></source>
<year>2014</year>
<page-range>61-71</page-range></nlm-citation>
</ref>
<ref id="B29">
<label>[29]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nikravesh]]></surname>
<given-names><![CDATA[A. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Ajila]]></surname>
<given-names><![CDATA[S. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Lung]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Ding]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Mobile Network Traffic Prediction Using MLP, MLPWD, and SVM]]></source>
<year>2016</year>
<conf-name><![CDATA[ IEEE International Congress on Big Data (BigData Congress)]]></conf-name>
<conf-date>2016</conf-date>
<conf-loc> </conf-loc>
<page-range>402-9</page-range></nlm-citation>
</ref>
<ref id="B30">
<label>[30]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jin]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Yan]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[SAE Network: A Deep Learning Method for Traffic Flow Prediction]]></source>
<year>2018</year>
<conf-name><![CDATA[ 5International Conference on Information, Cybernetics, and Computational Social Systems (ICCSS)]]></conf-name>
<conf-date>2018</conf-date>
<conf-loc> </conf-loc>
<page-range>241-6</page-range></nlm-citation>
</ref>
<ref id="B31">
<label>[31]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[L. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Deen]]></surname>
<given-names><![CDATA[M. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Improved Stacked Auto-Encoder for Network Traffic Flow Classification]]></article-title>
<source><![CDATA[IEEE Network]]></source>
<year>2018</year>
<volume>32</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>22-7</page-range></nlm-citation>
</ref>
<ref id="B32">
<label>[32]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jaffry]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Hasan]]></surname>
<given-names><![CDATA[S. F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cellular Traffic Prediction using Recurrent Neural Networks]]></source>
<year>2020</year>
<conf-name><![CDATA[ 5International Symposium on Telecommunication Technologies (ISTT)]]></conf-name>
<conf-date>2020</conf-date>
<conf-loc> </conf-loc>
<page-range>94-8</page-range></nlm-citation>
</ref>
<ref id="B33">
<label>[33]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ramakrishnan]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Soni]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Network Traffic Prediction Using Recurrent Neural Networks]]></source>
<year>2018</year>
<conf-name><![CDATA[ 17IEEE International Conference on Machine Learning and Applications (ICMLA)]]></conf-name>
<conf-date>2018</conf-date>
<conf-loc> </conf-loc>
<page-range>187-93</page-range></nlm-citation>
</ref>
<ref id="B34">
<label>[34]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Andreoletti]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Troia]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Musumeci]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Giordano]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Maier]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Tornatore]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Network Traffic Prediction based on Diffusion Convolutional Recurrent Neural Networks]]></source>
<year>2019</year>
<conf-name><![CDATA[ IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>246-51</page-range></nlm-citation>
</ref>
<ref id="B35">
<label>[35]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nguyen]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Dlugolinsky]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Tran]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[López]]></surname>
<given-names><![CDATA[Á.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deep Learning for Proactive Network Monitoring and Security Protection]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2020</year>
<volume>8</volume>
<page-range>19696-716</page-range></nlm-citation>
</ref>
<ref id="B36">
<label>[36]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dilek]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Çak&#305;r]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Ayd&#305;n]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Applications of artificial intelligence techniques to combating cyber crimes: a review]]></article-title>
<source><![CDATA[IJAIA]]></source>
<year>2015</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>21-39</page-range></nlm-citation>
</ref>
<ref id="B37">
<label>[37]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Saleem]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Alabduljabbar]]></surname>
<given-names><![CDATA[G. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Alrowais]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Al-Muhtadi]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Imran]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodrigues]]></surname>
<given-names><![CDATA[J. J. P. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bio-Inspired Network Security for 5G-Enabled IoT Applications]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2020</year>
<volume>8</volume>
<page-range>229152-60</page-range></nlm-citation>
</ref>
<ref id="B38">
<label>[38]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sanchez-Gomez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Integrating LPWAN Technologies in the 5G Ecosystem: A Survey on Security Challenges and Solutions]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2020</year>
<volume>8</volume>
<page-range>216437-60</page-range></nlm-citation>
</ref>
<ref id="B39">
<label>[39]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ly]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Yao]]></surname>
<given-names><![CDATA[Y. -D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Review of Deep Learning in 5G Research: Channel Coding, Massive MIMO, Multiple Access, Resource Allocation, and Network Security]]></article-title>
<source><![CDATA[IEEE OJ-COMS]]></source>
<year>2021</year>
<volume>2</volume>
<page-range>396-408</page-range></nlm-citation>
</ref>
<ref id="B40">
<label>[40]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suomalainen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Juhola]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Shahabuddin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mämmelä]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmad]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Machine Learning Threatens 5G Security]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2020</year>
<volume>8</volume>
<page-range>190822-42</page-range></nlm-citation>
</ref>
<ref id="B41">
<label>[41]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Zeng]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Ye]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Sheng]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Malware traffic classification using convolutional neural network for representation learning]]></article-title>
<source><![CDATA[ICOIN]]></source>
<year>2017</year>
<page-range>712-7</page-range></nlm-citation>
</ref>
<ref id="B42">
<label>[42]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zeng]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Gu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Wei]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Guo]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deep-Full-Range: A Deep Learning Based Network Encrypted Traffic Classification and Intrusion Detection Framework]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2019</year>
<volume>7</volume>
<page-range>45182-90</page-range></nlm-citation>
</ref>
<ref id="B43">
<label>[43]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Buczak]]></surname>
<given-names><![CDATA[A. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Guven]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection]]></article-title>
<source><![CDATA[IEEE Commun. Surv. Tutor]]></source>
<year>2016</year>
<volume>18</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1153-76</page-range></nlm-citation>
</ref>
<ref id="B44">
<label>[44]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xin]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Machine Learning and Deep Learning Methods for Cybersecurity]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2018</year>
<volume>6</volume>
<page-range>35365-81</page-range></nlm-citation>
</ref>
<ref id="B45">
<label>[45]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Farah]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Rahman]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Khan]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Rafni]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Shah]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Farid]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Application of Machine Learning Approaches in Intrusion Detection System: A Survey]]></article-title>
<source><![CDATA[IJAIA]]></source>
<year>2015</year>
<volume>4</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>9-18</page-range></nlm-citation>
</ref>
<ref id="B46">
<label>[46]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Lang]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey]]></article-title>
<source><![CDATA[Applied Sciences]]></source>
<year>2019</year>
<volume>9</volume>
<numero>20</numero>
<issue>20</issue>
<page-range>4396</page-range></nlm-citation>
</ref>
<ref id="B47">
<label>[47]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Research on Application of Artificial Intelligence in Computer Network Technology under the Background of Big Data]]></source>
<year>2020</year>
<conf-name><![CDATA[ Journal of Physics: Conference Series 1607 012093]]></conf-name>
<conf-date>2020</conf-date>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B48">
<label>[48]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vinayakumar]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Alazab]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Soman]]></surname>
<given-names><![CDATA[K. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Poornachandran]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Venkatraman]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Robust Intelligent Malware Detection Using Deep Learning]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2019</year>
<volume>7</volume>
<page-range>46717-38</page-range></nlm-citation>
</ref>
<ref id="B49">
<label>[49]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sambangi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Gondi]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Machine Learning Approach for DDoS (Distributed Denial of Service) Attack Detection Using Multiple Linear Regression]]></article-title>
<source><![CDATA[Proceedings]]></source>
<year>2020</year>
<volume>63</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>51</page-range></nlm-citation>
</ref>
<ref id="B50">
<label>[50]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lima]]></surname>
<given-names><![CDATA[F. S. de]]></given-names>
</name>
<name>
<surname><![CDATA[Silveira]]></surname>
<given-names><![CDATA[F. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Brito]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Vargas-Solar]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Silveira]]></surname>
<given-names><![CDATA[L. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning]]></article-title>
<source><![CDATA[Secur. Commun. Netw]]></source>
<year>2019</year>
<volume>2019</volume>
<page-range>1-15</page-range></nlm-citation>
</ref>
<ref id="B51">
<label>[51]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Day]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Ayesh]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Intelligent intrusion detection systems using artificial neural networks]]></article-title>
<source><![CDATA[ICT Express]]></source>
<year>2018</year>
<volume>4</volume>
<page-range>95-9</page-range></nlm-citation>
</ref>
<ref id="B52">
<label>[52]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ampratwum]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[An Intelligent Traffic Classification based optimized routing in SDN-IoT: A Machine Learning Approach]]></source>
<year>2020</year>
<publisher-name><![CDATA[Faculty of Engineering, University of Ottawa, Ottawa]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B53">
<label>[53]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Ren]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Routing optimization for cloud services in SDN-based Internet of Things with TCAM capacity constraint]]></article-title>
<source><![CDATA[JCN]]></source>
<year>2020</year>
<volume>22</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>145-58</page-range></nlm-citation>
</ref>
<ref id="B54">
<label>[54]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Memarmoshrefi]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Hogrefe]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Survey of Ant Colony Optimization Based Routing Protocols for Mobile Ad Hoc Networks]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2017</year>
<volume>5</volume>
<page-range>24139-61</page-range></nlm-citation>
</ref>
<ref id="B55">
<label>[55]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ye]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Guo]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Yen]]></surname>
<given-names><![CDATA[C. -Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Chao]]></surname>
<given-names><![CDATA[H. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[CFR-RL: Traffic Engineering with Reinforcement Learning in SDN]]></article-title>
<source><![CDATA[IEEE JSAC]]></source>
<year>2020</year>
<volume>38</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>2249-59</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
