{"id":294,"date":"2025-09-06T21:34:11","date_gmt":"2025-09-06T20:34:11","guid":{"rendered":"https:\/\/mamdouh.de\/?page_id=294"},"modified":"2026-01-05T02:47:23","modified_gmt":"2026-01-05T02:47:23","slug":"publications","status":"publish","type":"page","link":"https:\/\/mamdouh.de\/index.php\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\n<section class=\"pub-wrap\">\n<article class=\"pub-card\" id=\"pub-1\">\n  <div class=\"pub-venue\">\n    In Proceedings of the 2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM \u201923), Split, Croatia\n  <\/div>\n\n  <h3 class=\"pub-title\">\n    \u201cAn IDS for DDoS Attacks in SDN using VGG-Based CNN Architecture\u201d\n  <\/h3>\n\n  <div class=\"pub-authors\">\n    <strong>Muhammad, Mamdouh<\/strong>, Alshra\u2018a, Abdullah S., German, Reinhard\n  <\/div>\n\n  <div class=\"pub-buttons\">\n    <!-- Download (opens VGG.pdf in on-page modal) -->\n    <a class=\"pub-btn\"\n       href=\"https:\/\/mamdouh.de\/wp-content\/uploads\/2025\/09\/An_IDS_for_DDoS_Attacks_in_SDN_using_VGG-Based_CNN_Architecture.pdf\"\n       data-pdf=\"https:\/\/mamdouh.de\/wp-content\/uploads\/2025\/09\/An_IDS_for_DDoS_Attacks_in_SDN_using_VGG-Based_CNN_Architecture.pdf\"\n       aria-label=\"Open PDF\">\n      <svg viewBox=\"0 0 24 24\" width=\"18\" height=\"18\" aria-hidden=\"true\">\n        <path d=\"M12 3v10m0 0l4-4m-4 4L8 9M4 20h16\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n      <\/svg>\n      Download\n    <\/a>\n\n    <!-- IEEE Xplore -->\n    <a class=\"pub-btn\" href=\"https:\/\/ieeexplore.ieee.org\/document\/10271630\" aria-label=\"Open on IEEE Xplore\" target=\"_blank\" rel=\"noopener noreferrer\">\n      <svg viewBox=\"0 0 24 24\" width=\"18\" height=\"18\" aria-hidden=\"true\">\n        <path d=\"M4 4h16v16H4V4zm4 3h8v2H8V7zm0 4h8v2H8v-2zm0 4h5v2H8v-2z\" fill=\"currentColor\"\/>\n      <\/svg>\n      IEEE Xplore\n    <\/a>\n\n    <!-- Cite (reveals BibTeX below) -->\n    <a class=\"pub-btn\" href=\"#bibtex-1\" data-cite=\"bibtex-1\" aria-controls=\"bibtex-1\" aria-expanded=\"false\">\n      <svg viewBox=\"0 0 24 24\" width=\"18\" height=\"18\" aria-hidden=\"true\">\n        <path d=\"M7 7h5v5H9a3 3 0 00-3 3v2H3v-2a7 7 0 014-6V7zm12 0h-5v5h3a3 3 0 013 3v2h3v-2a7 7 0 00-4-6V7z\" fill=\"currentColor\"\/>\n      <\/svg>\n      Cite\n    <\/a>\n  <\/div>\n\n  <!-- Hidden BibTeX (revealed when clicking Cite) -->\n  <pre id=\"bibtex-1\" class=\"pub-cite\" aria-hidden=\"true\">\n@INPROCEEDINGS{10271630,\n  author={Muhammad, Mamdouh and Alshra\u2018a, Abdullah S. and German, Reinhard},\n  booktitle={2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)}, \n  title={An IDS for DDoS Attacks in SDN using VGG-Based CNN Architecture}, \n  year={2023},\n  pages={1-7},\n  doi={10.23919\/SoftCOM58365.2023.10271630}\n}\n  <\/pre>\n<\/article>\n\n\n<!-- 2) Procedia Computer Science, 2024 - Elsevier -->\n<article class=\"pub-card\" id=\"pub-2\">\n  <div class=\"pub-venue\">The 14th International Conference on Sustainable Energy Information Technology\nAugust 5-7, 2024, Marshall University, Huntington, WV, USA<\/div>\n  <h3 class=\"pub-title\">Survey of Cybersecurity in Smart Grids Protocols and Datasets<\/h3>\n  <div class=\"pub-authors\"><strong>Mamdouh Muhammad<\/strong>, Abdullah S. Alshra\u2018a, Reinhard German<\/div>\n\n  <div class=\"pub-buttons\">\n    <a class=\"pub-btn\" href=\"https:\/\/mamdouh.de\/wp-content\/uploads\/2025\/09\/Survey_of_Cybersecurity_in_Smart_Grids_Protocols_and_Datasets.pdf\" data-pdf=\"https:\/\/mamdouh.de\/wp-content\/uploads\/2025\/09\/Survey_of_Cybersecurity_in_Smart_Grids_Protocols_and_Datasets.pdf\" aria-label=\"Open PDF\">\n      <svg viewBox=\"0 0 24 24\" width=\"18\" height=\"18\" aria-hidden=\"true\">\n        <path d=\"M12 3v10m0 0l4-4m-4 4L8 9M4 20h16\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n      <\/svg>\n      Download\n    <\/a>\n\n    <a class=\"pub-btn\" href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050924017605\" aria-label=\"Open on ScienceDirect\" target=\"_blank\" rel=\"noopener noreferrer\">\n      <svg viewBox=\"0 0 24 24\" width=\"18\" height=\"18\" aria-hidden=\"true\">\n        <path d=\"M12 2l3 7h7l-5.5 4 2.5 7-7-4.5L5 20l2.5-7L2 9h7l3-7z\" fill=\"currentColor\"\/>\n      <\/svg>\n      ScienceDirect\n    <\/a>\n\n    <a class=\"pub-btn\" href=\"#bibtex-2\" data-cite=\"bibtex-2\" aria-controls=\"bibtex-2\" aria-expanded=\"false\">\n      <svg viewBox=\"0 0 24 24\" width=\"18\" height=\"18\" aria-hidden=\"true\">\n        <path d=\"M7 7h5v5H9a3 3 0 00-3 3v2H3v-2a7 7 0 014-6V7zm12 0h-5v5h3a3 3 0 013 3v2h3v-2a7 7 0 00-4-6V7z\" fill=\"currentColor\"\/>\n      <\/svg>\n      Cite\n    <\/a>\n  <\/div>\n\n  <pre id=\"bibtex-2\" class=\"pub-cite\" aria-hidden=\"true\">\n@article{MUHAMMAD2024365,\n  title = {Survey of Cybersecurity in Smart Grids Protocols and Datasets},\n  journal = {Procedia Computer Science},\n  volume = {241},\n  pages = {365-372},\n  year = {2024},\n  note = {19th International Conference on Future Networks and Communications\/ 21th International Conference on Mobile Systems and Pervasive Computing\/14th International Conference on Sustainable Energy Information Technology},\n  issn = {1877-0509},\n  doi = {https:\/\/doi.org\/10.1016\/j.procs.2024.08.049},\n  url = {https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050924017605},\n  author = {Mamdouh Muhammad and Abdullah {S. Alshra\u2018a} and Reinhard German}\n}\n  <\/pre>\n<\/article>\n\n\n<!-- 3) Book chapter (no Download; \u201cAvailable here\u201d only) -->\n<article class=\"pub-card\" id=\"pub-3\">\n  <div class=\"pub-venue\">Smart and Agile Cybersecurity for IoT and IIoT Environments (IGI Global), 2024<\/div>\n  <h3 class=\"pub-title\">Cybersecurity Strategies for Smart Grids: Leveraging Agile IoT and IIoT Integration<\/h3>\n  <div class=\"pub-authors\">Abdullah S. Alshra\u2018a, <strong>Mamdouh Muhammad<\/strong>, Reinhard German<\/div>\n\n  <div class=\"pub-buttons\">\n    <a class=\"pub-btn\" href=\"https:\/\/www.igi-global.com\/chapter\/cybersecurity-strategies-for-smart-grids\/351065\" target=\"_blank\" rel=\"noopener\" aria-label=\"Open chapter on publisher site\">\n      Available here\n    <\/a>\n\n    <a class=\"pub-btn\" href=\"#bibtex-3\" data-cite=\"bibtex-3\" aria-controls=\"bibtex-3\" aria-expanded=\"false\">\n      <svg viewBox=\"0 0 24 24\" width=\"18\" height=\"18\" aria-hidden=\"true\">\n        <path d=\"M7 7h5v5H9a3 3 0 00-3 3v2H3v-2a7 7 0 014-6V7zm12 0h-5v5h3a3 3 0 013 3v2h3v-2a7 7 0 00-4-6V7z\" fill=\"currentColor\"\/>\n      <\/svg>\n      Cite\n    <\/a>\n  <\/div>\n\n  <pre id=\"bibtex-3\" class=\"pub-cite\" aria-hidden=\"true\">\n@incollection{alshra2024cybersecurity,\n  title={Cybersecurity Strategies for Smart Grids: Leveraging Agile IoT and IIoT Integration},\n  author={Alshra'a, Abdullah S and Muhammad, Mamdouh and German, Reinhard},\n  booktitle={Smart and Agile Cybersecurity for IoT and IIoT Environments},\n  pages={280--305},\n  year={2024},\n  publisher={IGI Global}\n}\n  <\/pre>\n<\/article>\n\n<!-- 4) SAFECOMP 2025 -->\n<article class=\"pub-card\" id=\"pub-4\">\n  <div class=\"pub-venue\">International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2025), Stockholm, Sweden<\/div>\n  <h3 class=\"pub-title\">HyLLM-IDS: A Conceptual Hybrid LLM-Assisted Intrusion Detection Framework for Cyber-Physical Systems<\/h3>\n  <div class=\"pub-authors\"><strong>Mamdouh Muhammad<\/strong>, Abdelkader Magdy Shaaban, Reinhard German, Loui Al Sardy<\/div>\n\n  <div class=\"pub-buttons\">\n    <a class=\"pub-btn\" href=\"https:\/\/mamdouh.de\/wp-content\/uploads\/2025\/09\/HyLLM-IDS-A-Conceptual-Hybrid-LLM-Assisted-Intrusion-Detection-Framework-for-Cyber-Physical-Systems.pdf\" data-pdf=\"https:\/\/mamdouh.de\/wp-content\/uploads\/2025\/09\/HyLLM-IDS-A-Conceptual-Hybrid-LLM-Assisted-Intrusion-Detection-Framework-for-Cyber-Physical-Systems.pdf\" aria-label=\"Open PDF\">\n      <svg viewBox=\"0 0 24 24\" width=\"18\" height=\"18\" aria-hidden=\"true\">\n        <path d=\"M12 3v10m0 0l4-4m-4 4L8 9M4 20h16\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n      <\/svg>\n      Download\n    <\/a>\n\n    <a class=\"pub-btn\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-032-02018-5_10\" aria-label=\"Open on SpringerLink\" target=\"_blank\" rel=\"noopener noreferrer\">\n      <svg viewBox=\"0 0 24 24\" width=\"18\" height=\"18\" aria-hidden=\"true\">\n        <path d=\"M10 14a4 4 0 118 0v6h-2v-6a2 2 0 10-4 0v6h-2v-6zM4 4h4v16H4V4zm2 2a1 1 0 100 2 1 1 0 000-2z\" fill=\"currentColor\"\/>\n      <\/svg>\n      Springer\n    <\/a>\n\n    <a class=\"pub-btn\" href=\"#bibtex-4\" data-cite=\"bibtex-4\" aria-controls=\"bibtex-4\" aria-expanded=\"false\">\n      <svg viewBox=\"0 0 24 24\" width=\"18\" height=\"18\" aria-hidden=\"true\">\n        <path d=\"M7 7h5v5h3a3 3 0 013 3v2h3v-2a7 7 0 00-4-6V7z\" fill=\"currentColor\"\/>\n      <\/svg>\n      Cite\n    <\/a>\n  <\/div>\n\n  <pre id=\"bibtex-4\" class=\"pub-cite\" aria-hidden=\"true\">\n@inproceedings{muhammad2025hyllm,\n  title={HyLLM-IDS: A Conceptual Hybrid LLM-Assisted Intrusion Detection Framework for Cyber-Physical Systems},\n  author={Muhammad, Mamdouh and Shaaban, Abdelkader Magdy and German, Reinhard and Al Sardy, Loui},\n  booktitle={International Conference on Computer Safety, Reliability, and Security},\n  pages={129--142},\n  year={2025},\n  organization={Springer Nature Switzerland Cham}\n}\n  <\/pre>\n<\/article>\n\n\n<!-- IFIP Networking 2025 -->\n<article class=\"pub-card\" id=\"pub-5\">\n  <div class=\"pub-venue\">2025 IFIP Networking Conference (IFIP Networking 2025), Limassol, Cyprus, May 26-29, 2025<\/div>\n  <h3 class=\"pub-title\">AI-driven Anomaly Detection with ICS Protocols in Smart Grids<\/h3>\n  <div class=\"pub-authors\"><strong>Mamdouh Muhammad<\/strong>, Kanwardeep Singh, Reinhard German<\/div>\n\n  <div class=\"pub-buttons\">\n    <a class=\"pub-btn\" href=\"https:\/\/mamdouh.de\/wp-content\/uploads\/2026\/01\/AI-driven-Anomaly-Detection-with-ICS-Protocols-in-Smart-Grids.pdf\" data-pdf=\"https:\/\/mamdouh.de\/wp-content\/uploads\/2026\/01\/AI-driven-Anomaly-Detection-with-ICS-Protocols-in-Smart-Grids.pdf\" aria-label=\"Open PDF\">\n      <svg viewBox=\"0 0 24 24\" width=\"18\" height=\"18\" aria-hidden=\"true\">\n        <path d=\"M12 3v10m0 0l4-4m-4 4L8 9M4 20h16\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n      <\/svg>\n      Download\n    <\/a>\n\n    <a class=\"pub-btn\" href=\"https:\/\/www.researchgate.net\/publication\/399417363_AI-driven_Anomaly_Detection_with_ICS_Protocols_in_Smart_Grids\" aria-label=\"Open on ResearchGate\" target=\"_blank\" rel=\"noopener noreferrer\">\n      <svg viewBox=\"0 0 24 24\" width=\"18\" height=\"18\" aria-hidden=\"true\">\n        <path d=\"M10 14a4 4 0 118 0v6h-2v-6a2 2 0 10-4 0v6h-2v-6zM4 4h4v16H4V4zm2 2a1 1 0 100 2 1 1 0 000-2z\" fill=\"currentColor\"\/>\n      <\/svg>\n      ResearchGate\n    <\/a>\n\n    <a class=\"pub-btn\" href=\"#bibtex-5\" data-cite=\"bibtex-5\" aria-controls=\"bibtex-5\" aria-expanded=\"false\">\n      <svg viewBox=\"0 0 24 24\" width=\"18\" height=\"18\" aria-hidden=\"true\">\n        <path d=\"M7 7h5v5h3a3 3 0 013 3v2h3v-2a7 7 0 00-4-6V7z\" fill=\"currentColor\"\/>\n      <\/svg>\n      Cite\n    <\/a>\n  <\/div>\n\n  <pre id=\"bibtex-5\" class=\"pub-cite\" aria-hidden=\"true\">\n@INPROCEEDINGS{IFIPNet25_Muha2505_AI,\n  AUTHOR=\"Mamdouh Muhammad and Kanwardeep Singh and Reinhard German\",\n  TITLE=\"{AI-driven} Anomaly Detection with {ICS} Protocols in Smart Grids\",\n  BOOKTITLE=\"2025 IFIP Networking Conference (IFIP Networking 2025), Limassol, Cyprus, May 26-29, 2025\",\n  YEAR=\"2025\"\n}\n  <\/pre>\n<\/article>\n\n<!-- CSNet 2025 -->\n<article class=\"pub-card\" id=\"pub-6\">\n  <div class=\"pub-venue\">2025 9th Cyber Security in Networking Conference (CSNet 2025)<\/div>\n  <h3 class=\"pub-title\">AI-Based Anomaly Detection for Enhanced Cybersecurity in IoT Networks<\/h3>\n  <div class=\"pub-authors\"><strong>Mamdouh Muhammad<\/strong>, Sushmetha Arumugam, Loui Al Sardy<\/div>\n\n  <div class=\"pub-buttons\">\n    <a class=\"pub-btn\" href=\"https:\/\/mamdouh.de\/wp-content\/uploads\/2026\/01\/AI-Based-Anomaly-Detection-for-Enhanced-Cybersecurity-in-IoT-Networks.pdf\" data-pdf=\"https:\/\/mamdouh.de\/wp-content\/uploads\/2026\/01\/AI-Based-Anomaly-Detection-for-Enhanced-Cybersecurity-in-IoT-Networks.pdf\" aria-label=\"Open PDF\">\n      <svg viewBox=\"0 0 24 24\" width=\"18\" height=\"18\" aria-hidden=\"true\">\n        <path d=\"M12 3v10m0 0l4-4m-4 4L8 9M4 20h16\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n      <\/svg>\n      Download\n    <\/a>\n\n    <a class=\"pub-btn\" href=\"https:\/\/ieeexplore.ieee.org\/document\/11288241\" aria-label=\"Open on IEEE Xplore\" target=\"_blank\" rel=\"noopener noreferrer\">\n      <svg viewBox=\"0 0 24 24\" width=\"18\" height=\"18\" aria-hidden=\"true\">\n        <path d=\"M4 4h16v16H4V4zm4 3h8v2H8V7zm0 4h8v2H8v-2zm0 4h5v2H8v-2z\" fill=\"currentColor\"\/>\n      <\/svg>\n      IEEE Xplore\n    <\/a>\n\n    <a class=\"pub-btn\" href=\"#bibtex-6\" data-cite=\"bibtex-6\" aria-controls=\"bibtex-6\" aria-expanded=\"false\">\n      <svg viewBox=\"0 0 24 24\" width=\"18\" height=\"18\" aria-hidden=\"true\">\n        <path d=\"M7 7h5v5h3a3 3 0 013 3v2h3v-2a7 7 0 00-4-6V7z\" fill=\"currentColor\"\/>\n      <\/svg>\n      Cite\n    <\/a>\n  <\/div>\n\n  <pre id=\"bibtex-6\" class=\"pub-cite\" aria-hidden=\"true\">\n@INPROCEEDINGS{11288241,\n  author={Muhammad, Mamdouh and Arumugam, Sushmetha and Al Sardy, Loui},\n  booktitle={2025 9th Cyber Security in Networking Conference (CSNet)},\n  title={AI-Based Anomaly Detection for Enhanced Cybersecurity in IoT Networks},\n  year={2025},\n  pages={199-206},\n  doi={10.1109\/CSNet67572.2025.11288241}\n}\n  <\/pre>\n<\/article>\n\n\n\n  <!-- One reusable modal for PDFs -->\n  <dialog id=\"pub-pdf-modal\" class=\"pub-modal\" aria-label=\"PDF viewer\">\n    <button class=\"pub-close\" aria-label=\"Close\">\u00d7<\/button>\n    <iframe src=\"\" loading=\"lazy\" title=\"Publication PDF\"><\/iframe>\n  <\/dialog>\n<\/section>\n\n<style>\n  .pub-card{border-top:1px solid #E6E8EF;padding:1rem 0;margin:1.25rem 0}\n  .pub-venue{font-size:.95rem;color:#4B5563;font-weight:600;margin-bottom:.35rem}\n  .pub-title{font-size:1.6rem;line-height:1.25;color:#1F2937;font-weight:800;margin:.15rem 0 .5rem}\n  .pub-authors{color:#111827;margin-bottom:.75rem}\n  .pub-buttons{display:flex;gap:.6rem;flex-wrap:wrap}\n  .pub-btn{background:#263B7F;color:#fff;text-decoration:none;padding:.55rem 1rem;border-radius:.5rem;display:inline-flex;align-items:center;gap:.45rem;font-weight:600}\n  .pub-btn:hover{filter:brightness(1.1)}\n  .pub-cite{display:none;white-space:pre-wrap;background:#F8FAFC;border:1px solid #E5E7EB;border-radius:.5rem;padding:1rem;margin-top:1rem;font-family:ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,\"Liberation Mono\",\"Courier New\",monospace;font-size:.9rem;color:#0F172A}\n\n  dialog.pub-modal{width:min(1000px,90vw);height:min(85vh,900px);border:none;padding:0;border-radius:12px}\n  dialog.pub-modal::backdrop{background:rgba(0,0,0,.5)}\n  dialog.pub-modal iframe{width:100%;height:100%;border:0;border-radius:12px}\n  .pub-close{position:absolute;top:.5rem;right:.75rem;font-size:1.25rem;background:#fff;border:1px solid #e5e7eb;border-radius:.5rem;padding:.15rem .5rem;cursor:pointer}\n<\/style>\n\n<script>\n  (function () {\n    \/\/ --- PDF modal ---\n    const modal = document.getElementById('pub-pdf-modal');\n    const frame = modal ? modal.querySelector('iframe') : null;\n    const close = modal ? modal.querySelector('.pub-close') : null;\n\n    document.addEventListener('click', function (e) {\n      const dl = e.target.closest('a.pub-btn[data-pdf]');\n      if (!dl) return;\n      e.preventDefault();\n      const url = dl.getAttribute('data-pdf');\n      if (modal && modal.showModal) {\n        frame.src = url + '#toolbar=1&view=FitH';\n        modal.showModal();\n      } else {\n        window.open(url, '_blank', 'noopener');\n      }\n    });\n\n    function shut() { if (!modal) return; modal.close(); frame.src = ''; }\n    if (close) close.addEventListener('click', shut);\n    if (modal) modal.addEventListener('click', function (e) { if (e.target === modal) shut(); });\n\n    \/\/ --- Inject a Copy button before each BibTeX <pre> ---\n    document.querySelectorAll('pre.pub-cite').forEach(function (pre) {\n      const id = pre.id || '';\n      const tools = document.createElement('div');\n      tools.className = 'pub-cite-tools';\n      const btn = document.createElement('button');\n      btn.type = 'button';\n      btn.className = 'pub-copy';\n      btn.setAttribute('data-target', id);\n      btn.setAttribute('aria-label', 'Copy citation to clipboard');\n      btn.textContent = 'Copy';\n      tools.appendChild(btn);\n      pre.parentNode.insertBefore(tools, pre);\n    });\n\n    \/\/ --- Toggle BibTeX visibility (and its toolbar) ---\n    document.addEventListener('click', function (e) {\n      const citeBtn = e.target.closest('a.pub-btn[data-cite]');\n      if (!citeBtn) return;\n\n      e.preventDefault();\n      const id = citeBtn.getAttribute('data-cite');\n      const block = document.getElementById(id);\n      if (!block) return;\n\n      const tools = block.previousElementSibling &&\n                    block.previousElementSibling.classList.contains('pub-cite-tools')\n                      ? block.previousElementSibling : null;\n\n      const isOpen = block.style.display === 'block';\n      block.style.display = isOpen ? 'none' : 'block';\n      if (tools) tools.style.display = isOpen ? 'none' : 'flex';\n\n      citeBtn.setAttribute('aria-expanded', String(!isOpen));\n      block.setAttribute('aria-hidden', String(isOpen));\n      if (!isOpen) block.scrollIntoView({ behavior: 'smooth', block: 'start' });\n    });\n\n    \/\/ --- Copy handler ---\n    document.addEventListener('click', async function (e) {\n      const copyBtn = e.target.closest('button.pub-copy');\n      if (!copyBtn) return;\n\n      const targetId = copyBtn.getAttribute('data-target');\n      const pre = document.getElementById(targetId);\n      if (!pre) return;\n\n      const text = pre.textContent.trim();\n      try {\n        if (navigator.clipboard && window.isSecureContext) {\n          await navigator.clipboard.writeText(text);\n        } else {\n          const ta = document.createElement('textarea');\n          ta.value = text;\n          document.body.appendChild(ta);\n          ta.select();\n          document.execCommand('copy');\n          document.body.removeChild(ta);\n        }\n        const old = copyBtn.textContent;\n        copyBtn.textContent = 'Copied!';\n        copyBtn.disabled = true;\n        setTimeout(() => { copyBtn.textContent = old; copyBtn.disabled = false; }, 1200);\n      } catch (_) {\n        const old = copyBtn.textContent;\n        copyBtn.textContent = 'Press Ctrl\/Cmd+C';\n        setTimeout(() => { copyBtn.textContent = old; }, 1500);\n      }\n    });\n  })();\n<\/script>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In Proceedings of the 2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM \u201923), Split, Croatia \u201cAn IDS for DDoS Attacks in SDN using VGG-Based&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-294","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/pages\/294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/comments?post=294"}],"version-history":[{"count":6,"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/pages\/294\/revisions"}],"predecessor-version":[{"id":385,"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/pages\/294\/revisions\/385"}],"wp:attachment":[{"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/media?parent=294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}