{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T02:23:09Z","timestamp":1778034189633,"version":"3.51.4"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030029302","type":"print"},{"value":"9783030029319","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02931-9_7","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T11:13:03Z","timestamp":1545995583000},"page":"83-94","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Toward Resilient Smart Grid Communications Using Distributed SDN with ML-Based Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Allen","family":"Starke","sequence":"first","affiliation":[]},{"given":"Janise","family":"McNair","sequence":"additional","affiliation":[]},{"given":"Rodrigo","family":"Trevizan","sequence":"additional","affiliation":[]},{"given":"Arturo","family":"Bretas","sequence":"additional","affiliation":[]},{"given":"Joshua","family":"Peeples","sequence":"additional","affiliation":[]},{"given":"Alina","family":"Zare","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"7_CR1","unstructured":"Monsanto, C., Reich, J., Foster, N., Rexford, J., Walker, D.: Composing software defined networks. In: The 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2013), pp. 1\u201313. IEEE (2013)"},{"key":"7_CR2","unstructured":"Lin, H., Chen, C., Wang, J., Qi, J., Jin, D.: Self-healing attack-resilient PMU network for power system operation. IEEE Trans. Smart Grid 1 (2016)"},{"issue":"2","key":"7_CR3","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MNET.2017.1600212NM","volume":"31","author":"N Chen","year":"2014","unstructured":"Chen, N., Wang, M., Zhang, N., Shen, X.: SDN-based framework for the PEV integrated smart grid. IEEE Netw. 31(2), 14\u201321 (2014)","journal-title":"IEEE Netw."},{"issue":"99","key":"7_CR4","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/TDSC.2017.2726066","volume":"PP","author":"S Pisharody","year":"2017","unstructured":"Pisharody, S., Natarajan, J., Chowdhary, A., Alshalan, A., Huang, D.: Brew: a security policy analysis framework for distributed sdn-based cloud environments. IEEE Trans. Dependable Secur. Comput. PP(99), 87\u201393 (2017). https:\/\/doi.org\/10.1109\/TDSC.2017.2726066","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Nkosi, M., Lysko, A., Ravhuanzwo, L., Nandeni, T., Engelberencht, A.: Classification of SDN distributed controller approaches: a brief overview. In: 2016 International Conference on Advances in Computing and Communication Engineering (ICACCE), ICACCE, pp. 342\u2013344 (2016)","DOI":"10.1109\/ICACCE.2016.8073772"},{"key":"7_CR6","unstructured":"ONOS-Open Network Operating System, March 2018. https:\/\/wiki.onosproject.org\/. Accessed 4 Mar 2018"},{"issue":"11","key":"7_CR7","first-page":"126","volume":"14","author":"A Muqaddas","year":"2017","unstructured":"Muqaddas, A., Giaccone, P., Bianco, A., Maier, G.: Inter-controller traffic to support consistency in ONOS clusters. IEEE Trans. Netw. Serv. Manag. 14(11), 126\u2013133 (2017)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Kopeikin, A., Ponda, S.S., Johnson, L.B., How, J.P.: Multi-UAV network control through dynamic task allocation: ensuring data-rate and bit-error-rate support. In: 2012 IEEE Globecom Workshops, pp. 1579\u20131584. IEEE (2012)","DOI":"10.1109\/GLOCOMW.2012.6477821"},{"issue":"1","key":"7_CR9","first-page":"126","volume":"1","author":"K Limthong","year":"2013","unstructured":"Limthong, K.: Real-time computer network anomaly detection using machine learning techniques. J. Adv. Comput. Netw. 1(1), 126\u2013133 (2013)","journal-title":"J. Adv. Comput. Netw."},{"issue":"4","key":"7_CR10","first-page":"126","volume":"5","author":"A Yadav","year":"2015","unstructured":"Yadav, A.: Incremental k-means clustering algorithms: a review. Int. J. Latest Trends Eng. Technol. (IJLTET) 5(4), 126\u2013133 (2015)","journal-title":"Int. J. Latest Trends Eng. Technol. (IJLTET)"},{"issue":"1","key":"7_CR11","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1080\/01969727408546059","volume":"4","author":"JC Dunn","year":"1974","unstructured":"Dunn, J.C.: Well-seperated clusters and optimal fuzzy partitions. Cybernetics 4(1), 95\u2013104 (1974)","journal-title":"Cybernetics"},{"issue":"2","key":"7_CR12","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1109\/TPAMI.1979.4766909","volume":"1","author":"DL Davies","year":"1979","unstructured":"Davies, D.L., Bouldin, D.W.: A cluster seperation measure. IEEE Trans. Pattern Anal. Mach. Intell. 1(2), 224\u2013227 (1979)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2","key":"7_CR13","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1080\/10618600.2000.10474879","volume":"9","author":"RM Neal","year":"2000","unstructured":"Neal, R.M.: Markov chain sampling methods for Dirichlet process mixture models. Comput. Graph. Stat. 9(2), 249\u2013265 (2000)","journal-title":"Comput. Graph. Stat."},{"key":"7_CR14","unstructured":"KDD Cup 1999 Data, March 1999. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html. Accessed 4 Mar 2018"}],"container-title":["Lecture Notes in Computer Science","Wired\/Wireless Internet Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02931-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,13]],"date-time":"2024-07-13T17:41:47Z","timestamp":1720892507000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-02931-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030029302","9783030029319"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02931-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"29 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WWIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wired\/Wireless Internet Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Boston, MA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wwic2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wwic2018.nws.cs.unibo.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}