{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:48:43Z","timestamp":1726037323902},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030249069"},{"type":"electronic","value":"9783030249076"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_23","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:02:46Z","timestamp":1562770966000},"page":"297-308","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking"],"prefix":"10.1007","author":[{"given":"Cheng Chi","family":"Qin","sequence":"first","affiliation":[]},{"given":"Tan Saw","family":"Chin","sequence":"additional","affiliation":[]},{"given":"Lee Ching","family":"Kwang","sequence":"additional","affiliation":[]},{"given":"Zulfadzli","family":"Yusoff","sequence":"additional","affiliation":[]},{"given":"Rizaluddin","family":"Kaspin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"23_CR1","unstructured":"Tatipamula, M., Beheshti-Zavareh, N., Zhang, Y.: Controller placement for fast failover in the split architecture. EP Patent EP2552065A1, 30 January 2013"},{"key":"23_CR2","unstructured":"Beheshti-Zavareh, N., Zhang, Y., Halpern, J.: Controller placement for fast failover in the split architecture. U.S. Patent US 9225591 B2, 29 December 2015"},{"key":"23_CR3","unstructured":"Lin, S.C., Wang, P., Akyildiz, I., Luo, M.: Traffic-driven network controller placement in software-defined networks. U.S. Patent US20160323144A1, 3 November 2016"},{"key":"23_CR4","unstructured":"Collaborative theory-based DDoS (Distributed Denial of Service Attack) defence system and method. CN Patent CN106921666A, 4 July 2017"},{"issue":"1","key":"23_CR5","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TNSM.2017.2651107","volume":"14","author":"MTI Huque ul","year":"2017","unstructured":"ul Huque, M.T.I., Si, W., Jourjon, G., Gramoli, V.: Large-scale dynamic controller placement. IEEE Trans. Netw. Serv. Manag. 14(1), 63\u201376 (2017)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"5","key":"23_CR6","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MNET.2017.1600182","volume":"31","author":"W Guodong","year":"2017","unstructured":"Guodong, W., Yanxiao, Z., Jun, H., Wei, W.: The controller placement problem in software defined networking: a survey. IEEE Netw. 31(5), 21\u201327 (2017)","journal-title":"IEEE Netw."},{"issue":"1","key":"23_CR7","doi-asserted-by":"publisher","first-page":"e1996","DOI":"10.1002\/nem.1996","volume":"28","author":"L Dridi","year":"2018","unstructured":"Dridi, L., Zhani, M.F.: A holistic approach to mitigating DoS attacks in SDN networks. Int. J. Netw. Manag. 28(1), e1996 (2018)","journal-title":"Int. J. Netw. Manag."},{"issue":"3","key":"23_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41650-017-0030-x","volume":"2","author":"K Sood","year":"2017","unstructured":"Sood, K., Xiang, Y.: The controller placement problem or the controller selection problem? J. Commun. Inf. Netw. 2(3), 1\u20139 (2017)","journal-title":"J. Commun. Inf. Netw."},{"issue":"3","key":"23_CR9","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1109\/TNSM.2017.2720699","volume":"14","author":"BP Killi","year":"2017","unstructured":"Killi, B.P., Rao, S.V.: Capacitated next controller placement in software defined networks. IEEE Trans. Netw. Serv. Manag. 14(3), 514\u2013527 (2017)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"1","key":"23_CR10","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/LCOMM.2014.2371014","volume":"19","author":"A Sallahi","year":"2015","unstructured":"Sallahi, A., St-Hilaire, M.: Optimal model for the controller placement problem in software defined networks. IEEE Commun. Lett. 19(1), 30\u201333 (2015)","journal-title":"IEEE Commun. Lett."},{"issue":"2","key":"23_CR11","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1109\/LCOMM.2016.2621746","volume":"21","author":"A Sallahi","year":"2017","unstructured":"Sallahi, A., St-Hilaire, M.: Expansion model for the controller placement problem in software defined networks. IEEE Commun. Lett. 21(2), 274\u2013277 (2017)","journal-title":"IEEE Commun. Lett."},{"issue":"4","key":"23_CR12","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1109\/LCOMM.2016.2645558","volume":"21","author":"Y Hu","year":"2017","unstructured":"Hu, Y., Luo, T., Beaulieu, N.C., Deng, C.: The energy-aware controller placement problem in software defined networks. IEEE Commun. Lett. 21(4), 741\u2013744 (2017)","journal-title":"IEEE Commun. Lett."},{"key":"23_CR13","unstructured":"Miu, T.T., Hui, A.K., Lee, W.L., Luo, D.X., Chung, A.K.: Universal DDoS Mitigation Bypass. Black Hat USA (2013)"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Scott-Hayward, S., O\u2019Callaghan, G., Sezer, S.: SDN security: a survey. In: IEEE SDN for Future Networks and Services (SDN4FNS), pp. 1\u20137 (2013)","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Qin, Q., Poularakis, K., Iosifidis, G., Tassiulas, L.: SDN controller placement at the edge: optimizing delay and overheads. In: Proceedings of IEEE INFOCOM, pp. 684\u2013692 (2018)","DOI":"10.1109\/INFOCOM.2018.8485963"},{"key":"23_CR16","doi-asserted-by":"publisher","first-page":"75","DOI":"10.3390\/fi11030075","volume":"11","author":"H Sufiev","year":"2019","unstructured":"Sufiev, H., Haddad, Y., Barenboim, L., Soler, J.: Dynamic SDN controller load balancing. Future Internet 11, 75 (2019)","journal-title":"Future Internet"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Fonseca, P., Bennesby, R., Mota, E., Passito, A.: A replication component for resilient OpenFlow-based networking. In: Network Operations and Management Symposium (NOMS), pp. 933\u2013939. IEEE (2012)","DOI":"10.1109\/NOMS.2012.6212011"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Jalili, A., Ahmadi, V., Keshtgari, M., Kazemi, M.: Controller placement in software-defined wan using multi objective genetic algorithm. In: 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), pp. 656\u2013662. IEEE, 5 November 2015","DOI":"10.1109\/KBEI.2015.7436121"},{"key":"23_CR19","unstructured":"Mitchell, B.: Availability concepts for networks and systems, lifewire (2017). \n                    https:\/\/www.lifewire.com\/availabilityconcepts-for-networks-systems-817820"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:06:40Z","timestamp":1562771200000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}