{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:27:37Z","timestamp":1743128857385,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030503987"},{"type":"electronic","value":"9783030503994"}],"license":[{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-50399-4_42","type":"book-chapter","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T11:02:37Z","timestamp":1591700557000},"page":"436-446","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Logical Network Separation and Update Inducing Techniques of Non-updated Vaccine Host by Creating Flow Rule in SDN"],"prefix":"10.1007","author":[{"given":"Dohyeon","family":"Bak","sequence":"first","affiliation":[]},{"given":"Mintae","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jonghoon","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Raeseung","family":"Jang","sequence":"additional","affiliation":[]},{"given":"Wonyoung","family":"Jang","sequence":"additional","affiliation":[]},{"given":"Sun-Young","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,10]]},"reference":[{"key":"42_CR1","unstructured":"Symantec: Internet Security Threat Report (ISTR), vol. 24, pp. 14\u201321 (2019). \nhttps:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-24-2019-en.pdf"},{"key":"42_CR2","unstructured":"Se-Min, O.: Detection mechanism for malicious code using the behavior pattern analysis based on file DNA. Ph.D. Daejeon University (2011)"},{"issue":"1","key":"42_CR3","first-page":"1","volume":"24","author":"CC Chen","year":"2015","unstructured":"Chen, C.C., Shaw, R.S., Yang, S.C.: Mitigating information security risks by increasing user security awareness: a case study of an information security awareness system. Inf. Technol. Learn. Perform. J. 24(1), 1\u201314 (2015)","journal-title":"Inf. Technol. Learn. Perform. J."},{"issue":"6","key":"42_CR4","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.6109\/jkiice.2014.18.6.1369","volume":"18","author":"D Lee","year":"2014","unstructured":"Lee, D.: Threats according to the type of software updates and white-list construction scheme for advanced security. J. Korea Inst. Inf. Commun. Eng. 18(6), 1369\u20131374 (2014)","journal-title":"J. Korea Inst. Inf. Commun. Eng."},{"key":"42_CR5","unstructured":"In-Suk, J.: A studies for strengthening the research security system through analysis of enterprise research security system. M.A. Sungkyunkwan University (2015)"},{"key":"42_CR6","unstructured":"Seungwoo, K.: A study on the effect of internal information leakage prevention on the security recognition of insiders. Myongji University. Ph.D. (2020)"},{"issue":"7","key":"42_CR7","first-page":"4536","volume":"15","author":"WJ Lee","year":"2014","unstructured":"Lee, W.J., Choi, I.W.: A tool to support efficient development of node software for various operating system platforms in sensor network environment. J. Korea Acad. Ind. Coop. Soc. 15(7), 4536\u20134537 (2014)","journal-title":"J. Korea Acad. Ind. Coop. Soc."},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, H., Yan, J.: Performance of SDN routing in comparison with legacy routing protocols. In: International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. IEEE (2015)","DOI":"10.1109\/CyberC.2015.30"},{"issue":"2","key":"42_CR9","first-page":"129","volume":"27","author":"BY Yoon","year":"2012","unstructured":"Yoon, B.Y., Lee, B.C.: Future networking technology of SDN. Electron. Telecommun. Trends 27(2), 129\u2013136 (2012)","journal-title":"Electron. Telecommun. Trends"},{"key":"42_CR10","unstructured":"Recommendation ITU-T Y.3300: Framework of software-defined networking. International Telecommunication Union (2014). \nhttps:\/\/www.itu.int\/rec\/T-REC-Y.3300-201406-I"},{"key":"42_CR11","unstructured":"Arora, H.: Software Defined Networking (SDN) - Architecture and role of OpenFlow. \nhttps:\/\/www.howtoforge.com\/tutorial\/software-defined-networking-sdn-architecture-and-role-of-openflow"},{"key":"42_CR12","unstructured":"Ye, H.J.: A scalable message flow control mechanism in SDN. M.A. Ajou University (2015)"},{"issue":"2","key":"42_CR13","first-page":"393","volume":"29","author":"N-G Kang","year":"2019","unstructured":"Kang, N.-G., Kwon, T.: Unauthorized software blocking techniques. J. Korea Inst. Inf. Secur. Cryptol. (JKIISC) 29(2), 393\u2013399 (2019)","journal-title":"J. Korea Inst. Inf. Secur. Cryptol. (JKIISC)"},{"issue":"4","key":"42_CR14","first-page":"266","volume":"38B","author":"J Jo","year":"2013","unstructured":"Jo, J., Lee, S., Kong, J., Kim, J.: A centralized network policy controller for SDN-based service overlay networking. J. Korean Inst. Commun. Inf. Sci. Netw. Serv. 38B(4), 266\u2013278 (2013)","journal-title":"J. Korean Inst. Commun. Inf. Sci. Netw. Serv."},{"key":"42_CR15","unstructured":"Jung, J.H.: Communication history based latency reduction for QUIC protocol. M.A. Changwon University (2018)"},{"key":"42_CR16","unstructured":"Ahn, S.: Defense against SYN flooding attack for SDN network. M.A. Soongsil University (2018)"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50399-4_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T11:28:08Z","timestamp":1591702088000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-50399-4_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,10]]},"ISBN":["9783030503987","9783030503994"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50399-4_42","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,6,10]]},"assertion":[{"value":"10 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lodz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}