{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:48:10Z","timestamp":1740098890947,"version":"3.37.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615653"},{"type":"electronic","value":"9783319615660"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61566-0_96","type":"book-chapter","created":{"date-parts":[[2017,7,3]],"date-time":"2017-07-03T22:36:53Z","timestamp":1499121413000},"page":"1019-1026","source":"Crossref","is-referenced-by-count":0,"title":["Reducing the Impact of Traffic Sanitization on Latency Sensitive Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3634-7554","authenticated-orcid":false,"given":"Mauro","family":"Migliardi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2272-2376","authenticated-orcid":false,"given":"Alessio","family":"Merlo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1341-2939","authenticated-orcid":false,"given":"Sherenaz Al-Haj","family":"Baddar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"96_CR1","unstructured":"Ponemon Cost of Data Breach Study (2016). \nhttps:\/\/www-03.ibm.com\/security\/data-breach\/\n\n. Last accessed 12 Apr 2017"},{"key":"96_CR2","unstructured":"Yahoo\u2019s data breach is one of the biggest in history. \nhttp:\/\/www.businessinsider.com\/yahoo-hack-data-breach-how-big-chart-2016-9?IR=T\n\n. Last accessed 13 Apr 2017"},{"key":"96_CR3","unstructured":"Lord, N.: The History of Data Breaches. \nhttps:\/\/digitalguardian.com\/blog\/history-data-breaches\n\n. Last accessed 12 Apr 2017"},{"key":"96_CR4","unstructured":"Findings from the 2016 breach level index. \nhttp:\/\/breachlevelindex.com\/assets\/Breach-Level-Index-Report-2016-Gemalto.pdf\n\n. Last accessed 12 Apr 2017"},{"key":"96_CR5","doi-asserted-by":"publisher","unstructured":"Jerkins, J.A.: Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code. In: 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, pp. 1\u20135 (2017). doi:\n10.1109\/CCWC.2017.7868464","DOI":"10.1109\/CCWC.2017.7868464"},{"key":"96_CR6","unstructured":"Q4 2016 State of the Internet\/Security Report. \nhttps:\/\/www.akamai.com\/us\/en\/about\/our-thinking\/state-of-the-Internet-report\/global-state-of-the-Internet-security-ddos-attack-reports.jsp\n\n. Last accessed 13 Apr 2017"},{"key":"96_CR7","doi-asserted-by":"publisher","unstructured":"Ring, M., D\u00fcrrwang, J., Sommer, F., Kriesten, R.: Survey on vehicular attacks - building a vulnerability database. In: 2015 IEEE International Conference on Vehicular Electronics and Safety (ICVES), Yokohama, pp. 208\u2013212 (2015). doi:\n10.1109\/ICVES.2015.7396919","DOI":"10.1109\/ICVES.2015.7396919"},{"key":"96_CR8","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.pmcj.2015.05.005","volume":"24","author":"A Merlo","year":"2015","unstructured":"Merlo, A., Migliardi, M., Caviglione, L.: A survey on energy-aware security mechanisms. Pervasive Mob. Comput. 24, 77\u201390 (2015). doi:\n10.1016\/j.pmcj.2015.05.005","journal-title":"Pervasive Mob. Comput."},{"key":"96_CR9","unstructured":"Lan, K.C., Hussain, A., Dutta, D.: Effect of malicious traffic on the network. In: Proceedings of PAM 2003, San Diego, California, April 2003"},{"key":"96_CR10","doi-asserted-by":"crossref","unstructured":"Mallikarjunan, K.N., Muthupriya, K., Shalinie, S.M.: A survey of distributed denial of service attack. In: 2016 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1\u20136, January 2016","DOI":"10.1109\/ISCO.2016.7727096"},{"key":"96_CR11","doi-asserted-by":"publisher","unstructured":"Merlo, A., Migliardi, M., Spadacini, E.: IPS-based reduction of network energy consumption. Logic J. IGPL (in press). doi:\n10.1093\/jigpal\/jzw053","DOI":"10.1093\/jigpal\/jzw053"},{"key":"96_CR12","unstructured":"Netflix and Youtube grab 50% of peak Internet traffic, p2p fades into the sunset. \nhttp:\/\/www.digitaltrends.com\/home-theater\/netflix-youtube-grab-50-peak-Internet-traffic-peer-peer-fades-sunset\/\n\n. Last accessed 13 Apr 2017"},{"key":"96_CR13","unstructured":"White paper: Cisco VNI Forecast and Methodology, 2015\u20132020. \nhttps:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/complete-white-paper-c11-481360.html\n\n. Last accessed 13 Apr 2017"},{"issue":"12","key":"96_CR14","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1364\/JOCN.5.001431","volume":"5","author":"S Das","year":"2013","unstructured":"Das, S., Parulkar, G., McKeown, N.: Rethinking IP core networks. IEEE\/OSA J. Opt. Commun. Networking 5(12), 1431\u20131442 (2013). doi:\n10.1364\/JOCN.5.001431","journal-title":"IEEE\/OSA J. Opt. Commun. Networking"}],"container-title":["Advances in Intelligent Systems and Computing","Complex, Intelligent, and Software Intensive Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61566-0_96","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,3]],"date-time":"2017-07-03T23:17:52Z","timestamp":1499123872000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61566-0_96"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615653","9783319615660"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61566-0_96","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}