{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:28Z","timestamp":1740098968888,"version":"3.37.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319646527"},{"type":"electronic","value":"9783319646534"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64653-4_11","type":"book-chapter","created":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T05:33:39Z","timestamp":1510378419000},"page":"273-298","source":"Crossref","is-referenced-by-count":3,"title":["Improving Security in Coalition Tactical Environments Using an SDN Approach"],"prefix":"10.1007","author":[{"given":"Vinod K.","family":"Mishra","sequence":"first","affiliation":[]},{"given":"Dinesh C.","family":"Verma","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Williams","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,12]]},"reference":[{"issue":"2","key":"11_CR1","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown N et al (2008) OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput Commun Rev 38(2):69\u201374","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"issue":"6","key":"11_CR2","doi-asserted-by":"crossref","first-page":"1265","DOI":"10.1109\/TIE.2002.804974","volume":"49","author":"A Willig","year":"2002","unstructured":"Willig A, Kubisch M, Hoene C, Wolisz A (2002) Measurements of a wireless link in an industrial environment using an IEEE 802.11-compliant physical layer. IEEE Trans Ind Electron 49(6):1265\u20131282","journal-title":"IEEE Trans Ind Electron"},{"unstructured":"Brehmer B (2005) The dynamic OODA loop: amalgamating boyd\u2019s OODA loop and the cybernetic approach to command and control. In: Proceedings of the 10th international command and control research technology symposium","key":"11_CR3"},{"doi-asserted-by":"crossref","unstructured":"Ye F et al (2012) MECA: Mobile Edge Capture and Analysis middleware for social sensing applications. In: Proceedings of the 21st International Conference on World Wide Web. ACM","key":"11_CR4","DOI":"10.1145\/2187980.2188184"},{"doi-asserted-by":"crossref","unstructured":"Verma D (2010) (ed) Network science for military coalition operations: Information Exchange and Interaction. IGI Global","key":"11_CR5","DOI":"10.4018\/978-1-61520-855-5"},{"doi-asserted-by":"crossref","unstructured":"Castro A et al (2016) Brokered orchestration for end-to-end service provisioning across heterogeneous multi-operator (multi-AS) optical networks. J Lightwave Technol 34(23)","key":"11_CR6","DOI":"10.1109\/JLT.2016.2610964"},{"unstructured":"Calo S et al (2009) Technologies for federation and interoperation of coalition networks. Information Fusion, 2009. FUSION\u201909. 12th international conference on. IEEE","key":"11_CR7"},{"unstructured":"S\u00f8rensen E (2014) SDN used for policy enforcement in a federated military network","key":"11_CR8"},{"doi-asserted-by":"crossref","unstructured":"Mishra V, Verma D, Williams C Marcus K (May 15\u201316, 2017) Comparing software defined architectures for coalition operations. In: Proceedings of the international conference on military communications and information systems, Oulu, Finland","key":"11_CR9","DOI":"10.1109\/ICMCIS.2017.7956476"},{"issue":"10","key":"11_CR10","doi-asserted-by":"crossref","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"C Tsai","year":"2009","unstructured":"Tsai C, Hsu Y, Lin C, Lin W (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11994\u201312000","journal-title":"Expert Syst Appl"},{"doi-asserted-by":"crossref","unstructured":"Verma DC (2009) Principles of computer systems and network management. Springer, Heidelberg, Chapter 6, pp 143\u2013155","key":"11_CR11","DOI":"10.1007\/978-0-387-89009-8"},{"unstructured":"Cachin C (2016) Architecture of the Hyperledger blockchain fabric. In: Proceedings of the workshop on distributed cryptocurrencies and consensus ledgers","key":"11_CR12"},{"doi-asserted-by":"crossref","unstructured":"Verma D, Desai N, Preece A, Taylor I A block chain based architecture for asset management in coalition operations. In: Proceedings of SPIE Defense + Commercial Sensing Symposium, Anaheim, CA, April 2017","key":"11_CR13","DOI":"10.1117\/12.2264911"}],"container-title":["Computer Communications and Networks","Guide to Security in SDN and NFV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64653-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T21:21:23Z","timestamp":1570310483000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64653-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319646527","9783319646534"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64653-4_11","relation":{},"ISSN":["1617-7975","2197-8433"],"issn-type":[{"type":"print","value":"1617-7975"},{"type":"electronic","value":"2197-8433"}],"subject":[],"published":{"date-parts":[[2017]]}}}