{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:28Z","timestamp":1740098968856,"version":"3.37.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319646527"},{"type":"electronic","value":"9783319646534"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64653-4_8","type":"book-chapter","created":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T05:33:39Z","timestamp":1510378419000},"page":"197-225","source":"Crossref","is-referenced-by-count":4,"title":["SHIELD: Securing Against Intruders and Other Threats Through an NFV-Enabled Environment"],"prefix":"10.1007","author":[{"given":"Hamza","family":"Attak","sequence":"first","affiliation":[]},{"given":"Marco","family":"Casassa-Mont","sequence":"additional","affiliation":[]},{"given":"Cristian","family":"D\u00e1vila","sequence":"additional","affiliation":[]},{"given":"Eleni-Constantina","family":"Davri","sequence":"additional","affiliation":[]},{"given":"Carolina","family":"Fernandez","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Gardikis","sequence":"additional","affiliation":[]},{"given":"Bernat","family":"Gast\u00f3n","sequence":"additional","affiliation":[]},{"given":"Ludovic","family":"Jacquin","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Lioy","sequence":"additional","affiliation":[]},{"given":"Antonis","family":"Litke","sequence":"additional","affiliation":[]},{"given":"Nikolaos K.","family":"Papadakis","sequence":"additional","affiliation":[]},{"given":"Dimitris","family":"Papadopoulos","sequence":"additional","affiliation":[]},{"given":"Jer\u00f3nimo","family":"N\u00fa\u00f1ez","sequence":"additional","affiliation":[]},{"given":"Eleni","family":"Trouva","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,12]]},"reference":[{"key":"8_CR1","unstructured":"Kochetkova K (2016) Kaspersky Lab official blog. \nhttps:\/\/blog.kaspersky.com\/attack-on-dyn-explained\/13325\/\n\n. Accessed 6 Apr 2017"},{"key":"8_CR2","unstructured":"Paganini P (2013) 2013 Norton Report, the impact of cybercrime according Symantec. In: Security Affairs. \nhttp:\/\/securityaffairs.co\/wordpress\/18475\/cyber-crime\/2013-norton-report.html\n\n. Accessed 6 Apr 2017"},{"key":"8_CR3","unstructured":"Ponemon Cyber Crime Report: IT, Computer & Internet Security. In: Hewlett-Packard Enterprise. \nhttp:\/\/www8.hp.com\/us\/en\/software-solutions\/ponemon-cyber-security-report\/\n\n. Accessed 6 Apr 2017"},{"key":"8_CR4","unstructured":"Paganini P (2013) 2013 \u2013 the impact of cybercrime. In: InfoSec Resources. \nhttp:\/\/resources.infosecinstitute.com\/2013-impact-cybercrime\/\n\n. Accessed 6 Apr 2017"},{"key":"8_CR5","unstructured":"Security as a Service: Cloud Security Alliance. \nhttps:\/\/cloudsecurityalliance.org\/group\/security-as-a-service\/#_overview\n\n. Accessed 6 Apr 2017"},{"key":"8_CR6","unstructured":"Messmer E (2013) Gartner: cloud-based security as a service set to take off. In: Network World. \nhttp:\/\/www.networkworld.com\/article\/2171424\/data-breach\/gartner--cloud-based-security-as-a-service-set-to-take-off.html\n\n. Accessed 6 Apr 2017"},{"key":"8_CR7","unstructured":"Network Functions Virtualisation. \nhttp:\/\/www.etsi.org\/technologies-clusters\/technologies\/nfv\n\n. Accessed 6 Apr 2017"},{"key":"8_CR8","unstructured":"(2014) Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance. \nhttp:\/\/www.etsi.org\/deliver\/etsi_gs\/NFV-SEC\/001_099\/003\/01.01.01_60\/gs_NFV-SEC003v010101p.pdf\n\n. Accessed 6 Apr 2017"},{"key":"8_CR9","unstructured":"(2014) Network Functions Virtualisation (NFV); Management and Orchestration. \nhttp:\/\/www.etsi.org\/deliver\/etsi_gs\/NFV-MAN\/001_099\/001\/01.01.01_60\/gs_nfv-man001v010101p.pdf\n\n. Accessed 6 Apr 2017"},{"key":"8_CR10","unstructured":"Herbaut N (2015) D5.1 Network Function Store. \nhttp:\/\/www.t-nova.eu\/wp-content\/ uploads\/2016\/03\/TNOVA_D5_1_Network_Function_Store_v1.0.pdf\n\n. Accessed 6 Apr 2017"},{"key":"8_CR11","unstructured":"Vapnik V, Cheryonenkis A (1974) Theory of pattern recognition"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.1016\/j.mcm.2007.03.015","volume":"46","author":"N Gerdsri","year":"2007","unstructured":"Gerdsri N, Kocaoglu D (2007) Applying the analytic hierarchy process (AHP) to build a strategic framework for technology road mapping. Math Comput Model 46:1071\u20131080. doi:\n10.1016\/j.mcm.2007.03.015","journal-title":"Math Comput Model"},{"key":"8_CR13","unstructured":"(2017) Open Cloud Integrity Technology (Open CIT). In: Intel Open Source. \nhttps:\/\/01.org\/opencit\n\n. Accessed 6 Apr 2017"},{"key":"8_CR14","unstructured":"(2017) Trusted Platform Module (TPM). \nhttp:\/\/www.trustedcomputinggroup.org\/trusted-platform-module-tpm-summary\/\n\n. Accessed 6 Apr 2017"},{"key":"8_CR15","doi-asserted-by":"publisher","unstructured":"Asokan N, Niemi V, Nyberg K (2005) Man-in-the-Middle in Tunnelled Authentication Protocols. Security Protocols 28\u201341. Doi:\n10.1007\/11542322_6","DOI":"10.1007\/11542322_6"},{"key":"8_CR16","unstructured":"OpenTC \u2013 Open Trusted Computing. In: Technikon. \nhttps:\/\/www.technikon.com\/projects\/ former\/opentc\n\n. Accessed 6 Apr 2017"},{"key":"8_CR17","unstructured":"TClouds \u2013 Trustworthy Clouds. In: Technikon. \nhttps:\/\/www.technikon.com\/projects\/former\/ tclouds\n\n. Accessed 6 Apr 2017"},{"key":"8_CR18","unstructured":"SECURED \u2013 SECURity at the network EDge. \nhttps:\/\/www-secured-fp7.eu\n\n. Accessed 6 Apr 2017"},{"key":"8_CR19","doi-asserted-by":"publisher","unstructured":"Jacquin L, Shaw A, Dalton C (2015) Towards trusted software-defined networks using a hardware-based Integrity Measurement Architecture. In: Proceedings of the 2015 1st IEEE conference on Network Softwarization (NetSoft). Doi:\n10.1109\/netsoft.2015.7116186","DOI":"10.1109\/netsoft.2015.7116186"},{"key":"8_CR20","unstructured":"TeNOR, FP7 T-NOVA. \nhttps:\/\/github.com\/T-NOVA\/TeNOR\n\n. Accessed 6 Apr 2017"},{"key":"8_CR21","unstructured":"Open Source Mano. \nhttps:\/\/osm.etsi.org\n\n. Accessed 6 Apr 2017"},{"key":"8_CR22","unstructured":"(2016) Catalogue and Repository, 5G\u2013PPP SONATA. \nhttps:\/\/github.com\/sonata-nfv\/son-catalogue-repos\n\n. Accessed 6 Apr 2017"},{"key":"8_CR23","unstructured":"Kill chain. In: Wikipedia. \nhttps:\/\/en.wikipedia.org\/wiki\/Kill_chain\n\n. Accessed 6 Apr 2017"},{"key":"8_CR24","unstructured":"Apache Kafka, distributed streaming platform. \nhttps:\/\/kafka.apache.org\n\n. Accessed 6 Apr 2017"},{"key":"8_CR25","unstructured":"Apache Storm, open source distributed real-time processing of data. \nhttp:\/\/storm.apache.org\n\n\/. Accessed 6 Apr 2017"},{"key":"8_CR26","unstructured":"Apache Spot, open source solution for packet and flow analytics. \nhttps:\/\/spot.apache.org\n\n. Accessed 6 Apr 2017"},{"key":"8_CR27","first-page":"993","volume":"3","author":"D Blei","year":"2003","unstructured":"Blei D, Ng A, Jordan M (2003) Latent dirichlet allocation. J Mach Learn Res 3:993\u20131022","journal-title":"J Mach Learn Res"}],"container-title":["Computer Communications and Networks","Guide to Security in SDN and NFV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64653-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T05:37:25Z","timestamp":1510378645000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64653-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319646527","9783319646534"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64653-4_8","relation":{},"ISSN":["1617-7975","2197-8433"],"issn-type":[{"type":"print","value":"1617-7975"},{"type":"electronic","value":"2197-8433"}],"subject":[],"published":{"date-parts":[[2017]]}}}