{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:03:14Z","timestamp":1743109394781,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319651262"},{"type":"electronic","value":"9783319651279"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65127-9_27","type":"book-chapter","created":{"date-parts":[[2017,8,5]],"date-time":"2017-08-05T03:35:53Z","timestamp":1501904153000},"page":"339-347","source":"Crossref","is-referenced-by-count":5,"title":["Information Security of SDN on the Basis of Meta Data"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4400-2158","authenticated-orcid":false,"given":"Alexander","family":"Grusho","sequence":"first","affiliation":[]},{"given":"Nick","family":"Grusho","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Zabezhailo","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Zatsarinny","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6493-3622","authenticated-orcid":false,"given":"Elena","family":"Timonina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,6]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Grusho, A.A., Abaev, P.O., Shorgin, S.Y., Timonina, E.E.: Graphs for information security control in software defined networks. In: AIP Conference Proceedings (2017). (to be published)","DOI":"10.1063\/1.4992267"},{"issue":"5","key":"27_CR2","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1007\/s11036-016-0676-x","volume":"21","author":"Z Shu","year":"2016","unstructured":"Shu, Z., Wan, J., Li, D., Lin, J., Vasilakos, A.V., Imran, M.: Security in software-defined networking: threats and countermeasures. J. Mob. Netw. Appl. 21(5), 764\u2013776 (2016). doi:\n10.1007\/s11036-016-0676-x","journal-title":"J. Mob. Netw. Appl."},{"key":"27_CR3","doi-asserted-by":"publisher","unstructured":"Luo, S., Wu, J., Li, J., Guo, L., Pei, B.: Context-aware traffic forwarding service for applications in SDN. In: IEEE International Conference on Smart City\/SocialCom\/SustainCom, pp. 557\u2013561. IEEE Press, New York (2015). doi:\n10.1109\/SmartCity. 2015.128","DOI":"10.1109\/SmartCity.%202015.128"},{"key":"27_CR4","doi-asserted-by":"publisher","unstructured":"Fergusson, A.D., Guha, A., Liang, C., Fonseca, R., Krishnamurthi, S.: Hierarchical policies for software defined networks. In: HotSDN 2012, 13 August, Helsinki, pp. 37\u201341. ACM (2012). doi:\n10.1145\/2342441.2342450","DOI":"10.1145\/2342441.2342450"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Sokolov, V., Alekseev, I., Mazilov, D., Nikitinskiy, M.: A network analytics system in the SDN. In: SDN and NFV: The Next Generation of Computational Infrastructure: 2014 International Science and Technology Conference Modern Networking Technologies (MoNeTec), pp. 160\u2013162. MAKS Press, Moscow (2014)","DOI":"10.1109\/MoNeTeC.2014.6995603"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Pantuza, G., Sampaio, F., Viera, L., Guedes, D., Viera, M.: Network management through graphs in software defined network. In: 10th CNSM and Workshop, pp. 400\u2013405. IFIP (2014)","DOI":"10.1109\/CNSM.2014.7014202"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"McGeer, R.: A safe, efficient update protocol for OpenFlow networks. In: HotSDN 2012, August 13, Helsinki, pp. 61\u201366. ACM (2012)","DOI":"10.1145\/2342441.2342454"},{"issue":"3","key":"27_CR8","doi-asserted-by":"publisher","first-page":"83","DOI":"10.14357\/08696527160306","volume":"26","author":"AA Grusho","year":"2016","unstructured":"Grusho, A.A., Zabezhailo, M.I., Zatsarinny, A.A., Piskovski, V.O.: Secure automatic reconfiguration of cloudy computing. J. Syst. Means Inform. 26(3), 83\u201392 (2016). doi:\n10.14357\/08696527160306","journal-title":"J. Syst. Means Inform."},{"issue":"4","key":"27_CR9","doi-asserted-by":"publisher","first-page":"97","DOI":"10.14357\/19922264160410","volume":"10","author":"AA Grusho","year":"2016","unstructured":"Grusho, A.A., Zabezhailo, M.I., Zatsarinny, A.A.: On the advanced procedure to reduce calculation of Galois closures. J. Inform. Appl. 10(4), 97\u2013106 (2016). doi:\n10.14357\/19922264160410","journal-title":"J. Inform. Appl."},{"issue":"4","key":"27_CR10","doi-asserted-by":"publisher","first-page":"95","DOI":"10.14357\/1992264150410","volume":"9","author":"AA Grusho","year":"2015","unstructured":"Grusho, A.A., Zabezhailo, M.I., Zatsarinny, A.A.: Information flow monitoring and control in cloud computing environment. J. Inform. Appl. 9(4), 95\u2013101 (2015). doi:\n10.14357\/1992264150410","journal-title":"J. Inform. Appl."},{"key":"27_CR11","doi-asserted-by":"publisher","unstructured":"Grusho, A., Grusho, N., Piskovski, V., Timonina, E.: Five SDN-oriented directions in information security. In: SDN and NFV: The Next Generation of Computational Infrastructure: 2014 International Science and Technology Conference Modern Networking Technologies (MoNeTec), pp. 68\u201371. MAKS Press, Moscow (2014). doi:\n10.1109\/MoNeTeC.2014.6995586","DOI":"10.1109\/MoNeTeC.2014.6995586"},{"key":"27_CR12","volume-title":"Problem-Solving Methods in Artificial Intelligence","author":"NJ Nilsson","year":"1971","unstructured":"Nilsson, N.J.: Problem-Solving Methods in Artificial Intelligence. McGraw-Hill Pub. Co., New York (1971)"},{"key":"27_CR13","volume-title":"Scheduling Theory. Tasks and Algorithms","author":"AA Lazarev","year":"2011","unstructured":"Lazarev, A.A., Gafarov, E.R.: Scheduling Theory. Tasks and Algorithms. Publ. House MSU, Moscow (2011)"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65127-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,8]],"date-time":"2017-08-08T14:29:24Z","timestamp":1502202564000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65127-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651262","9783319651279"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65127-9_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}