{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T22:49:48Z","timestamp":1725922188780},"publisher-location":"Cham","reference-count":6,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319710747"},{"type":"electronic","value":"9783319710754"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71075-4_23","type":"book-chapter","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T12:37:18Z","timestamp":1511872638000},"page":"214-223","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Controlling Your Neighbour\u2019s Bandwidth for Fun and for Profit"],"prefix":"10.1007","author":[{"given":"Jonathan","family":"Weekes","sequence":"first","affiliation":[]},{"given":"Shishir","family":"Nagaraja","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,29]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","unstructured":"Kannan, K., Banerjee, S.: Compact TCAM: flow entry compaction in TCAM for power aware SDN. In: Frey, D., Raynal, M., Sarkar, S., Shyamasundar, R.K., Sinha, P. (eds.) ICDCN 2013, vol. 7730, pp. 439\u2013444. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-35668-1_32","DOI":"10.1007\/978-3-642-35668-1_32"},{"key":"23_CR2","unstructured":"Katta, N., Alipourfard, O., Rexford, J., Walker, D.: Rule-caching algorithms for software-defined networks. Technical report. Citeseer (2014)"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Kloti, R., Kotronis, V., Smith, P.: Openflow: a security analysis. In: 2013 21st IEEE International Conference on Network Protocols (ICNP), pp. 1\u20136, October 2013","DOI":"10.1109\/ICNP.2013.6733671"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Shin, S., Gu, G.: Attacking software-defined networks: a first feasibility study. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, HotSDN 2013, pp. 165\u2013166. ACM, New York (2013)","DOI":"10.1145\/2491185.2491220"},{"key":"23_CR5","unstructured":"Tavakoli, A., Casado, M., Koponen, T., Shenker, S.: Applying nox to the datacenter. In: HotNets (2009)"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Wang, A., Guo, Y., Hao, F., Lakshman, T., Chen, S.: Scotch: elastically scaling up SDN control-plane using vSwitch based overlay. In: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, CoNEXT 2014, pp. 403\u2013414. ACM, New York (2014)","DOI":"10.1145\/2674005.2675002"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71075-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T12:42:58Z","timestamp":1511872978000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71075-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319710747","9783319710754"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71075-4_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}