{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:28:58Z","timestamp":1744086538750,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_29","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"283-292","source":"Crossref","is-referenced-by-count":2,"title":["A Virtualization-Level Future Internet Defense-in-Depth Architecture"],"prefix":"10.1007","author":[{"given":"Jerzy","family":"Konorski","sequence":"first","affiliation":[]},{"given":"Piotr","family":"Pacyna","sequence":"additional","affiliation":[]},{"given":"Grzegorz","family":"Kolaczek","sequence":"additional","affiliation":[]},{"given":"Zbigniew","family":"Kotulski","sequence":"additional","affiliation":[]},{"given":"Krzysztof","family":"Cabaj","sequence":"additional","affiliation":[]},{"given":"Pawel","family":"Szalachowski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Burakowski, W., Tarasiuk, H., Beben, A.: System IIP for supporting \u201cParallel Internets (Networks)\u201d. FIA meeting, Ghent 2010, fi-ghent.fiweek.eu\/files\/2010\/12\/1535-4-System-IIP-FIA-Ghent-ver1.pdf","key":"29_CR1"},{"issue":"4","key":"29_CR2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MC.2005.136","volume":"38","author":"T. Anderson","year":"2005","unstructured":"Anderson, T., Peterson, L., Shenker, S., Turner, J.: Overcoming the Internet impasse through virtualization. IEEE Computer\u00a038(4), 34\u201341 (2005)","journal-title":"IEEE Computer"},{"issue":"5-6","key":"29_CR3","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s12243-010-0208-9","volume":"66","author":"N.C. Fernandes","year":"2011","unstructured":"Fernandes, N.C.: Virtual networks: isolation, performance, and trends. Annales des Telecomm.\u00a066(5-6), 339\u2013355 (2011)","journal-title":"Annales des Telecomm."},{"doi-asserted-by":"crossref","unstructured":"Campanella, M., Maglaris, V., Potts, M.: Virtual Infrastructures in Future Internet. In: Tselentis, G., et al. (eds.) Towards the Future Internet. IOS Press (2010)","key":"29_CR4","DOI":"10.3233\/978-1-60750-539-6-63"},{"doi-asserted-by":"crossref","unstructured":"Gavras, A., et al.: Future Internet Research and Experimentation: The FIRE Initiative. ACM SIGCOMM Computer Communication Review\u00a037(3) (July 2007)","key":"29_CR5","DOI":"10.1145\/1273445.1273460"},{"doi-asserted-by":"crossref","unstructured":"Future Internet-Strategic Research Agenda, ver. 1.1, Future Internet X-ETP Group (2010)","key":"29_CR6","DOI":"10.3390\/fi1010001"},{"unstructured":"http:\/\/www.syssec-project.eu\/","key":"29_CR7"},{"unstructured":"http:\/\/www.4ward-project.eu","key":"29_CR8"},{"unstructured":"http:\/\/www.sail-project.eu\/wp-content\/uploads\/2011\/08\/SAIL_DB1_v1_0_final-Public.pdf","key":"29_CR9"},{"unstructured":"http:\/\/www.effectsplus.eu","key":"29_CR10"},{"unstructured":"http:\/\/initiative.future-internet.eu","key":"29_CR11"},{"unstructured":"European Future Internet Portal, http:\/\/www.future-internet.eu","key":"29_CR12"},{"unstructured":"http:\/\/fipedia.org\/fipedia\/index.php?title=Category:Security","key":"29_CR13"},{"doi-asserted-by":"crossref","unstructured":"Flizikowski, A., Majewski, M., Ho\u0142ubowicz, M., Kowalczyk, Z., Romano, S.P.: The INTERSECTION Framework: Applied Security for Heterogeneous Networks. J. of Telecomm. and Information Technology (January 2011)","key":"29_CR14","DOI":"10.26636\/jtit.2011.1.1130"},{"unstructured":"New Generation Network Architecture: AKARI Conceptual Design, http:\/\/akari-project.nict.go.jp\/eng\/index2.html","key":"29_CR15"},{"key":"29_CR16","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-642-20898-0_7","volume-title":"Future Internet Assembly","author":"M. Castrucci","year":"2011","unstructured":"Castrucci, M., Delli Priscoli, F., Pietrabissa, A., Suraci, V.: A Cognitive Future Internet Architecture. In: Domingue, J., Galis, A., Gavras, A., Zahariadis, T., Lambert, D., Cleary, F., Daras, P., Krco, S., M\u00fcller, H., Li, M.-S., Schaffers, H., Lotz, V., Alvarez, F., Stiller, B., Karnouskos, S., Avessta, S., Nilsson, M. (eds.) Future Internet Assembly. LNCS, vol.\u00a06656, pp. 91\u2013102. Springer, Heidelberg (2011)"},{"doi-asserted-by":"crossref","unstructured":"Kelly, S., Frankel, S.: Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec. Proposed standard (with errata), Internet Engineering Task Force (May 2007)","key":"29_CR17","DOI":"10.17487\/rfc4868"},{"unstructured":"http:\/\/www.netfpga.org\/","key":"29_CR18"},{"key":"29_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/3-540-36110-3_17","volume-title":"Management Technologies for E-Commerce and E-Business Applications","author":"M. Burgess","year":"2002","unstructured":"Burgess, M.: Two Dimensional Time-Series for Anomaly Detection and Regulation in Adaptive Systems. In: Feridun, M., Kropf, P.G., Babin, G. (eds.) DSOM 2002. LNCS, vol.\u00a02506, pp. 169\u2013180. Springer, Heidelberg (2002)"},{"unstructured":"Agrawal, R., Srikant, R.: Fast algorithm for mining association rules. In: Bocca, J.B., Jarke, M., Zaniolo, C. (eds.) Proc. 20th Int. Conf. on Very Large Databases, pp. 487\u2013499 (1994)","key":"29_CR20"},{"doi-asserted-by":"crossref","unstructured":"Egi, N., et al.: Evaluating Xen for router virtualization. In: Proc. Int. Conf. on Computer Communications and Networks, ICCCN 2007, pp. 1256\u20131261 (August 2007)","key":"29_CR21","DOI":"10.1109\/ICCCN.2007.4317993"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T02:30:28Z","timestamp":1744079428000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_29","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}