{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:32:21Z","timestamp":1704843141273},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,9,13]],"date-time":"2016-09-13T00:00:00Z","timestamp":1473724800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s40860-016-0026-6","type":"journal-article","created":{"date-parts":[[2016,9,13]],"date-time":"2016-09-13T11:23:14Z","timestamp":1473765794000},"page":"119-130","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Network virtualization by differentially switched VPN for stable business communication with offshore computers"],"prefix":"10.1007","volume":"2","author":[{"given":"Hiroshi","family":"Fujikawa","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ernesto","family":"Damiani","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yukiko","family":"Yamamoto","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hirofumi","family":"Yamaki","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Setsuo","family":"Tsuruta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,9,13]]},"reference":[{"key":"26_CR1","unstructured":"Beverly R, Bauer S, Berger A (2007) The internet\u2019s not a big truck: toward quantifying network neutrality. Proc Passive Act Measure Conf (PAM) 4427:135\u2013144"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Dischinger M, Mislove A, Haeberlen A, Gummadi KP (2008) Detecting BitTorrent blocking. Proc IMC 3\u20138","DOI":"10.1145\/1452520.1452523"},{"key":"26_CR3","unstructured":"EFF (2007) \u201cTest Your ISP\u201d Project. http:\/\/www.eff.org\/testyourisp"},{"key":"26_CR4","unstructured":"Pippa N (2009) Public sentinel: news media and governance reform. World Bank Staff Publications, p 360. ISBN 978-0-8213-8200-4"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Clayton R, Murdoch SJ, Watson RNM (2006) Ignoring the great firewall of China. Privacy Enhancing Technologies. Berlin. Springer, Heidelberg. 4258:20\u201335","DOI":"10.1007\/11957454_2"},{"key":"26_CR6","unstructured":"Nobori D, Shinjo Y (2014) VPN gate: a volunteer-organized public VPN relay system with blocking resistance for bypassing government censorship firewalls. USENIX NSDI\u201914"},{"key":"26_CR7","unstructured":"Wirewatcher (2006) Retrieved on May 31st. https:\/\/wirewatcher.wordpress.com\/2009\/09\/24\/detecting-encrypted-traffic-with-net-entropy-part-two\/"},{"key":"26_CR8","unstructured":"Freedman MJ, Freudenthal E, Mazi\u00e8res D (2004) Democratizing content publication with Coral. In: Proceedings of NSDI \u201904, San Francisco, CA"},{"key":"26_CR9","unstructured":"Davie B, Gross J (2013) A stateless transport tunneling protocol for network virtualization (STT). Internet Draft. Draft-davie-stt-03.txt, IETF"},{"key":"26_CR10","unstructured":"Koponen T et al (2014) Network virtualization in multi-tenant datacenters. Technical Report, TR2013-001E International Computer Science Institute UC Berkeley"},{"key":"26_CR11","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1007\/978-3-662-45550-0_20","volume":"8842","author":"CA Ardagna","year":"2014","unstructured":"Ardagna CA, Damiani E (2014) Network and storage latency attacks to online trading protocols in the cloud. Lect Notes Comput Sci 8842:192\u2013201","journal-title":"Lect Notes Comput Sci"},{"key":"26_CR12","unstructured":"Luo S, Ota K, Dong M, Wu J, Li J, Pei B (2016) Toward high available SDN\/NFV-based virtual network service in multi-provider scenario. In: Proceedings of 2016 World Automation Congress (WAC)"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Ottenwalder B, Koldehofe B, Rothermel K, Ramachandran U (2013) Migcep: operator migration for mobility driven distributed complex event processing. In: Proceedings of the 7th ACM International Conference on Distributed Event-based Systems, ser. DEBS\u201913. ACM, pp 183\u2013194","DOI":"10.1145\/2488222.2488265"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P, Violante F (2002) A reputation-based approach for choosing reliable resources in peer-to-peer networks. In: ACM Conference on Computer and Communications Security, pp 207\u2013216","DOI":"10.1145\/586110.586138"},{"key":"26_CR15","doi-asserted-by":"publisher","unstructured":"Pinthong N, Lilakiatsakun W (2014) Analysis of BitTorrent inspired by the application layer traffic optimization. Int Conf Inf Netw (ICOIN2014) 288\u2013291. doi: 10.1109\/ICOIN.2014.6799483","DOI":"10.1109\/ICOIN.2014.6799483"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. Naval Research Lab","DOI":"10.21236\/ADA465464"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Kent S, Seo K (2005) RFC 4301\u2014Security Architecture for the Internet Protocol. Network Working Group","DOI":"10.17487\/rfc4301"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Lau J, Townsley M, Goyret I (2005) RFC 3931\u2014 layer two tunneling protocol\u2014version 3 (L2TPv3). Network Working Group","DOI":"10.17487\/rfc3931"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Hamzeh K et al (1999) RFC 2637\u2014point-to-point tunneling protocol (PPTP). Network Working Group","DOI":"10.17487\/rfc2637"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Geneiatakis D, Portokalidis G, Keromytis AD (2011) A multilayer overlay network architecture for enhancing IP services availability against DoS. Springer ICISS, pp 322\u2013336","DOI":"10.1007\/978-3-642-25560-1_22"},{"key":"26_CR21","unstructured":"Ioannidis J, Bellovin SM (2002) Implementing pushback: router-based defense against DDoS attacks. In: Proceedings of the Network and Distributed System Security Symposium (NDSS), pp 1\u20138"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Stavrou, Keromytis AD (2005) Countering DoS attacks with stateless multipath overlays. In: Proceedings of the 12th ACM conference on Computer and communications security (CCS\u201905), pp 249\u2013259","DOI":"10.1145\/1102120.1102153"},{"key":"26_CR23","unstructured":"The Global Broadband Speed Test (2016) Retrieved on March 25, 2016 from http:\/\/www.speedtest.net"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Zhang Y, Mao ZM, Zhang M (2009) Detecting traffic differentiation in backbone ISPs with NetPolice. In: Proceedings of the Internet Measurement Conference (IMC)","DOI":"10.1145\/1644893.1644905"},{"key":"26_CR25","unstructured":"Zhang Y, Mao ZM, Zhang M (2008) Ascertaining the reality of network neutrality violation in backbone ISPs. In: Proc. of ACM HotNets-VII Workshop"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"Tariq MB, Motiwala M, Feamster N, Ammar M (2009) Detecting network neutrality violations with causal inference. In: Proc. of the CoNEXT Conference","DOI":"10.1145\/1658939.1658972"},{"key":"26_CR27","doi-asserted-by":"crossref","unstructured":"Kanuparthy P, Dovrolis C (2010) DiffProbe: detecting ISP service discrimination. In: Proc. of INFOCOM","DOI":"10.1109\/INFCOM.2010.5461983"},{"key":"26_CR28","unstructured":"Dischinger M, Marcon M, Guha S, Gummadi KP, Mahajan R, Saroiu S (2010) Glasnost: enabling end users to detect traffic differentiation. In: Proc. USENIX Symposium on Networked System Design and Implementation (NSDI), San Jose"},{"key":"26_CR29","unstructured":"Cheng YC, Hoelzle U, Cardwell N, Savage S, Voelker GM (2004) Monkey see, monkey do: a tool for TCP tracing and replaying. In: Proc. of the USENIX Technical Conference"},{"key":"26_CR30","doi-asserted-by":"crossref","unstructured":"Cui W, Peinado M, Chen K, Wang HJ, Irun-Briz L, Tupni (2008) Automatic reverse engineering of input formats. In: Proc. of CCS","DOI":"10.1145\/1455770.1455820"},{"key":"26_CR31","unstructured":"PlanetLab (2016) Retrieved on March 24, 2016. http:\/\/www.planet-lab.org\/"},{"key":"26_CR32","doi-asserted-by":"crossref","unstructured":"Andersen D, Balakrishnan H, Kaashoek F, Morris R (2001) Resilient overlay networks. In: Proc. of SOSP","DOI":"10.1145\/502034.502048"},{"key":"26_CR33","doi-asserted-by":"crossref","unstructured":"Paxson V, Adams AK, Mathis M (2002) Experiences with NIMI. In: Proc. of the SAINT Workshop","DOI":"10.1109\/SAINTW.2002.994561"},{"key":"26_CR34","unstructured":"The ICSI Netalyzr (2016) Retrieved on March 25, 2016. http:\/\/netalyzr.icsi.berkeley.edu"},{"key":"26_CR35","unstructured":"The DIMES Project (2016) Retrieved on March 25, 2016. http:\/\/www.netdimes.org\/"},{"key":"26_CR36","doi-asserted-by":"publisher","unstructured":"Deng X, Hamilton J, Thorne J, Sivaraman V (2015) Measuring broadband performance using M-Lab: why averages tell a poor tale. In: International Telecommunication Networks and Applications Conference (ITNAC2015), pp 24\u201329. doi: 10.1109\/ATNAC.2015.7366784","DOI":"10.1109\/ATNAC.2015.7366784"},{"key":"26_CR37","unstructured":"Carlson R (2003) Developing the Web100 based network diagnostic tool (NDT). In: Proc. Passive and Active Measurement"},{"key":"26_CR38","doi-asserted-by":"publisher","unstructured":"Byun Y, Narayanan S, Mottand S, Biba K (2013) Wireless broadband measurement in California. In: 10th International Conference on Information Technology: New Generations (ITNG2013), pp 505\u2013509. doi: 10.1109\/ITNG.2013.85","DOI":"10.1109\/ITNG.2013.85"},{"key":"26_CR39","doi-asserted-by":"publisher","unstructured":"Srivastava S, Anmulwar S, Sapkal AM, Batra T, Gupta AK, Kumar V (2014) Comparative study of various traffic generator tools. In: Recent Advances in Engineering and Computational Sciences (RAECS), pp 1\u20136. doi: 10.1109\/RAECS.2014.6799557","DOI":"10.1109\/RAECS.2014.6799557"},{"key":"26_CR40","volume-title":"Citrix metaframe Xp: advanced technical design guide","author":"BS Madden","year":"2003","unstructured":"Madden BS (2003) Citrix metaframe Xp: advanced technical design guide. Com Publishing Group, Brianmadden"},{"key":"26_CR41","unstructured":"ZoneRanger (2016) Retrieved on May 30th. http:\/\/www.tavve.com"},{"key":"26_CR42","doi-asserted-by":"crossref","unstructured":"Cheng CM, Kung HT, Tan KS (2002) Use of spectral analysis in defense against DoS attacks. In: Proceedings of IEEE Global Communication Conference, pp 2143\u20132148","DOI":"10.1109\/GLOCOM.2002.1189011"},{"key":"26_CR43","doi-asserted-by":"crossref","unstructured":"Sherry J, Raluca CL, Popa A, Ratnasamy S (2015) BlindBox: deep packet inspection over encrypted traffic. In: SIGCOMM\u201915 Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, vol 45, 4, pp 213\u2013226","DOI":"10.1145\/2785956.2787502"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-016-0026-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40860-016-0026-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-016-0026-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T12:23:51Z","timestamp":1568377431000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40860-016-0026-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,13]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["26"],"URL":"https:\/\/doi.org\/10.1007\/s40860-016-0026-6","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,13]]}}}