{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:15:39Z","timestamp":1761401739785},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"Tekes-Finnish Funding Agency for Innovation, Helsinki, Finland"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2015]]},"DOI":"10.1109\/access.2015.2447014","type":"journal-article","created":{"date-parts":[[2015,6,18]],"date-time":"2015-06-18T18:47:03Z","timestamp":1434653223000},"page":"967-984","source":"Crossref","is-referenced-by-count":11,"title":["Secure Hierarchical VPLS Architecture for Provider Provisioned Networks"],"prefix":"10.1109","volume":"3","author":[{"given":"Madhusanka","family":"Liyanage","sequence":"first","affiliation":[]},{"given":"Mika","family":"Ylianttila","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Gurtov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4664"},{"key":"ref38","year":"2008","journal-title":"Protecting the Network from Denial of Service Floods"},{"key":"ref33","author":"oppliger","year":"2009","journal-title":"SSL and TLS Theory and Practice"},{"key":"ref32","year":"2015","journal-title":"DIR-615 Wireless N300 Router"},{"key":"ref31","year":"2015","journal-title":"DSR-250N Services Router"},{"key":"ref30","year":"2015","journal-title":"The OpenHIP Project"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039856"},{"key":"ref36","year":"2015","journal-title":"Quality of Service (QoS) Concept and Architecture"},{"key":"ref35","year":"2013","journal-title":"Carrier Cloud Telecoms&#x2014;Exploring the Challenges of Deploying Virtualisation and SDN in Telecom Networks"},{"key":"ref34","year":"2015","journal-title":"Iperf"},{"key":"ref10","author":"khandekar","year":"2002","journal-title":"Hierarchical Virtual Private LAN Service"},{"key":"ref40","author":"gu","year":"2011","journal-title":"Analysis of Virtual Private LAN Service (VPLS) Deployment"},{"key":"ref11","author":"sodder","year":"2003","journal-title":"Virtual Hierarchical LAN Services"},{"key":"ref12","article-title":"Enhanced H-VPLS service architecture using control word","author":"hu","year":"2009"},{"key":"ref13","article-title":"Hierarchical virtual private LAN service protection scheme","author":"zelig","year":"2007"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4665"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.021110.00070"},{"key":"ref16","year":"2010","journal-title":"Architectural Considerations for Backhaul of 2G\/3G and Long Term Evolution Networks"},{"key":"ref17","year":"2015","journal-title":"Tempered Networks"},{"key":"ref18","author":"behringer","year":"2005","journal-title":"MPLS VPN Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/9780470772898"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2009.5282469"},{"key":"ref4","author":"balus","year":"2014","journal-title":"Framework for Data Center (DC) Network Virtualization"},{"key":"ref27","article-title":"Slipping in the window: TCP reset attacks","author":"watson","year":"2004"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2014.105"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4762"},{"key":"ref29","year":"2015","journal-title":"Open VSwitch An Open Virtual Switch"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4761"},{"key":"ref8","year":"2011","journal-title":"H-VPLS N-PE Redundancy for QinQ and MPLS Access"},{"key":"ref7","author":"shah","year":"2007","journal-title":"IP-Only LAN Service (IPLS)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2006.869934"},{"key":"ref9","year":"2010","journal-title":"DEMYSTIFYING H-VPLS"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2005.852071"},{"key":"ref20","author":"henderson","year":"2014","journal-title":"HIP-based Virtual Private LAN Service (HIPLS)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/sec.701"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6554720"},{"key":"ref24","year":"2015","journal-title":"Cisco ASR 9001 Router Data Sheet"},{"key":"ref23","first-page":"985","article-title":"Kronecker graphs: An approach to modeling networks","volume":"11","author":"leskovec","year":"2010","journal-title":"J Mach Learn Res"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4987"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1454503.1454559"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/7042252\/07128323.pdf?arnumber=7128323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:35:27Z","timestamp":1633919727000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7128323\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/access.2015.2447014","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}