{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:23:59Z","timestamp":1764174239232},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/ccst.2015.7389675","type":"proceedings-article","created":{"date-parts":[[2016,1,25]],"date-time":"2016-01-25T16:35:32Z","timestamp":1453739732000},"page":"159-164","source":"Crossref","is-referenced-by-count":2,"title":["An event-based SDN architecture for network security analysis"],"prefix":"10.1109","author":[{"given":"Po-Ching","family":"Lin","sequence":"first","affiliation":[]},{"given":"Jyun-Chen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Pin-Ren","family":"Chiou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The Bro Network Security Monitor","year":"0","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"journal-title":"Broccoli The Bro Client Communications Library","year":"0","key":"ref12"},{"journal-title":"Open VSwitch - An Open Virtual Switch","year":"0","key":"ref13"},{"key":"ref14","article-title":"Extending Networking into the Virtualization Layer","author":"pfaff","year":"2009","journal-title":"Proceedings of HOTNETS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"journal-title":"InformationWeek Research-Software Defined Networks-11 2012","year":"0","author":"metzler","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-23644-0_9","article-title":"Revisiting Trac Anomaly Detection using Software Defined Networking","author":"mehdi","year":"2011","journal-title":"Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2011.6089085"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2680821.2680829"},{"key":"ref7","article-title":"FRESCO: Modular Composable Security Services for Software-Defined Networks","author":"shin","year":"2013","journal-title":"Proceedings of ISOC Symposium on Network and Distributed System Security Sein"},{"journal-title":"Traffic Report Arbor Networks","article-title":"ATLAS","year":"2010","key":"ref2"},{"key":"ref1","article-title":"SDN@ Google: Why and How","author":"vahdat","year":"2013","journal-title":"Open Networking Summit"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113225"}],"event":{"name":"2015 International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2015,9,21]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2015,9,24]]}},"container-title":["2015 International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7369421\/7389647\/07389675.pdf?arnumber=7389675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T00:30:19Z","timestamp":1498264219000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7389675\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ccst.2015.7389675","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}