{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:44:53Z","timestamp":1762004693390},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/cnsm.2014.7014181","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T19:34:25Z","timestamp":1421868865000},"source":"Crossref","is-referenced-by-count":55,"title":["SDNIPS: Enabling Software-Defined Networking based intrusion prevention system in clouds"],"prefix":"10.1109","author":[{"given":"Tianyi","family":"Xing","sequence":"first","affiliation":[]},{"given":"Zhengyang","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Dijiang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Deep","family":"Medhi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","year":"0"},{"key":"15","author":"olsson","year":"0","journal-title":"Pktgen the Linux Packet Generator"},{"key":"16","year":"0"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2011.07.024"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384625"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"12","article-title":"Intrusion detection systems with snort","author":"rehman","year":"0","journal-title":"Bruce Perens' Open Source Series"},{"key":"3","article-title":"Mobicloud: A geo-distributed mobile cloud computing platform","author":"xing","year":"2012","journal-title":"Proceedings of 8th International Conference on Network and Service Management"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.8"},{"key":"1","article-title":"Snortflow: A openflow-based system in cloud environment","author":"xing","year":"2013","journal-title":"GENI Research and Educational Experiment Workshop GREE"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342467"},{"key":"7","year":"0"},{"key":"6","author":"alliance","year":"2010","journal-title":"Top Threats to Cloud Computing v 1 0"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6616109"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364943"},{"key":"9","article-title":"Extensible and scalable network monitoring using opensAFE","author":"ballard","year":"2010","journal-title":"INMIWREN"},{"key":"8","author":"morton","year":"2011","journal-title":"Intrusion Prevention Straitegies for Cloud Computing"}],"event":{"name":"2014 10th International Conference on Network and Service Management (CNSM)","location":"Rio de Janeiro, Brazil","start":{"date-parts":[[2014,11,17]]},"end":{"date-parts":[[2014,11,21]]}},"container-title":["10th International Conference on Network and Service Management (CNSM) and Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7000620\/7014126\/07014181.pdf?arnumber=7014181","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T06:02:37Z","timestamp":1490335357000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7014181\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cnsm.2014.7014181","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}