{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:07:12Z","timestamp":1759133232928,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/comapp.2017.8079751","type":"proceedings-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T19:48:20Z","timestamp":1508960900000},"page":"36-42","source":"Crossref","is-referenced-by-count":11,"title":["Motivation of DDoS Attack-Aware in Software Defined Networking Controller Placement"],"prefix":"10.1109","author":[{"given":"Muhammad Reazul","family":"Haque","sequence":"first","affiliation":[]},{"given":"Sameer","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Saw Chin","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Zulfadzli","family":"Yusoff","sequence":"additional","affiliation":[]},{"given":"Lee Ching","family":"Kwang","sequence":"additional","affiliation":[]},{"given":"Ir Rizaludin","family":"Kaspin","sequence":"additional","affiliation":[]},{"given":"Salvatore Renato","family":"Ziri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Ericsson Heterogeneous Network (Hetnet)","year":"2017","key":"ref10"},{"journal-title":"Software-Defined Networking A Comprehensive Survey","year":"2014","author":"kreutz","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref14","first-page":"10","author":"tootoonchian","year":"2012","journal-title":"Proceedings of the 2nd USENIX Conference on Hot Topics in Management of Internet Cloud and Enterprise Networks and Services Ser Hot-ICE'12"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342444"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2013.6727805"},{"journal-title":"The Journal of China Universities of Posts and Telecommunications","year":"2012","author":"yan-nan","key":"ref17"},{"key":"ref18","article-title":"Controller Placement Problem to Enhance Performance in Multi-domain SDN Networks, Graduate School of Engineering","author":"aoki","year":"0","journal-title":"Japan The Fifteenth International Conference on Networks (includes SOFTNETWORKING 2016)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081075"},{"journal-title":"Tech Rep","article-title":"Arbor special report: Worldwide infrastructure security report volume IX","year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486019"},{"journal-title":"Unveiling Potential Failure Propagation Scenarios in Core Transport Networks","year":"2014","author":"manzano","key":"ref27"},{"journal-title":"The Road to SDN An Intellectual History of Programmable Networks","year":"2016","author":"feamster","key":"ref3"},{"journal-title":"7 Advantages of Software Defined Networking Ingram Micro Advisor","year":"2014","author":"brown","key":"ref6"},{"key":"ref5","first-page":"275","article-title":"DETECTION OF DDOS ATTACKS AGAINSTWIRELESS SDN CONTROLLERS BASED ON The FUZZY SYNTHETIC EVALUATION DECISION-MAKING MODEL","volume":"33","author":"yan","year":"2016","journal-title":"Ad Hoc & Sensor Wireless Networks"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1955","DOI":"10.1109\/COMST.2014.2320094","article-title":"A survey and a layered taxonomy of software-defined networking","volume":"16","author":"yosr jarraya","year":"2014","journal-title":"IEEE Commun Surveys Tuts"},{"key":"ref7","article-title":"Five SDN Benefits Enterprises Should Consider","author":"yegulalp","year":"2013","journal-title":"Computer Newtworks"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/UkrMiCo.2016.7739623"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2487361"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1631\/FITEE.1500350","article-title":"AKself- adaptive SDNcontroller placement for wide area networks","author":"xia","year":"2016","journal-title":"Frontiers of Information Technology & Electronic Engineering"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2487361"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2014.6876752"},{"journal-title":"About POX","year":"2013","author":"cauley","key":"ref21"},{"journal-title":"On Multi-controller Placement Optimization in Software Defined Networking - based WANs","year":"2015","author":"borcoci","key":"ref24"},{"key":"ref23","first-page":"1","article-title":"SDN controllers: A comparative study","author":"ola","year":"2016","journal-title":"2016 18th Mediterranean Electrotechnical Conference (MELECON) MELECON"},{"journal-title":"Open Networking Foundation Software-Defined Networking (SDN) Definition","year":"2017","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.02.026"}],"event":{"name":"2017 International Conference on Computer and Applications (ICCA)","start":{"date-parts":[[2017,9,6]]},"location":"Doha, United Arab Emirates","end":{"date-parts":[[2017,9,7]]}},"container-title":["2017 International Conference on Computer and Applications (ICCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8055744\/8079729\/08079751.pdf?arnumber=8079751","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T04:43:33Z","timestamp":1570250613000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8079751\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/comapp.2017.8079751","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}