{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T14:20:24Z","timestamp":1751466024965},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/glocom.2011.6134465","type":"proceedings-article","created":{"date-parts":[[2012,1,30]],"date-time":"2012-01-30T21:45:17Z","timestamp":1327959917000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Evaluation of Security Vulnerabilities by Using ProtoGENI as a Launchpad"],"prefix":"10.1109","author":[{"family":"Dawei Li","sequence":"first","affiliation":[]},{"family":"Xiaoyan Hong","sequence":"additional","affiliation":[]},{"given":"J.","family":"Bowman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref4"},{"year":"0","key":"ref3"},{"key":"ref10","article-title":"Practical Exploitation on System Vulnerability of ProtoGENI","author":"dawei","year":"2011","journal-title":"Proceedings of 49th ACM Southeast Conference"},{"journal-title":"GENI Spiral Two Project The Hive Mind Applying a Distributed Security Sensor Network to GENI","year":"0","author":"peisert","key":"ref6"},{"year":"0","key":"ref11"},{"journal-title":"GENI Spiral Two project GENI Experiments for Traffic Capture Capabilities and Security Requirement Analysis","year":"0","author":"hong","key":"ref5"},{"year":"0","key":"ref8"},{"year":"0","key":"ref7"},{"year":"0","key":"ref2"},{"year":"0","key":"ref9"},{"year":"0","key":"ref1"}],"event":{"name":"2011 IEEE Global Communications Conference (GLOBECOM 2011)","start":{"date-parts":[[2011,12,5]]},"location":"Houston, TX, USA","end":{"date-parts":[[2011,12,9]]}},"container-title":["2011 IEEE Global Telecommunications Conference - GLOBECOM 2011"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6132211\/6133457\/06134465.pdf?arnumber=6134465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T13:48:52Z","timestamp":1490104132000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6134465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/glocom.2011.6134465","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}