{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T18:10:15Z","timestamp":1742235015051,"version":"3.40.1"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T00:00:00Z","timestamp":1715817600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T00:00:00Z","timestamp":1715817600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,16]]},"DOI":"10.1109\/icaci60820.2024.10537018","type":"proceedings-article","created":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T17:19:12Z","timestamp":1716571152000},"page":"18-22","source":"Crossref","is-referenced-by-count":0,"title":["Research on Policy Conflict Detection Technology Based on Interdomain Interconnection"],"prefix":"10.1109","author":[{"given":"Daqiu","family":"Wang","sequence":"first","affiliation":[{"name":"Nuclear Power Institute of China,Chengdu,China"}]},{"given":"Liangyu","family":"Dong","sequence":"additional","affiliation":[{"name":"China Industrial Control Systems Cyber Emergency Response Team,Beijing,China"}]},{"given":"Ziyi","family":"Wang","sequence":"additional","affiliation":[{"name":"Nuclear Power Institute of China,Chengdu,China"}]},{"given":"Peijun","family":"Chen","sequence":"additional","affiliation":[{"name":"Nuclear Power Institute of China,Chengdu,China"}]},{"given":"Weiruo","family":"Pu","sequence":"additional","affiliation":[{"name":"Nuclear Power Institute of China,Chengdu,China"}]},{"given":"Yixiang","family":"Li","sequence":"additional","affiliation":[{"name":"Nuclear Power Institute of China,Chengdu,China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"99","article-title":"Real time network policy checking using header space analysis","volume-title":"Usenix Conference on Networked Systems Design and Implementation","author":"Kazemian"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.1999.820481"},{"key":"ref3","first-page":"213","article-title":"An approach for the distribution of network management policies with the focus on quality of service","author":"Tadeu","year":"2014","journal-title":"China Communications"},{"issue":"04","key":"ref4","first-page":"36","article-title":"Research on enterprise network security protection system based on security domain","author":"Zhang","year":"2010","journal-title":"Computer Security"},{"issue":"01","key":"ref5","first-page":"72","article-title":"Chinese Journal of Computers","volume":"40","author":"Li","year":"2017"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/BIBM.2011.79"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ESTEL.2012.6400092"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DAT.2017.7889181"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIEC.2017.8076625"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485947"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2019.00077"}],"event":{"name":"2024 16th International Conference on Advanced Computational Intelligence (ICACI)","start":{"date-parts":[[2024,5,16]]},"location":"Zhangjiajie, China","end":{"date-parts":[[2024,5,19]]}},"container-title":["2024 16th International Conference on Advanced Computational Intelligence (ICACI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10536986\/10536996\/10537018.pdf?arnumber=10537018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T17:30:46Z","timestamp":1742232646000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10537018\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,16]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icaci60820.2024.10537018","relation":{},"subject":[],"published":{"date-parts":[[2024,5,16]]}}}