{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:58:31Z","timestamp":1730231911540,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icc.2018.8422426","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T22:51:41Z","timestamp":1534805501000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["On the Optimality of Virtualized Security Function Placement in Multi-Tenant Data Centers"],"prefix":"10.1109","author":[{"given":"Abeer","family":"Ali","sequence":"first","affiliation":[]},{"given":"Christos","family":"Anagnostopoulos","sequence":"additional","affiliation":[]},{"given":"Dimitrios P.","family":"Pezaros","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"65","author":"basile","year":"2015","journal-title":"Towards the Dynamic Provision of Virtualized Security Services"},{"key":"ref11","first-page":"1","article-title":"Bandwidth guaranteed virtual network function placement and scaling in datacenter networks","author":"wang","year":"2015","journal-title":"2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461930"},{"journal-title":"Analysis of an Equal-Cost Multi-Path Algorithm","year":"2000","author":"hopps","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.879308"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/e17042367"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/computers6010006"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.jnca.2009.07.005","article-title":"Performance evaluation comparison of snort NIDS under linux and windows server","volume":"33","author":"salah","year":"2010","journal-title":"Journal of Network and Computer Applications"},{"journal-title":"Applied Network Security Monitoring - Collection Detection and Analysis","year":"2013","author":"sanders","key":"ref19"},{"journal-title":"The suricata open source ids ips and nsm","year":"2017","key":"ref4"},{"journal-title":"Snort Intrusion detection system","year":"2017","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402966"},{"journal-title":"Stratos A network-aware orchestration layer for virtual middleboxes in clouds","year":"2013","author":"gember","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523635"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2015.7335318"},{"journal-title":"Silver peak sd-wan optimizer","year":"2017","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.59"},{"journal-title":"Sdnfv-based ddos detection and remediation in multi-tenant virtualized infrastructures","year":"2017","author":"ali","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.04.017"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/BF02009683"},{"journal-title":"Bin Packing","year":"2016","author":"johnson","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.1999.797428"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2010.11.004"},{"journal-title":"Gurobi Optimizer","year":"2017","key":"ref25"}],"event":{"name":"2018 IEEE International Conference on Communications (ICC 2018)","start":{"date-parts":[[2018,5,20]]},"location":"Kansas City, MO","end":{"date-parts":[[2018,5,24]]}},"container-title":["2018 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8411665\/8422068\/08422426.pdf?arnumber=8422426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T03:34:21Z","timestamp":1598240061000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8422426\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icc.2018.8422426","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}