{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T23:14:09Z","timestamp":1756682049122,"version":"3.37.3"},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1700544,1816497,2148374"],"award-info":[{"award-number":["1700544,1816497,2148374"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"ONR","doi-asserted-by":"publisher","award":["N00014-20-1-2734"],"award-info":[{"award-number":["N00014-20-1-2734"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1109\/icccn58024.2023.10230115","type":"proceedings-article","created":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T17:22:54Z","timestamp":1693588974000},"page":"1-10","source":"Crossref","is-referenced-by-count":1,"title":["Automatic Synthesis of Network Security Services: A First Step"],"prefix":"10.1109","author":[{"given":"Lei","family":"Xu","sequence":"first","affiliation":[{"name":"Texas A&#x0026;M University,SUCCESS Lab"}]},{"given":"Yangyong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Texas A&#x0026;M University,SUCCESS Lab"}]},{"given":"Phakpoom","family":"Chinprutthiwong","sequence":"additional","affiliation":[{"name":"Texas A&#x0026;M University,SUCCESS Lab"}]},{"given":"Guofei","family":"Gu","sequence":"additional","affiliation":[{"name":"Texas A&#x0026;M University,SUCCESS Lab"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Enhanced English Universal Dependen-cies: An Improved Representation for Natural Language Understanding Tasks","author":"schuster","year":"2016","journal-title":"LREC'16"},{"journal-title":"Stanford NLP Toolkits","year":"0","key":"ref12"},{"journal-title":"Language models are few-shot learners","year":"2020","author":"brown","key":"ref56"},{"journal-title":"Glossary of Network Security Terms","year":"0","key":"ref15"},{"journal-title":"Glossary of Network Security Terms","year":"0","key":"ref14"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/325737.325845"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066281"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978315"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1041"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243862"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1057"},{"key":"ref17","article-title":"A Rule based Approach to Word Lemmatization","author":"plisson","year":"2004","journal-title":"SiKDD'04"},{"journal-title":"Stop word list","year":"0","key":"ref16"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1185844"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7287.001.0001"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3133887"},{"key":"ref50","article-title":"NL2Bash: A corpus and semantic parser for natural language interface to the linux operating system","author":"lin","year":"2018","journal-title":"LREC'18)"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.48"},{"key":"ref45","article-title":"SUPOR: Precise and scalable sensitive user input detection for android apps","author":"huang","year":"2015","journal-title":"USENIX Security&#x2019; 15"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664280"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978304"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"ref41","article-title":"Whyper: Towards automating risk assessment of mobile applications","author":"pandita","year":"2013","journal-title":"USENIX Security'13"},{"key":"ref44","article-title":"UIPicker: User-Input Privacy Identification in Mobile Applications","author":"nan","year":"2015","journal-title":"Usenix Sec '15"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808125"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393608"},{"journal-title":"The Bro Network Security Monitor","year":"0","key":"ref8"},{"journal-title":"Modular sdn programming with pyretic","year":"2013","author":"reich","key":"ref7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67425-4_12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934875"},{"key":"ref3","article-title":"FRESCO: Modular Composable Security Services for Software-Defined Networks","author":"shin","year":"2013","journal-title":"NDSS' 13"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2034773.2034812"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_16"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23200"},{"journal-title":"Opendaylight Sdn Controller","year":"0","key":"ref35"},{"journal-title":"ONOS SDN controller","year":"0","key":"ref34"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602211"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2774998"},{"journal-title":"CCNA blog","year":"0","key":"ref31"},{"journal-title":"Payment Card Industry (PCI) Data Security Standard","year":"0","key":"ref30"},{"journal-title":"nmap Security Scanner","year":"0","key":"ref33"},{"key":"ref32","article-title":"Bohatei: Flexible and Elastic DDoS Defense","author":"fayaz","year":"2015","journal-title":"Usenix Sec '15"},{"journal-title":"Dangers of Complexity in Network Security Environments","year":"0","key":"ref2"},{"journal-title":"Secure network life-cycle management","year":"0","key":"ref1"},{"key":"ref39","first-page":"59","article-title":"Kinetic: Verifiable dynamic network control","author":"kim","year":"2015","journal-title":"NSDI'I5"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934892"},{"journal-title":"The Floodlight SDN Controller","year":"0","key":"ref24"},{"key":"ref23","article-title":"Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags","author":"fayaz","year":"2014","journal-title":"NSDI'I4"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23222"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342466"},{"key":"ref20","article-title":"An Information-Theoretic Definition of Similarity","author":"lin","year":"1998","journal-title":"ICML'98"},{"journal-title":"Wikipedia Power Set","year":"0","key":"ref22"},{"key":"ref21","article-title":"Align, Disambiguate and Walk: A Unified Approach for Measuring Semantic Similarity","author":"pilehvar","year":"2013","journal-title":"ACL'13"},{"journal-title":"Rapid Prototyping for Software Defined Networks","year":"0","key":"ref28"},{"journal-title":"The Click router","year":"0","key":"ref27"},{"journal-title":"Colorado department of education-network firewall implementation policy","year":"0","key":"ref29"}],"event":{"name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","start":{"date-parts":[[2023,7,24]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2023,7,27]]}},"container-title":["2023 32nd International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10230087\/10230088\/10230115.pdf?arnumber=10230115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T17:54:21Z","timestamp":1695664461000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10230115\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/icccn58024.2023.10230115","relation":{},"subject":[],"published":{"date-parts":[[2023,7]]}}}