{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T15:29:13Z","timestamp":1768318153655,"version":"3.49.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T00:00:00Z","timestamp":1717891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T00:00:00Z","timestamp":1717891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100012365","name":"Howard University","doi-asserted-by":"publisher","award":["W911NF-20-2-0277"],"award-info":[{"award-number":["W911NF-20-2-0277"]}],"id":[{"id":"10.13039\/100012365","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006754","name":"U.S. Army Research Laboratory","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,9]]},"DOI":"10.1109\/iccworkshops59551.2024.10615557","type":"proceedings-article","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:23:42Z","timestamp":1723483422000},"page":"1816-1821","source":"Crossref","is-referenced-by-count":1,"title":["Security Enhanced Framework for Network Access Control in Distributed Software-Defined Networks"],"prefix":"10.1109","author":[{"given":"Pushpita","family":"Chatterjee","sequence":"first","affiliation":[{"name":"Howard University,Department of EE and CS,Washington,DC,USA"}]},{"given":"Danda B","family":"Rawat","sequence":"additional","affiliation":[{"name":"Howard University,Department of EE and CS,Washington,DC,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3571306.3571445"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12061265"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3362396"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109908"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12143077"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-6684-3666-0.ch046"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3109564"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12061333"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3191430"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPIS57063.2022.10002493"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC58943.2023.00040"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10101171"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3491202"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3587037"},{"issue":"7","key":"ref15","first-page":"1","article-title":"Evaluating the efficacy of biometric authentication techniques in healthcare","volume":"13","author":"Ahmed","year":"2023","journal-title":"International Journal of Responsible Artificial Intelligence"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17374-5_6"},{"key":"ref17","volume-title":"A decrease in the encryption latency utilizing transport layer protocols for software defined networks","author":"Saddheer","year":"2023"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51644.2023.10060483"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.22214\/ijraset.2023.57376"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-022-00171-8"}],"event":{"name":"2024 IEEE International Conference on Communications Workshops (ICC Workshops)","location":"Denver, CO, USA","start":{"date-parts":[[2024,6,9]]},"end":{"date-parts":[[2024,6,13]]}},"container-title":["2024 IEEE International Conference on Communications Workshops (ICC Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10615255\/10615259\/10615557.pdf?arnumber=10615557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T05:28:35Z","timestamp":1723526915000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10615557\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iccworkshops59551.2024.10615557","relation":{},"subject":[],"published":{"date-parts":[[2024,6,9]]}}}