{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:00:44Z","timestamp":1725505244650},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856686","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:16:34Z","timestamp":1487283394000},"page":"148-153","source":"Crossref","is-referenced-by-count":1,"title":["Security analysis of forwarding strategies in network time measurements using Openflow"],"prefix":"10.1109","author":[{"given":"Alex M. S.","family":"Orozco","sequence":"first","affiliation":[]},{"given":"Charles V.","family":"Neu","sequence":"additional","affiliation":[]},{"given":"Regio A.","family":"Michelin","sequence":"additional","affiliation":[]},{"given":"Avelino F.","family":"Zorzo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2876019.2876030"},{"key":"ref11","first-page":"121","author":"karame","year":"2009","journal-title":"On the Security of Bottleneck Bandwidth Estimation Techniques"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.07.097"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICoAC.2014.7229711"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/5254.708428"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ColComCon.2014.6860404"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1404606"},{"article-title":"Openfiow switch specification, version 1.0.0","year":"2009","author":"foundation","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.10.5.322-327"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2609876.2609880"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2326417"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38908-5_6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.081313.00105"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.145"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2226579"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1109\/BROADCOM.2008.76","article-title":"Active throughput estimation using rtt of differing icmp packet sizes","author":"mnisi","year":"2008","journal-title":"Broadband Communications Information Technology Biomedical Applications 2008 Third InternationalConference on"},{"journal-title":"NOXRepo org POX documentation","year":"2015","key":"ref9"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856686.pdf?arnumber=7856686","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T19:53:07Z","timestamp":1568836387000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856686\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856686","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}