{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:21Z","timestamp":1763468181336},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/icnp.2013.6733671","type":"proceedings-article","created":{"date-parts":[[2014,2,13]],"date-time":"2014-02-13T21:06:15Z","timestamp":1392325575000},"source":"Crossref","is-referenced-by-count":157,"title":["OpenFlow: A security analysis"],"prefix":"10.1109","author":[{"given":"Rowan","family":"Kloti","sequence":"first","affiliation":[]},{"given":"Vasileios","family":"Kotronis","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Smith","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1672308.1672333"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342467"},{"key":"17","article-title":"System level security modeling using attack trees","author":"khand","year":"2009","journal-title":"Proc of the 2nd Intl Conf on Computer Control and Communication"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413206"},{"key":"15","year":"0","journal-title":"Mininet"},{"key":"24","year":"0","journal-title":"OpenFlowSec org"},{"key":"16","author":"klo?ti","year":"2013","journal-title":"OpenFlow A Security Analysis MSc Thesis D-ITET ETH Zurich"},{"key":"13","year":"0","journal-title":"Open Vswitch"},{"key":"14","year":"0","journal-title":"About POX"},{"key":"11","author":"hernan","year":"2006","journal-title":"Uncover Security Design Flaws Using the Stride Approach"},{"key":"12","article-title":"Threat modeling using attack trees","author":"saini","year":"2008","journal-title":"J Comput Sci Coll"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04070-2_106"},{"key":"3","year":"0","journal-title":"Open Networking Foundation"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2070845"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"10","year":"0","journal-title":"Security Analysis of the ONF OpenFlow Switch Specification"},{"key":"1","year":"0","journal-title":"Nox"},{"key":"7","year":"0","journal-title":"SDN Applications"},{"key":"6","year":"0","journal-title":"SDNCentral Exclusive SDN Market Expected to Reach $35B by 2018"},{"key":"5","year":"0","journal-title":"Open Networking Summit"},{"key":"4","author":"hoelzle","year":"0","journal-title":"OpenFlow Google"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342452"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342466"}],"event":{"name":"2013 21st IEEE International Conference on Network Protocols (ICNP)","location":"Goettingen, Germany","start":{"date-parts":[[2013,10,7]]},"end":{"date-parts":[[2013,10,10]]}},"container-title":["2013 21st IEEE International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6718434\/6733561\/06733671.pdf?arnumber=6733671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:55:22Z","timestamp":1602687322000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6733671"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icnp.2013.6733671","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}