{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:21:06Z","timestamp":1761402066217},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1109\/icoin48656.2020.9016544","type":"proceedings-article","created":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T05:22:02Z","timestamp":1583212922000},"page":"136-141","source":"Crossref","is-referenced-by-count":5,"title":["Proactive Controller Assignment Schemes in SDN For Fast Recovery"],"prefix":"10.1109","author":[{"given":"Selcan","family":"Guner","sequence":"first","affiliation":[]},{"given":"Gurkan","family":"Gur","sequence":"additional","affiliation":[]},{"given":"Fatih","family":"Alagoz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614094"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503519"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/RNDM.2016.7608295"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(11)60438-X"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2017.8094139"},{"journal-title":"Genetic Algorithms","year":"1999","author":"gen","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2015.7130425"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.02.019"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/505733.505735"},{"key":"ref3","first-page":"308","article-title":"Software-defined edge defense against IoT-based DDoS","author":"\u00f6z\u00e7elik","year":"2017","journal-title":"2017 IEEE International Conference on Computer and Information Technology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2014.7119795"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2013.6727805"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7037087"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342444"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6553676"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP.2016.7573944"}],"event":{"name":"2020 International Conference on Information Networking (ICOIN)","start":{"date-parts":[[2020,1,7]]},"location":"Barcelona, Spain","end":{"date-parts":[[2020,1,10]]}},"container-title":["2020 International Conference on Information Networking (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8999388\/9016415\/09016544.pdf?arnumber=9016544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:21:35Z","timestamp":1656375695000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9016544\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icoin48656.2020.9016544","relation":{},"subject":[],"published":{"date-parts":[[2020,1]]}}}