{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:45:18Z","timestamp":1761648318496},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/ictc.2015.7354672","type":"proceedings-article","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T21:56:00Z","timestamp":1450389360000},"page":"810-815","source":"Crossref","is-referenced-by-count":13,"title":["Verification for NFV-enabled network services"],"prefix":"10.1109","author":[{"given":"Myung-Ki","family":"Shin","sequence":"first","affiliation":[]},{"given":"Yunchul","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Hee Hwan","family":"Kwak","sequence":"additional","affiliation":[]},{"given":"Sangheon","family":"Pack","sequence":"additional","affiliation":[]},{"given":"Miyoung","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Jin-Young","family":"Choi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Formal Verification for Software-Defined Networking","author":"shin","year":"2013","journal-title":"SDN RG Meeting IETF 87"},{"key":"ref11","article-title":"A NICE way to test OpenFlow applications","author":"canini","year":"2012","journal-title":"NSDI"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2034773.2034812"},{"year":"0","key":"ref13"},{"key":"ref14","article-title":"Header space analysis: Static checking for networks","author":"kazemian","year":"2012","journal-title":"Proc USENIX Symp Networked System Design and Implementation (NSDI)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342427"},{"key":"ref4","article-title":"Stratos: Virtual Middleboxes as First-Class Entities","author":"gember","year":"0","journal-title":"ONS 2013 and TR"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486022"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/242223.242257"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1145\/2740070.2626313","article-title":"OpenNF: Enabling Innovation in Network Function Control","author":"gember","year":"2014","journal-title":"Proc of the ACM SIGCOMM 2014"},{"key":"ref8","article-title":"Symbolic weak bisimulation for value-passing calculi","author":"kwak","year":"1998","journal-title":"Technical Report MS-CIS-98-22"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.97.0197.0404"},{"journal-title":"(work in progress)","article-title":"Management and Orchestration (MANO)","year":"2014","key":"ref2"},{"year":"2013","key":"ref1","article-title":"Network Functions Virtualization (NFV): Architectural Framework"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1109\/REAL.1998.739774","article-title":"Symbolic Schedulability Analysis of Real-time Systems","author":"kwak","year":"1998","journal-title":"IEEE Real-Time Systems Symposium"}],"event":{"name":"2015 International Conference on Information and Communication Technology Convergence (ICTC)","start":{"date-parts":[[2015,10,28]]},"location":"Jeju Island, South Korea","end":{"date-parts":[[2015,10,30]]}},"container-title":["2015 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7337634\/7354472\/07354672.pdf?arnumber=7354672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T01:56:07Z","timestamp":1498269367000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7354672\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ictc.2015.7354672","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}