{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:30:36Z","timestamp":1725481836820},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/ictc.2017.8191063","type":"proceedings-article","created":{"date-parts":[[2017,12,14]],"date-time":"2017-12-14T17:02:05Z","timestamp":1513270925000},"page":"668-672","source":"Crossref","is-referenced-by-count":1,"title":["A monitoring-based load balancing scheme for network security functions"],"prefix":"10.1109","author":[{"given":"Dongjin","family":"Hong","sequence":"first","affiliation":[]},{"given":"Jinyong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Daeyoung","family":"Hyun","sequence":"additional","affiliation":[]},{"given":"Jaehoon Paul","family":"Jeong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"I2NSF Network Security Function Monitoring YANG Data Model","author":"hong","year":"2017","journal-title":"draft-hong-i2nsf-nsf-monitoring-data-model-00 pdf IETF I2NSF WG"},{"key":"ref11","article-title":"I2NSF Capability YANG Data Model","author":"hares","year":"2017","journal-title":"draft-hares-i2nsf-capability-data-model-01 pdf IETF I2NSF WG"},{"key":"ref12","article-title":"Frame-work for Interface to Network Security Functions","author":"lopez","year":"2016","journal-title":"draft-ietf-i2nsf-framework-04 pdf IETF I2NSF WG"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8040"},{"journal-title":"Mininet","article-title":"An instant virtual network on your laptop","year":"2017","key":"ref14"},{"journal-title":"OpenDaylight","article-title":"Open Source SDN Platform","year":"2017","key":"ref15"},{"journal-title":"The Internet Engineering Task Force","year":"2017","key":"ref4"},{"journal-title":"ETSI GS NFV 002 v 1 1 1","article-title":"Network Functions Virtualization (NFV); Architectural Framework","year":"2013","key":"ref3"},{"key":"ref6","first-page":"526529","article-title":"SDN-based Security Services using Interface to Network Security Functions","author":"jinyoung","year":"2015","journal-title":"Proc of International Conference on ICT Convergence (ICTC)"},{"journal-title":"IETF working group","article-title":"Interface to Network Security Functions(I2NSF)","year":"2017","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6020"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6241"},{"journal-title":"ONF White Paper","article-title":"Software-Defined Networking: The New Norm for Networks","year":"2012","key":"ref2"},{"journal-title":"Gartner","article-title":"Gartner's 2014 Hype Cycle","year":"2017","key":"ref1"},{"key":"ref9","article-title":"An Information Model for the Monitoring of Network Security Functions(NSF)","author":"xia","year":"2017","journal-title":"draft-zhang-i2nsf-info-model-monitoring-03 pdf IETF I2NSF WG"}],"event":{"name":"2017 International Conference on Information and Communication Technology Convergence (ICTC)","start":{"date-parts":[[2017,10,18]]},"location":"Jeju","end":{"date-parts":[[2017,10,20]]}},"container-title":["2017 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8125636\/8190740\/08191063.pdf?arnumber=8191063","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,22]],"date-time":"2018-01-22T17:33:51Z","timestamp":1516642431000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8191063\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ictc.2017.8191063","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}