{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T02:32:03Z","timestamp":1772159523505,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/icton.2014.6876451","type":"proceedings-article","created":{"date-parts":[[2014,8,20]],"date-time":"2014-08-20T15:19:58Z","timestamp":1408547998000},"page":"1-4","source":"Crossref","is-referenced-by-count":45,"title":["Vulnerabilities and security issues in optical networks"],"prefix":"10.1109","author":[{"given":"Marija","family":"Furdek","sequence":"first","affiliation":[]},{"given":"Nina","family":"Skorin-Kapov","sequence":"additional","affiliation":[]},{"given":"Szilard","family":"Zsigmond","sequence":"additional","affiliation":[]},{"given":"Lena","family":"Wosinska","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","year":"2009","journal-title":"Cisco MDS 9000 Family Acceleration Services Enhance Synchronous Replication Performance"},{"key":"13","year":"0","journal-title":"Ten Things to Look for in An SDN Controller"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON.2011.5970836"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s11107-011-0322-2"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.5.00A274"},{"key":"3","author":"allen","year":"2013","journal-title":"Western Spy Agencies Tapped Major Undersea Fiber Optic Cable"},{"key":"2","article-title":"London at the centre of eavesdropping scandal","author":"campbell","year":"2013","journal-title":"Le Monde"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.248169"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ECOC.2010.5621217"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.852182"},{"key":"6","author":"lucent","year":"0","journal-title":"1830 Photonic Service Switch"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(07)70036-3"},{"key":"4","article-title":"Fiber optic networks vulnerable to attack","author":"miller","year":"2006","journal-title":"Information Security Magazine"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.4302\/plp.2012.3.12"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1117\/1.3607412"}],"event":{"name":"2014 16th International Conference on Transparent Optical Networks (ICTON)","location":"Graz, Austria","start":{"date-parts":[[2014,7,6]]},"end":{"date-parts":[[2014,7,10]]}},"container-title":["2014 16th International Conference on Transparent Optical Networks (ICTON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6867035\/6876260\/06876451.pdf?arnumber=6876451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T11:24:03Z","timestamp":1602674643000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6876451"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icton.2014.6876451","relation":{"is-referenced-by":[{"id-type":"doi","id":"10.36227\/techrxiv.23544807","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.23544807.v1","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2014,7]]}}}