{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T04:09:59Z","timestamp":1730261399107,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/idaacs.2013.6662634","type":"proceedings-article","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T21:53:59Z","timestamp":1385589239000},"page":"30-35","source":"Crossref","is-referenced-by-count":1,"title":["Design and implementation of virtual security appliances (VSA) for SME"],"prefix":"10.1109","author":[{"given":"Kai-Oliver","family":"Detken","sequence":"first","affiliation":[{"name":"DECOIT GmbH, Fahrenheitstra\u00dfe 9, D-28359 Bremen, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcel","family":"Jahnke","sequence":"additional","affiliation":[{"name":"DECOIT GmbH, Fahrenheitstra\u00dfe 9, D-28359 Bremen, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Henk","family":"Birkholz","sequence":"additional","affiliation":[{"name":"Fraunhofer SIT, Rheinstra\u00dfe 75, D-64295 Darmstadt, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christoph","family":"Dwertmann","sequence":"additional","affiliation":[{"name":"National ICT Australia, Locked Bag 9013, Alexandria NSW 1435, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.73"},{"key":"2","article-title":"Simulation environment (SE) for mobile virtualized security appliances (VSA)","author":"oberle","year":"2012","journal-title":"1st IEEE International Symposium on Wireless Systems Within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems"},{"key":"10","article-title":"Measurement architectures for network experiments with disconnected mobile nodes","author":"white","year":"2010","journal-title":"TRIDENTCOM"},{"year":"0","key":"1"},{"journal-title":"TNC IF-MAP Meta-data for Network Security","year":"2010","key":"7"},{"journal-title":"Specification V 2 1 Rev 15","year":"2012","key":"6"},{"key":"5","volume":"10","author":"beckett","year":"2004","journal-title":"RDF\/XML Syntax Specification (Revised) W3C Recommendation"},{"journal-title":"OWL 2 Web Ontology Language Document Overview","year":"2009","key":"4"},{"key":"9","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1145\/1713254.1713267","article-title":"OMF: A control and management framework for networking testbeds","volume":"43","author":"rakotoarivelo","year":"2010","journal-title":"ACM SIGOPS Operating Systems Review"},{"journal-title":"Konfigurationsunterstu?tzung Bei der Virtualisierung","year":"0","author":"detken","key":"8"},{"journal-title":"TCG Specification Architecture Overview","year":"2007","key":"11"}],"event":{"name":"2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","start":{"date-parts":[[2013,9,12]]},"location":"Berlin, Germany","end":{"date-parts":[[2013,9,14]]}},"container-title":["2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6653329\/6662618\/06662634.pdf?arnumber=6662634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T18:14:03Z","timestamp":1623089643000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6662634\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/idaacs.2013.6662634","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}