{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T14:37:59Z","timestamp":1762094279225,"version":"build-2065373602"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:00:00Z","timestamp":1700179200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:00:00Z","timestamp":1700179200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,17]]},"DOI":"10.1109\/ipccc59175.2023.10253840","type":"proceedings-article","created":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T17:44:32Z","timestamp":1697651072000},"page":"470-474","source":"Crossref","is-referenced-by-count":2,"title":["Holistic Security Approach in Cybersecurity Services for Datacenters and Telecommunication Operators"],"prefix":"10.1109","author":[{"given":"Kas\u0131m","family":"\u00d6ztoprak","sequence":"first","affiliation":[{"name":"Konya Food and Agriculture University,Department of Computer Engineering,Konya,Turkey"}]},{"given":"Yusuf Kursat","family":"Tuncel","sequence":"additional","affiliation":[{"name":"Konya Food and Agriculture University,Department of Computer Engineering,Konya,Turkey"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/s23021004"},{"issue":"23","key":"ref2","doi-asserted-by":"crossref","DOI":"10.3390\/s21238010","article-title":"Application layer packet processing using pisa switches","volume":"21","author":"Butun","year":"2021","journal-title":"Sensors"},{"key":"ref3","first-page":"281","article-title":"Implications of the software defined networking revolution for technology policy","volume":"17","author":"Feamster","year":"2018","journal-title":"Colo. Tech. LJ"},{"key":"ref4","first-page":"3829","article-title":"Jaqen: A {High-Performance}{SwitchNative} approach for detecting and mitigating volumetric {DDoS}attacks with programmable switches","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Liu"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft48620.2020.9165336"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149043"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/BlackSeaCom.2017.8277681"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2016.7820616"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64653-4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64653-4_7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3318216.3363335"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3033131"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64653-4_12"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2019.2956712"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3002074"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2020.2966517"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/computers9030070"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2134"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6211908"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561458"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885926"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3538991"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IATW.2006.108"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2015.7363912"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2015EBP3467"}],"event":{"name":"2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)","start":{"date-parts":[[2023,11,17]]},"location":"Anaheim, CA, USA","end":{"date-parts":[[2023,11,19]]}},"container-title":["2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10253817\/10253818\/10253840.pdf?arnumber=10253840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T02:33:57Z","timestamp":1709346837000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10253840\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,17]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ipccc59175.2023.10253840","relation":{},"subject":[],"published":{"date-parts":[[2023,11,17]]}}}