{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T12:16:49Z","timestamp":1763727409486},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/iscc.2018.8538670","type":"proceedings-article","created":{"date-parts":[[2018,11,20]],"date-time":"2018-11-20T01:49:31Z","timestamp":1542678571000},"page":"00719-00725","source":"Crossref","is-referenced-by-count":12,"title":["Proactive Mitigation to Table-Overflow in Software-Defined Networking"],"prefix":"10.1109","author":[{"given":"Jianfeng","family":"xu","sequence":"first","affiliation":[]},{"given":"Liming","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Song","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/2018436.2018466"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/2491185.2491220"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/1879141.1879175"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TNSM.2017.2758796"},{"year":"2014","author":"nguyen","journal-title":"Optimizing rules placement in OpenFlow networks trading routing for better efficiency[M]","key":"ref14"},{"key":"ref15","first-page":"444","article-title":"On the characteristics and reasons of long-lived internet flows[C]","author":"houghton","year":"2010","journal-title":"ACM SIGCOMM Conference on Internet Measurement 2010 Melbourne Australia - November DBLP"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1007\/978-3-642-45249-9_32","article-title":"Flowmaster: Early eviction of dead flow on sdn switches[C]","author":"kannan","year":"2014","journal-title":"International Conference on Distributed Computing and Networking"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/GLOCOM.2014.7037085"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.7763\/IJFCC.2014.V3.321"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/COMST.2015.2506984"},{"year":"2016","author":"hong","journal-title":"Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security[C]\/\/ NDSS","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/HOTI.2014.23"},{"key":"ref6","first-page":"817","article-title":"Bohatei: flexible and elastic DDoS defense[C]","author":"fayaz","year":"2015","journal-title":"USENIX conference on Security symposium"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/2534169.2486019"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/INFOCOM.2017.8057001"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/COMST.2015.2453114"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/1355734.1355746"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ICC.2017.7997187"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/JPROC.2014.2371999"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ACCESS.2017.2771807"},{"key":"ref22","article-title":"Defending against flow table overloading attack in software-defined networks","author":"yuan","year":"0","journal-title":"IEEE Trans Services Comput"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1145\/2934872.2959063","article-title":"Taming the Flow Table Overflow in Open- Flow Switch[C]","author":"qiao","year":"2016","journal-title":"Conference on ACM SIGCOMM 2016 Conference"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/INFOCOM.2017.8056992"},{"year":"2015","author":"mckeown","journal-title":"OpenFlow Switch Specification Version 1 5 1 Open Networking Foundation","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/INM.2015.7140363"}],"event":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2018,6,25]]},"location":"Natal","end":{"date-parts":[[2018,6,28]]}},"container-title":["2018 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8510755\/8538441\/08538670.pdf?arnumber=8538670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T14:03:47Z","timestamp":1643292227000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8538670\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iscc.2018.8538670","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}