{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:06:00Z","timestamp":1730275560402,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/isncc.2019.8909166","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T19:01:09Z","timestamp":1574708469000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Research on Executive Control Strategy of Mimic Web Defense Gateway"],"prefix":"10.1109","author":[{"given":"Shuang-Xi","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xin-Yue","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Gao-Ning","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Chun-Ming","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"193","article-title":"National Digital Switching System Engineering and Technological Research Center[J\/OL]","volume":"44","author":"lin","year":"2018","journal-title":"Computer Engineering"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.15302\/J-SSCAE-2016.06.014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/047166880X"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461933"},{"journal-title":"The Definitive Guide to the Xen Hypervisor","year":"2013","author":"chisnall","key":"ref8"},{"key":"ref7","first-page":"59","article-title":"httperf - A Tool for Measuring Web Server Performance[C]","author":"david","year":"1998","journal-title":"2 Workshop on Internet Server Performance"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3969\/j.issn.1000-3428.2018.04.031"},{"journal-title":"Understanding Nginx Modules Development and Architecture Resolving[M]","year":"2016","author":"tao","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.19363\/j.cnki.cn10-1380\/tn.2016.04.001"}],"event":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","start":{"date-parts":[[2019,6,18]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2019,6,20]]}},"container-title":["2019 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8894812\/8909084\/08909166.pdf?arnumber=8909166","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:53:50Z","timestamp":1658094830000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8909166\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/isncc.2019.8909166","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}