{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:49:44Z","timestamp":1759942184478,"version":"3.37.3"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"14","license":[{"start":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T00:00:00Z","timestamp":1657843200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T00:00:00Z","timestamp":1657843200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T00:00:00Z","timestamp":1657843200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,7,15]]},"DOI":"10.1109\/jiot.2021.3132030","type":"journal-article","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T20:27:44Z","timestamp":1638476864000},"page":"11725-11736","source":"Crossref","is-referenced-by-count":4,"title":["CACS: A Context-Aware and Anonymous Communication Framework for an Enterprise Network Using SDN"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3203-7807","authenticated-orcid":false,"given":"Bilal","family":"Rauf","sequence":"first","affiliation":[{"name":"Department of Information Security, National University of Sciences and Technology, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2437-4870","authenticated-orcid":false,"given":"Haider","family":"Abbas","sequence":"additional","affiliation":[{"name":"Department of Information Security, National University of Sciences and Technology, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9969-6850","authenticated-orcid":false,"given":"Ahmad Muqeem","family":"Sheri","sequence":"additional","affiliation":[{"name":"Department of Information Security, National University of Sciences and Technology, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3616-2621","authenticated-orcid":false,"given":"Waseem","family":"Iqbal","sequence":"additional","affiliation":[{"name":"Department of Information Security, National University of Sciences and Technology, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6013-062X","authenticated-orcid":false,"given":"Yawar Abbas","family":"Bangash","sequence":"additional","affiliation":[{"name":"Department of Information Security, National University of Sciences and Technology, Islamabad, Pakistan"}]},{"given":"Mahmoud","family":"Daneshmand","sequence":"additional","affiliation":[{"name":"School of Engineering and Science, Stevens Institute of Technology, Hoboken, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4912-6168","authenticated-orcid":false,"given":"Muhammad Faisal","family":"Amjad","sequence":"additional","affiliation":[{"name":"Department of Information Security, National University of Sciences and Technology, Islamabad, Pakistan"}]}],"member":"263","reference":[{"journal-title":"Nmap Network Scanning The Official Nmap Project Guide to Network Discovery and Security Scanning","year":"2008","author":"lyon","key":"ref31"},{"journal-title":"Metasploit the Penetration Tester's Guide","year":"2011","author":"kennedy","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref11","first-page":"401","article-title":"I2P data communication system","author":"zantout","year":"2011","journal-title":"Proc ICN"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2016.9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2751616"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/UV.2018.8642139"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820081"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2916356"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6871676"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2015.7116146"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/230514.571645"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/683425"},{"key":"ref27","volume":"47","author":"snyder","year":"2011","journal-title":"ActiveMQ In Action"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3034350"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/3159805"},{"journal-title":"Wireshark & Ethereal Network Protocol Analyzer Toolkit","year":"2007","author":"orebaugh","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845467"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2417684"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"journal-title":"Enterprise Integration Patterns Designing Building and Deploying Messaging Solutions","year":"2004","author":"hohpe","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2015.110"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCity.2015.128"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0826"},{"journal-title":"Ryu Sdn Framework","year":"2021","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2016.7919490"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"journal-title":"RabbitMQ","year":"2020","key":"ref26"},{"journal-title":"PyService-Registry","year":"2020","key":"ref25"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9816842\/09632822.pdf?arnumber=9632822","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T19:57:41Z","timestamp":1661198261000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9632822\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,15]]},"references-count":31,"journal-issue":{"issue":"14"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3132030","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2022,7,15]]}}}