{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:50:56Z","timestamp":1730285456310,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/nfv-sdn.2015.7387423","type":"proceedings-article","created":{"date-parts":[[2016,1,21]],"date-time":"2016-01-21T23:15:01Z","timestamp":1453418101000},"page":"170-176","source":"Crossref","is-referenced-by-count":4,"title":["vDNS closed-loop control: A framework for an elastic control plane service"],"prefix":"10.1109","author":[{"given":"Kenichi","family":"Futamura","sequence":"first","affiliation":[]},{"given":"Anestis","family":"Karasaridis","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Noel","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Reeser","sequence":"additional","affiliation":[]},{"given":"Ashwin","family":"Sridharan","sequence":"additional","affiliation":[]},{"given":"Carolyn","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Pat","family":"Velardo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Arbor Networks","article-title":"10th Annual Worldwide Infrastructure Security Report","year":"2015","key":"ref4"},{"article-title":"DNS Security: In-depth vulnerability analysis and mitigation solutions","year":"2012","author":"karasaridis","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2012.6267002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.2307\/2683591"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2014.7014206"},{"year":"0","key":"ref5"},{"key":"ref12","article-title":"Requirements and Design of Flexible NFV Network Infrastructure Node Leveraging SDN\/OpenFlow","author":"masutani","year":"2014","journal-title":"ONDM"},{"key":"ref8","article-title":"Anomaly detection systems for a computer network","volume":"808","author":"futamura","year":"2010","journal-title":"USPTO #7"},{"key":"ref7","article-title":"Implementation and Specification","volume":"1035","year":"0","journal-title":"IETF RFC"},{"journal-title":"ISC Knowledge Base isc org","article-title":"Best Practices for those running DNS resolvers","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925869"},{"journal-title":"European Telecommunications Standards Institute (ETSI)","article-title":"Network Functions Virtualisation (NFV); Use Cases (00l) and Architectural Framework (002)","year":"2013","key":"ref1"}],"event":{"name":"2015 IEEE Conference on Network Function Virtualization and Software-Defined Networks (NFV-SDN)","start":{"date-parts":[[2015,11,18]]},"location":"San Francisco, CA","end":{"date-parts":[[2015,11,21]]}},"container-title":["2015 IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7377719\/7387384\/07387423.pdf?arnumber=7387423","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T03:03:37Z","timestamp":1490411017000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7387423\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/nfv-sdn.2015.7387423","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}