{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T02:46:35Z","timestamp":1770345995842,"version":"3.49.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/nfv-sdn.2016.7919474","type":"proceedings-article","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T17:04:03Z","timestamp":1494608643000},"page":"44-49","source":"Crossref","is-referenced-by-count":17,"title":["Policy based virtualised security architecture for SDN\/NFV enabled 5G access networks"],"prefix":"10.1109","author":[{"given":"M.S.","family":"Siddiqui","sequence":"first","affiliation":[]},{"given":"E.","family":"Escalona","sequence":"additional","affiliation":[]},{"given":"E.","family":"Trouva","sequence":"additional","affiliation":[]},{"given":"M.A.","family":"Kourtis","sequence":"additional","affiliation":[]},{"given":"D.","family":"Kritharidis","sequence":"additional","affiliation":[]},{"given":"K.","family":"Katsaros","sequence":"additional","affiliation":[]},{"given":"S.","family":"Spirou","sequence":"additional","affiliation":[]},{"given":"C.","family":"Canales","sequence":"additional","affiliation":[]},{"given":"M.","family":"Lorenzo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","year":"0","journal-title":"ETSI NFV Security Working Group"},{"key":"ref3","year":"2015","journal-title":"5G Security Forward Thinking Huawei Whitepaper"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3072"},{"key":"ref6","year":"0","journal-title":"Foundations of Modern Networking SDN NFV QoE IoT and Cloud"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"key":"ref8","year":"2014","journal-title":"Network Functions Virtualisation (NFV) NFV Security Problem Statement"},{"key":"ref7","year":"2014","journal-title":"Network Functions Virtualisation (NFV) Architectural Framework"},{"key":"ref2","year":"2015","journal-title":"5G Security - Scenarios and Solutions Ericsson White Paper"},{"key":"ref9","year":"2016","journal-title":"Network Functions Virtualisation (NFV) NFV Security Security Monitoring and Management"},{"key":"ref1","year":"2016","journal-title":"5G Security Recommendations (Package # 1) NGMN Alliance"}],"event":{"name":"2016 IEEE Conference on Network Function Virtualization and Software-Defined Networks (NFV-SDN)","location":"Palo Alto, CA","start":{"date-parts":[[2016,11,7]]},"end":{"date-parts":[[2016,11,10]]}},"container-title":["2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7893447\/7919460\/07919474.pdf?arnumber=7919474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T23:29:05Z","timestamp":1506986945000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7919474\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/nfv-sdn.2016.7919474","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}