{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T05:59:30Z","timestamp":1725429570850},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/percomw.2016.7457060","type":"proceedings-article","created":{"date-parts":[[2016,4,21]],"date-time":"2016-04-21T20:24:49Z","timestamp":1461270289000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Offloading smartphone firewalling using OpenFlow-capable wireless access points"],"prefix":"10.1109","author":[{"given":"Daisuke","family":"Miyamoto","sequence":"first","affiliation":[]},{"given":"Ryo","family":"Nakamura","sequence":"additional","affiliation":[]},{"given":"Takeshi","family":"Takahashi","sequence":"additional","affiliation":[]},{"given":"Yuji","family":"Sekiya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10","article-title":"Ryu Network Operating System"},{"year":"0","key":"ref11","article-title":"OpenWrt"},{"year":"0","key":"ref12","article-title":"Production Quality, Multilayer Open Virtual Switch"},{"year":"0","key":"ref13","article-title":"Linux Wiless"},{"article-title":"Siege","year":"0","author":"fulmer","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.17487\/rfc5070","article-title":"The Incident Object Description Exchange Format","author":"danyliw","year":"2007"},{"year":"0","key":"ref16","article-title":"iodeflib - a python library to create, parse and edit IODEF incident reports"},{"year":"0","key":"ref17","article-title":"n6sdk"},{"year":"2014","key":"ref4","article-title":"The Current State of Cyber-crime 2014"},{"article-title":"One In Every 5 People In The World Own A Smart-phone, One In Every 17 Own A Tablet","year":"2013","author":"heggestuen","key":"ref3"},{"year":"2015","key":"ref6","article-title":"iOS Developer Library"},{"year":"2012","key":"ref5","article-title":"New Trojan for Android can mount DDoS attacks"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557400"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"article-title":"Sophos Mobile Security Threat Report","year":"2014","author":"svajcer","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403026"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21040-2_27"}],"event":{"name":"2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","start":{"date-parts":[[2016,3,14]]},"location":"Sydney, Australia","end":{"date-parts":[[2016,3,18]]}},"container-title":["2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7452853\/7457013\/7457060.pdf?arnumber=7457060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T23:00:29Z","timestamp":1567810829000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7457060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/percomw.2016.7457060","relation":{},"subject":[],"published":{"date-parts":[[2016,3]]}}}