{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:30:57Z","timestamp":1759332657577,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/sds.2017.7939146","type":"proceedings-article","created":{"date-parts":[[2017,6,8]],"date-time":"2017-06-08T20:41:26Z","timestamp":1496954486000},"page":"87-92","source":"Crossref","is-referenced-by-count":15,"title":["Security analysis as software-defined security for SDN environment"],"prefix":"10.1109","author":[{"given":"Nadya","family":"El Moussaid","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Toumanari","sequence":"additional","affiliation":[]},{"given":"Maryam","family":"El Azhari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","first-page":"58","article-title":"A New Alert Correlation Algorithm Based on Attack","author":"roschke","year":"2011","journal-title":"4th International Conference on Computational Intelligence in Security for Information Systems"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2016.7792462"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref11","article-title":"Software-Defined Networks and OpenFlow","volume":"16","author":"stallings","year":"2015","journal-title":"The Internet Protocol Journal"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-016-0676-x"},{"journal-title":"Software-Defined Networking and Network Function Virtualization Security Architecture","year":"2017","author":"bernardo","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702551"},{"journal-title":"Top Ten of the Web application vulnerabilities","year":"2017","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.111"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.1600109NM"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.27"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2015.7258233"},{"journal-title":"Common Vulnerability Scoring System (CVSS)","year":"2017","key":"ref28"},{"key":"ref4","first-page":"1","article-title":"Software Defined Networking Architecture, Security and Energy Efficiency: A Survey","author":"rawat","year":"2016","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.39"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2474118"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-015-3448-z"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1456362.1456368"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IC2EW.2016.34"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2016.7502434"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2326417"},{"journal-title":"White Paper","article-title":"Software-defined networking: why we like it and how we are building on it","year":"2013","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491222"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2423682"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IC2EW.2016.26"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366187"},{"key":"ref23","article-title":"MulVAL: a logic-based network security analyzer","author":"ou","year":"2005","journal-title":"14th Conference on USENIX Security Symposium"},{"key":"ref26","article-title":"Topological analysis of network attack vulnerability","author":"jajodia","year":"2007","journal-title":"the 2nd ACM symposium on Information computer and communications security"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICASID.2013.6825274"}],"event":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","start":{"date-parts":[[2017,5,8]]},"location":"Valencia, Spain","end":{"date-parts":[[2017,5,11]]}},"container-title":["2017 Fourth International Conference on Software Defined Systems (SDS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7936434\/7939121\/07939146.pdf?arnumber=7939146","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T03:23:12Z","timestamp":1507000992000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7939146\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/sds.2017.7939146","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}