{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:24:48Z","timestamp":1772555088486,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,9]]},"DOI":"10.1109\/sds64317.2024.10883914","type":"proceedings-article","created":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T18:19:35Z","timestamp":1739902775000},"page":"130-136","source":"Crossref","is-referenced-by-count":2,"title":["Towards a Resilient Multi-Agent Controller: Securing and Mitigating Overhead in Tactical SDN"],"prefix":"10.1109","author":[{"given":"Paulo H. L.","family":"Rettore","sequence":"first","affiliation":[{"name":"Fraunhofer FKIE,Communication Systems (KOM),Bonn,Germany"}]},{"given":"Philipp","family":"Zi\u00dfner","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE,Communication Systems (KOM),Bonn,Germany"}]},{"given":"Marcio","family":"Lawisch","sequence":"additional","affiliation":[{"name":"Federal University of Rio Grande do Sul,Porto Alegre,Brazil"}]},{"given":"Sean","family":"Kloth","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE,Communication Systems (KOM),Bonn,Germany"}]},{"given":"Edison Pignaton","family":"de Freitas","sequence":"additional","affiliation":[{"name":"Federal University of Rio Grande do Sul,Porto Alegre,Brazil"}]},{"given":"Peter","family":"Sevenich","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE,Communication Systems (KOM),Bonn,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/lnet.2021.3066536"},{"key":"ref2","first-page":"28","article-title":"A bayesian inference model for dynamic neighbor discovery in tactical networks","volume-title":"Procedia Computer Science","volume":"205","author":"Loevenich","year":"2022"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN53993.2022.9758021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3208283"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS52405.2021.9486399"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9653029"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS59922.2023.10253464"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2300396"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS61231.2024.10540703"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM55135.2022.10017807"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM58377.2023.10356288"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS61231.2024.10540952"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2940039"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1447\/1\/012007"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2999668"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/PACET60398.2024.10497057"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET57748.2023.10134518"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME55909.2022.9987763"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3093002"},{"issue":"1","key":"ref20","first-page":"849","article-title":"Quality of service improvement with optimal software-defined networking controller and control plane clustering","volume-title":"Computers, Materials & Continua","volume":"67","author":"Ali","year":"2021"},{"key":"ref21","first-page":"114896","article-title":"A deep reinforcement learning-based method applied for solving multi-agent defense and attack problems","volume-title":"Expert Systems with Applications","volume":"176","author":"Huang","year":"2021"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3197309"}],"event":{"name":"2024 11th International Conference on Software Defined Systems (SDS)","location":"Gran Canaria, Spain","start":{"date-parts":[[2024,12,9]]},"end":{"date-parts":[[2024,12,11]]}},"container-title":["2024 11th International Conference on Software Defined Systems (SDS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10883772\/10883884\/10883914.pdf?arnumber=10883914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:05:14Z","timestamp":1740081914000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10883914\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,9]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/sds64317.2024.10883914","relation":{},"subject":[],"published":{"date-parts":[[2024,12,9]]}}}