{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T11:18:02Z","timestamp":1774264682593,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/softcom.2016.7772161","type":"proceedings-article","created":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T16:40:15Z","timestamp":1482165615000},"page":"1-5","source":"Crossref","is-referenced-by-count":13,"title":["NFV security considerations for cloud-based mobile virtual network operators"],"prefix":"10.1109","author":[{"given":"Mehrnoosh","family":"Monshizadeh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vikramajeet","family":"Khatri","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrei","family":"Gurtov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","year":"0","journal-title":"CVE-2014&#x2013;0160"},{"key":"ref11","year":"0","journal-title":"Bash Code Injection Vulnerability via Specially Crafted Environment Variables (CVE-2014&#x2013;6271 CVE-2014-7169)"},{"key":"ref12","year":"0","journal-title":"CVE-2014&#x2013;6271"},{"key":"ref13","year":"0","journal-title":"ETSI GS NFV-SEC 003 NFV Security Security and Trust Guidance"},{"key":"ref14","year":"0","journal-title":"ETSI GS NFV-SEC 001 v1 1 1 Network Functions Virtualisation (NFV) NFV Security Problem Statement"},{"key":"ref15","year":"0","journal-title":"ETSI Group Specification ETSI GS NFV 002 Network Functions Virtualisation (NFV) Architectural Framework"},{"key":"ref16","article-title":"STEM+: Allocating Bandwidth Fairly To Tasks","author":"lukyanenko","year":"2014","journal-title":"Technical Report TR-14-001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2014.130"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1002\/9781118900253","author":"liyanage","year":"2015","journal-title":"Software Defined Mobile Networks (SDMN) Beyond LTE Network Architecture"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.82"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2015.270"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2011.117"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2014.6968453"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113225"},{"key":"ref8","article-title":"Security Concerns in Using Open Source Software for Enterprise Requirements","author":"vadalasetty","year":"2014","journal-title":"SANS Institute Reading Room2009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2015.103"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2014.20"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WSCNIS.2015.7368308"},{"key":"ref9","year":"0","journal-title":"Heartbleed Bug"},{"key":"ref20","year":"0","journal-title":"OPNFV Delivers Open Source Software to Enable Deployment of Network Functions Virtualization Solutions"},{"key":"ref22","year":"0","journal-title":"Security Home - Security - OPNFV Wiki"},{"key":"ref21","year":"0","journal-title":"Technical Overview \\ Open Platform for NFV (OPNFV)"}],"event":{"name":"2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","location":"Split, Croatia","start":{"date-parts":[[2016,9,22]]},"end":{"date-parts":[[2016,9,24]]}},"container-title":["2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7754733\/7772099\/07772161.pdf?arnumber=7772161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T14:44:28Z","timestamp":1568645068000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7772161\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/softcom.2016.7772161","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}