{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:45:13Z","timestamp":1730299513040,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,15]]},"DOI":"10.1109\/syscon48628.2021.9447117","type":"proceedings-article","created":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T21:20:08Z","timestamp":1623273608000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["SocialSDN: Design and Implementation of a Secure Internet Protocol Tunnel Between Social Connections"],"prefix":"10.1109","author":[{"given":"Michael","family":"Lescisin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qusay H.","family":"Mahmoud","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"journal-title":"Telebit","year":"2019","author":"oneal","key":"ref10"},{"journal-title":"Pagekite - the fast reliable localhost tunneling solution","year":"2019","key":"ref11"},{"key":"ref12","article-title":"Resource management: Linux kernel namespaces and cgroups","volume":"186","author":"rosen","year":"2013","journal-title":"Haifux"},{"journal-title":"A monitoring framework for side-channel information leaks","year":"2019","author":"lescisin","key":"ref13"},{"key":"ref14","first-page":"27","article-title":"The pgp trust model","volume":"10","author":"abdul-rahman","year":"1997","journal-title":"EDI-Forum The Journal of Electronic Commerce"},{"journal-title":"Keybase","year":"2019","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361061"},{"journal-title":"scapy-pipeline","year":"2019","author":"lescisin","key":"ref17"},{"key":"ref18","article-title":"Packet generation and network based attacks with scapy","author":"biondi","year":"2005","journal-title":"CanSecWest"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33481-8_9"},{"journal-title":"OpenVPN Building and Integrating Virtual Private Networks","year":"2006","author":"feilner","key":"ref4"},{"journal-title":"Social-SDN","year":"2019","author":"lescisin","key":"ref3"},{"journal-title":"Implementing wireguard to a home office environment","year":"2020","author":"saukkonen","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23160"},{"journal-title":"Maze A secure cloud storage service using moving target defense and secure shell protocol (ssh) tunneling","year":"2020","author":"xu","key":"ref8"},{"journal-title":"boringtun","year":"2021","key":"ref7"},{"key":"ref2","article-title":"Transparent weaknesses in voip","author":"thermos","year":"2007","journal-title":"BlackHat USA 2007"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23547"},{"journal-title":"NGROK - Secure introspectable tunnels to localhost","year":"2019","author":"shreve","key":"ref9"}],"event":{"name":"2021 IEEE International Systems Conference (SysCon)","start":{"date-parts":[[2021,4,15]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2021,5,15]]}},"container-title":["2021 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9447020\/9447051\/09447117.pdf?arnumber=9447117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:42:06Z","timestamp":1652197326000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9447117\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/syscon48628.2021.9447117","relation":{},"subject":[],"published":{"date-parts":[[2021,4,15]]}}}