{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T13:26:18Z","timestamp":1740144378969,"version":"3.37.3"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102020","62394322"],"award-info":[{"award-number":["62102020","62394322"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3409935","type":"journal-article","created":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T17:45:43Z","timestamp":1717609543000},"page":"10099-10113","source":"Crossref","is-referenced-by-count":0,"title":["Proactively Verifying Quantitative Network Policy Across Unsafe and Unreliable Environments"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0148-5965","authenticated-orcid":false,"given":"Yahui","family":"Li","sequence":"first","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4429-9959","authenticated-orcid":false,"given":"Han","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4493-5145","authenticated-orcid":false,"given":"Jilong","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6487-9526","authenticated-orcid":false,"given":"Xingang","family":"Shi","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"}]},{"given":"Xia","family":"Yin","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6587-820X","authenticated-orcid":false,"given":"Zhiliang","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0230-1432","authenticated-orcid":false,"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Engineering andInformation Technology, University of New South Wales, Australian Defence Force Academy (UNSW@ADFA), sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3265-049X","authenticated-orcid":false,"given":"Congcong","family":"Miao","sequence":"additional","affiliation":[{"name":"School of Engineering andInformation Technology, University of New South Wales, Australian Defence Force Academy (UNSW@ADFA), sydney, Australia"}]},{"given":"Jianping","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tsinghua University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385976"},{"volume-title":"A Wide Range of Routers are Under Attack by New, Unusually Sophisticated Malware","year":"2022","key":"ref2"},{"volume-title":"Network misconfiguration risks and how to avoid them","year":"2018","key":"ref3"},{"volume-title":"Misconfiguration Attacks: 5 Real-Life Attacks and Lessons Learned","year":"2020","key":"ref4"},{"volume-title":"Snowden: The NSA Planted Backdoors in Cisco Products","year":"2019","key":"ref5"},{"volume-title":"Facebook Blames Global Outage on Configuration Error","year":"2021","key":"ref6"},{"volume-title":"Cloudflare Outage","year":"2020","key":"ref7"},{"key":"ref8","first-page":"469","article-title":"A general approach to network configuration analysis","volume-title":"Proc. 12th USENIX Symp. Netw. Syst. Design Implement.","author":"Fogel"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934876"},{"key":"ref10","first-page":"217","article-title":"Efficient network reachability analysis using a succinct control plane representation","volume-title":"Proc. USENIX Symp. Oper. Syst. Design Implement. (OSDI)","author":"Fayaz"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098834"},{"key":"ref12","first-page":"953","article-title":"Plankton: Scalable network configuration verification through model checking","volume-title":"Proc. 17th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Prabhu"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544264"},{"volume-title":"Quantitative Network Analysis","year":"2015","author":"Juniwal","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496103"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406217"},{"volume-title":"Cisco IOS Master Command List, All Releases","year":"2014","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3472883.3486994"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064179"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3208104"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626314"},{"key":"ref23","first-page":"347","article-title":"Robust validation of network designs under uncertain demands and failures","volume-title":"Proc. 14th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Chang"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832225"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637213"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230583"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018470"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934881"},{"key":"ref29","first-page":"499","article-title":"Checking beliefs in dynamic networks","volume-title":"Proc. USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Lopes"},{"key":"ref30","first-page":"735","article-title":"Delta-net: Real-time network verification using atoms","volume-title":"Proc. 14th USENIX Conf. Netw. Syst. Design Implement.","author":"Horn"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837657"},{"key":"ref32","first-page":"9","article-title":"Header space analysis: Static checking for networks","volume-title":"Proc. 9th USENIX Conf. Netw. Syst. Design Implement.","author":"Kazemian"},{"key":"ref33","first-page":"699","article-title":"Verifying reachability in networks with mutable datapaths","volume-title":"Proc. 14th USENIX Symp. Networked Syst. Design Implement.","author":"Panda"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377766"},{"key":"ref35","first-page":"99","article-title":"Real time network policy checking using header space analysis","volume-title":"Proc. 10th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Kazemian"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49498-1_12"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677011"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405900"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10319981\/10550010.pdf?arnumber=10550010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:28:28Z","timestamp":1732667308000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10550010\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3409935","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2024]]}}}