{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:23:03Z","timestamp":1759134183157,"version":"3.37.3"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100007225","name":"Ministry of Science and Technology","doi-asserted-by":"publisher","award":["MOST 108-2634-F-009-006"],"award-info":[{"award-number":["MOST 108-2634-F-009-006"]}],"id":[{"id":"10.13039\/100007225","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Pervasive Artificial Intelligence Research (PAIR) Labs, Taiwan"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/tnsm.2019.2909116","type":"journal-article","created":{"date-parts":[[2019,4,3]],"date-time":"2019-04-03T22:14:56Z","timestamp":1554329696000},"page":"618-631","source":"Crossref","is-referenced-by-count":18,"title":["HiAuth: Hidden Authentication for Protecting Software Defined Networks"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2667-3783","authenticated-orcid":false,"given":"Osamah Ibrahiem","family":"Abdullaziz","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7883-6217","authenticated-orcid":false,"given":"Li-Chun","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7563-4073","authenticated-orcid":false,"given":"Yu-Jia","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"257","article-title":"Alice in warningland: A large-scale field study of browser security warning effectiveness","volume":"13","author":"akhawe","year":"2013","journal-title":"Proc Usenix Security Symp"},{"journal-title":"SSL Server Test","year":"2019","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1980022.1980233"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTE.2010.5579643"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/AMS.2007.80"},{"key":"ref30","first-page":"1","article-title":"Practical data hiding in TCP\/IP","author":"ahsan","year":"2002","journal-title":"Proceedings of Workshop on Multimedia & Security ACM Multimedia'98"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590341"},{"key":"ref36","first-page":"1339","article-title":"I have no idea what I&#x2019;m doing&#x2014;On the usability of deploying HTTPS","volume":"17","author":"krombholz","year":"2017","journal-title":"Proc 26th USENIX Security Symp"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6257521"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/11558859_19"},{"journal-title":"Updated Specification of the IPv4 ID Field","year":"6864","author":"touch","key":"ref60"},{"journal-title":"Speeding up and strengthening HTTPS connections for Chrome on Android","year":"2014","author":"bursztein","key":"ref62"},{"key":"ref61","first-page":"3","article-title":"ChaCha, a variant of Salsa20","volume":"8","author":"bernstein","year":"2008","journal-title":"Proc Workshop Rec SASC"},{"article-title":"ChaCha20 and Poly1305 for IETF protocols","year":"8439","author":"nir","key":"ref63"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0791"},{"journal-title":"Cache-timing attacks on AES","year":"2005","author":"bernstein","key":"ref64"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"journal-title":"IP ID Generation is a Fascinating Topic","year":"2017","key":"ref66"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v2i5.528"},{"journal-title":"Internet protocol Version 6 (IPV6) specification","year":"2017","author":"hinden","key":"ref67"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2725240"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2638463"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2627503"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSUDET.2013.6670985"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1117\/1.1388610"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2007.4444059"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IEEC.2009.122"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-009-0530-1"},{"journal-title":"Etherleak Ethernet frame padding information leakage","year":"2003","author":"arkin","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2016.7549402"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1049\/el.2015.0334"},{"journal-title":"Packetization Layer Path MTU Discovery","year":"4821","author":"mathis","key":"ref59"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.21236\/ADA636482"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1191"},{"journal-title":"An Introduction to dynamical Systems","year":"1990","author":"arrowsmith","key":"ref56"},{"key":"ref55","first-page":"1","article-title":"On the cascading failures of multi-controllers in software defined networks","author":"yao","year":"2013","journal-title":"Proc IEEE 21st Int Conf Netw Protocols (ICNP)"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249158"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.7961368"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2701549"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.250"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2474118"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41320-9_7"},{"journal-title":"Defense4all SDN Application for Detecting and Driving Mitigation of DoS and DDoS Attacks","year":"2013","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2486772"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.33"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2350994"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2014.2387417"},{"key":"ref17","first-page":"1101","article-title":"PadSteg: Introducing inter-protocol steganography","volume":"52","author":"jankowski","year":"2013","journal-title":"Telecommun Syst"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.15837\/ijccc.2013.3.469"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.10.019"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2758328"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883776"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918983"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491222"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.27"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1607877"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2487361"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841954"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2626287"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491220"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15103"},{"article-title":"A denial of service attack against the open floodlight SDN controller","year":"2013","author":"dover","key":"ref44"},{"key":"ref43","article-title":"Authentication and security protocols for ubiquitous wireless networks","author":"wang","year":"2006","journal-title":"Ambient Intelligence Wireless Networking and Ubiquitous Computing"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/8733952\/08681151.pdf?arnumber=8681151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:06:19Z","timestamp":1657746379000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8681151\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":67,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2019.2909116","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2019,6]]}}}