{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:20:35Z","timestamp":1761402035263,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/wimob.2019.8923557","type":"proceedings-article","created":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T07:28:23Z","timestamp":1575617303000},"page":"354-359","source":"Crossref","is-referenced-by-count":4,"title":["An efficient modular security plane AM-SecP for hybrid distributed SDN"],"prefix":"10.1109","author":[{"given":"Karim","family":"Zkik","sequence":"first","affiliation":[{"name":"Universit&#x00E9; Internationale de Rabat,Facult&#x00E9; d&#x2019;Informatique et de Logistique, TICLab, Morocco,Sala Al Jadida,Morocco"}]},{"given":"Anass","family":"Sebbar","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; Internationale de Rabat,Facult&#x00E9; d&#x2019;Informatique et de Logistique, TICLab, Morocco,Sala Al Jadida,Morocco"}]},{"given":"Youssef","family":"Baddi","sequence":"additional","affiliation":[{"name":"ESTSB-Chouaib Doukkali University,STIC,Morocco El Jadida,Morocco"}]},{"given":"Amine","family":"Belhadi","sequence":"additional","affiliation":[{"name":"Cadi Ayyad University, Marrakech, Morocco,Marrakech,Morocco"}]},{"given":"Mohammed","family":"Boulmalf","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; Internationale de Rabat,Facult&#x00E9; d&#x2019;Informatique et de Logistique, TICLab, Morocco,Sala Al Jadida,Morocco"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2014.24"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.10.014"},{"key":"ref15","article-title":"Measuring the efficiency of SDN mitigations against attacks on computer infrastructures","author":"koning","year":"2018","journal-title":"Future Generation Computer Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502793"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.01.019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.037"},{"journal-title":"Flexible SDN Control in Tactical Ad Hoc Networks Ad Hoc Networks","year":"2018","author":"poularakis","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.03.016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0207-8"},{"key":"ref19","article-title":"Towards an optimal solution against Denial of Service attacks in Software Defined Networks","author":"imran","year":"2018","journal-title":"Future Generation Computer Systems"},{"key":"ref18","first-page":"626","article-title":"A service dependency model for cost-sensitive intrusion response","volume":"2010","author":"kheir","year":"2010","journal-title":"Computers & Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CIST.2018.8596479"},{"key":"ref23","article-title":"DoS vulnerabilities and mitigation strategies in software-defined networks","author":"deng","year":"2018","journal-title":"Journal of Network and Computer Applications"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2414-5"},{"key":"ref25","first-page":"10","article-title":"A centralized secure plane for detecting and mitigation incidents in hybrid SDN","author":"zkik","year":"2018","journal-title":"MATEC Web of Conferences EDP Sciences"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.08.011"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.11.015"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.003"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.04.014"},{"key":"ref7","first-page":"79","volume":"53","author":"alsmadi","year":"2015","journal-title":"Security of software defined networks Asurvey Computers & Security"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.14.1.26-32"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.006"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.017"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.04.137"},{"key":"ref5","article-title":"BOND: Flexible Failure Recovery in Software Defined Networks","author":"li","year":"2018","journal-title":"Computer Networks"}],"event":{"name":"2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","start":{"date-parts":[[2019,10,21]]},"location":"Barcelona, Spain","end":{"date-parts":[[2019,10,23]]}},"container-title":["2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8913409\/8923119\/08923557.pdf?arnumber=8923557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T19:06:37Z","timestamp":1692903997000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8923557\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/wimob.2019.8923557","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}