{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T18:09:17Z","timestamp":1757700557334,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/wowmom.2014.6918981","type":"proceedings-article","created":{"date-parts":[[2014,10,14]],"date-time":"2014-10-14T22:09:28Z","timestamp":1413324568000},"page":"1-6","source":"Crossref","is-referenced-by-count":34,"title":["Securing the control channel of software-defined mobile networks"],"prefix":"10.1109","author":[{"given":"Madhusanka","family":"Liyanage","sequence":"first","affiliation":[]},{"given":"Mika","family":"Ylianttila","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Gurtov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039856"},{"journal-title":"Slipping in the window Tcp reset attacks","year":"2004","author":"watson","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2012.6399037"},{"journal-title":"Carrier Cloud Telecoms-Exploring the Challenges of Deploying Virtualisation and SDN in Telecom Networks","year":"2013","key":"13"},{"key":"14","article-title":"TCP SYN flooding attacks and common mitigations","volume":"4987","author":"eddy","year":"2007","journal-title":"RFC"},{"journal-title":"Open VSwitch An Open Virtual Switch","year":"0","key":"11"},{"journal-title":"The OpenHIP Project","year":"0","key":"12"},{"key":"3","article-title":"Fresco: Modular composable security services for software-defined networks","author":"shin","year":"2013","journal-title":"NDSS the Internet Society"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"1","article-title":"Openflow-enabled mobile and wireless networks","author":"kolias","year":"2013","journal-title":"White Paper"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1002\/9780470772898"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702540"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2011.6089085"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342458"},{"key":"9","first-page":"49","article-title":"Lessons learned from previous SSL\/TLS attacks-A brief chronology of attacks and weaknesses","volume":"2013","author":"meyer","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"journal-title":"Survey Report Arbor Networks","year":"2013","key":"8"}],"event":{"name":"2014 IEEE 15th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","start":{"date-parts":[[2014,6,19]]},"location":"Sydney, Australia","end":{"date-parts":[[2014,6,19]]}},"container-title":["Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6912450\/6918912\/06918981.pdf?arnumber=6918981","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:00:35Z","timestamp":1602687635000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6918981"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2014.6918981","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}