{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:31:53Z","timestamp":1772724713248,"version":"3.50.1"},"reference-count":105,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Funda\u00e7\u00f5para a Ci\u00eancia e Tecnologia","award":["UIDB\/50008\/2020"],"award-info":[{"award-number":["UIDB\/50008\/2020"]}]},{"DOI":"10.13039\/501100015494","name":"Instituto de Telecomunica\u00e7\u00f5es, Lisbon, Portugal","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100015494","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3429269","type":"journal-article","created":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T17:30:44Z","timestamp":1721151044000},"page":"98546-98566","source":"Crossref","is-referenced-by-count":8,"title":["On the Road to Proactive Vulnerability Analysis and Mitigation Leveraged by Software Defined Networks: A Systematic Review"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-0559-2950","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Pol\u00f3nio","sequence":"first","affiliation":[{"name":"Instituto Universit&#x00E1;rio de Lisboa (ISCTE-IUL), Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3516-8781","authenticated-orcid":false,"given":"Jos\u00e9","family":"Moura","sequence":"additional","affiliation":[{"name":"Instituto Universit&#x00E1;rio de Lisboa (ISCTE-IUL), Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0385-8876","authenticated-orcid":false,"given":"Rui","family":"Neto Marinheiro","sequence":"additional","affiliation":[{"name":"Instituto Universit&#x00E1;rio de Lisboa (ISCTE-IUL), Lisbon, Portugal"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Infographic: Cybercrime Expected to Skyrocket in Coming Years","author":"Fleck","year":"2024"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.07.009"},{"key":"ref3","volume-title":"Perform Systematic Literature Reviews","year":"2024"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2022.102097"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2022.3174475"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03600-8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-022-00171-8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2885561"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3273282"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3093492"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3295182"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2474118"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.03.016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref16","article-title":"P4: Programming protocol-independent packet processors","author":"Bosshart","year":"2013","journal-title":"arXiv:1312.1719"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3556973"},{"key":"ref18","volume-title":"Cvss V3.1 Specification Document","year":"2024"},{"key":"ref19","volume-title":"CVE","year":"2024"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622092"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298314"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2987085"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2982955"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2995272.2995274"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193207"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2762161"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES.2017.8275301"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JCSSE.2018.8457354"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISCI.2012.6222683"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3029736"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-4244-9_3"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2487361"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922196"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2453114"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102595"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.006"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.11.014"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/fi12020027"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917633"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2940039"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-0716-y"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3139928"},{"key":"ref43","first-page":"1118","article-title":"Detection and mitigation of network vulnerability through scheduling framework in software defined networks","volume-title":"Proc. 6th Int. Conf. Comput. Sustain. Global Develop. (INDIACom)","author":"Sood"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C55045.2021.00096"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/RIVF51545.2021.9642134"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170813"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00064"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502843"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2889842"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN48450.2020.9059298"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC55113.2022.9824343"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS52808.2021.9937010"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00037"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10000603"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/NextComp55567.2022.9932172"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/DSC55868.2022.00065"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W54100.2022.00026"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3343392"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3055577"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS56928.2023.10154278"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00088"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S.2019.00013"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS52696.2021.9562686"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIPT53667.2021.00114"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/QRS57517.2022.00037"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2016.7440635"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON51383.2020.9284847"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI51800.2020.00017"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2019.00050"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2017.32"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3579856.3592825"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761496"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3338468.3356830"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3180465.3180473"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3269018"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3467021"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103685"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD57460.2023.10152746"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2016.7603498"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.23919\/SoftCOM58365.2023.10271570"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICCBD56965.2022.10080304"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC54389.2021.9674241"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC46691.2019.8939791"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228653"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ComComAp46287.2019.9018775"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/IMCEC51613.2021.9482133"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406205"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/RoEduNet57163.2022.9921097"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10000682"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/MLISE54096.2021.00019"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC.2019.8729425"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3507509.3507511"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.8"},{"key":"ref94","first-page":"1343","article-title":"Frontrunner Jones and the raiders of the dark forest: An empirical study of frontrunning on the Ethereum blockchain","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Torres"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833734"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911031"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25312-7_14"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN47374.2019.9040044"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3030102"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2024.3382470"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600935"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.3481355"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600940"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2866942"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.09.012"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10599429.pdf?arnumber=10599429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T17:34:43Z","timestamp":1721928883000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10599429\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":105,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3429269","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}