{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:23:39Z","timestamp":1750307019007,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,3,29]],"date-time":"2012-03-29T00:00:00Z","timestamp":1332979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,29]]},"DOI":"10.1145\/2184512.2184515","type":"proceedings-article","created":{"date-parts":[[2012,4,17]],"date-time":"2012-04-17T12:53:22Z","timestamp":1334667202000},"page":"7-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["MINA"],"prefix":"10.1145","author":[{"given":"James A.","family":"Jerkins","sequence":"first","affiliation":[{"name":"The University of Alabama in Huntsville, Huntsville, AL"}]}],"member":"320","published-online":{"date-parts":[[2012,3,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.47"},{"key":"e_1_3_2_1_2_1","volume-title":"September","author":"American National Standards Institute.","year":"1991","unstructured":"American National Standards Institute. Telecommunications Integrated Services Digital Network (ISDN) - Core Aspects of Frame Protocol for use with Frame Relay Bearer Service , September 1991 . American National Standards Institute. Telecommunications Integrated Services Digital Network (ISDN) - Core Aspects of Frame Protocol for use with Frame Relay Bearer Service, September 1991."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/502059.502048"},{"issue":"5439","key":"e_1_3_2_1_4_1","first-page":"509","volume":"286","author":"Barab\u00e1si A. L.","year":"1999","unstructured":"A. L. Barab\u00e1si and R. Albert . Emergence of Scaling in Random Networks. Science , 286 ( 5439 ): 509 -- 512 , 1999 . A. L. Barab\u00e1si and R. Albert. Emergence of Scaling in Random Networks. Science, 286(5439):509--512, 1999.","journal-title":"Emergence of Scaling in Random Networks. Science"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-4371(99)00291-5"},{"key":"e_1_3_2_1_6_1","volume-title":"Gephi: An Open Source Software for Exploring and Manipulating Networks. In International AAAI Conference on Weblogs and Social Media","author":"Bastian M.","year":"2009","unstructured":"M. Bastian , S. Heymann , and M. Jacomy . Gephi: An Open Source Software for Exploring and Manipulating Networks. In International AAAI Conference on Weblogs and Social Media , 2009 . M. Bastian, S. Heymann, and M. Jacomy. Gephi: An Open Source Software for Exploring and Manipulating Networks. In International AAAI Conference on Weblogs and Social Media, 2009."},{"key":"e_1_3_2_1_7_1","volume-title":"MPLS VPN Security","author":"Behringer M. H.","year":"2005","unstructured":"M. H. Behringer and M. J. Morrow . MPLS VPN Security . Cisco Press , 2005 . M. H. Behringer and M. J. Morrow. MPLS VPN Security. Cisco Press, 2005."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2005\/09\/P09008"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1805895"},{"key":"e_1_3_2_1_10_1","volume-title":"Internet Draft (Informational)","author":"Fang L.","year":"2009","unstructured":"L. Fang . Draft IETF MPLS and GMPLS Security Framework 05 . Internet Draft (Informational) , March 2009 . Expires September 8, 2009. L. Fang. Draft IETF MPLS and GMPLS Security Framework 05. Internet Draft (Informational), March 2009. Expires September 8, 2009."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2009.11.002"},{"key":"e_1_3_2_1_12_1","volume-title":"February","author":"C. S. Inc.","year":"2006","unstructured":"C. S. Inc. Security of the MPLS Architecture , February 2006 . C. S. Inc. Security of the MPLS Architecture, February 2006."},{"key":"e_1_3_2_1_13_1","volume-title":"53rd Annual ACM Mid-Southeast Conference","author":"Jerkins J. A.","year":"2011","unstructured":"J. A. Jerkins . Detecting the Presence of Undesirable Nodes in Layer 3 Virtual Networks . In 53rd Annual ACM Mid-Southeast Conference , October 2011 . J. A. Jerkins. Detecting the Presence of Undesirable Nodes in Layer 3 Virtual Networks. In 53rd Annual ACM Mid-Southeast Conference, October 2011."},{"issue":"5","key":"e_1_3_2_1_14_1","article-title":"Virtual network community detection with a message induced graph","volume":"27","author":"Jerkins J. A.","year":"2012","unstructured":"J. A. Jerkins . Virtual network community detection with a message induced graph . Journal of Computing Sciences in Colleges , 27 ( 5 ), 2012 . J. A. Jerkins. Virtual network community detection with a message induced graph. Journal of Computing Sciences in Colleges, 27(5), 2012.","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"e_1_3_2_1_15_1","volume-title":"An efficient heuristic procedure for partitioning graphs. The Bell system technical journal, 49(1):291--307","author":"Kernighan B. W.","year":"1970","unstructured":"B. W. Kernighan and S. Lin . An efficient heuristic procedure for partitioning graphs. The Bell system technical journal, 49(1):291--307 , 1970 . B. W. Kernighan and S. Lin. An efficient heuristic procedure for partitioning graphs. The Bell system technical journal, 49(1):291--307, 1970."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/204826.204832"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1394399"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"e_1_3_2_1_20_1","volume-title":"SchmooCon 2009","author":"Mende D.","year":"2009","unstructured":"D. Mende and E. Ray . All your packets are belong to us - Attacking backbone technologies . SchmooCon 2009 , February 2009 . D. Mende and E. Ray. All your packets are belong to us - Attacking backbone technologies. SchmooCon 2009, February 2009."},{"key":"e_1_3_2_1_21_1","volume-title":"Cisco MPLS Based VPNS: Equivalent to the security of Frame Relay and ATM","author":"Report Miercomm","year":"2001","unstructured":"Miercomm Report . Cisco MPLS Based VPNS: Equivalent to the security of Frame Relay and ATM , 2001 . Miercomm Report. Cisco MPLS Based VPNS: Equivalent to the security of Frame Relay and ATM, 2001."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.026113"},{"key":"e_1_3_2_1_24_1","volume-title":"Computer networks: a systems approach. The Morgan Kaufmann series in networking","author":"Peterson L.","year":"2003","unstructured":"L. Peterson and B. Davie . Computer networks: a systems approach. The Morgan Kaufmann series in networking . Morgan Kaufmann Publishers , 2003 . L. Peterson and B. Davie. Computer networks: a systems approach. The Morgan Kaufmann series in networking. Morgan Kaufmann Publishers, 2003."},{"key":"e_1_3_2_1_25_1","volume-title":"Establishing clustering procedures for network analysis. arXiv.0806.4168","author":"Slater P. B.","year":"2008","unstructured":"P. B. Slater . Establishing clustering procedures for network analysis. arXiv.0806.4168 , 2008 . P. B. Slater. Establishing clustering procedures for network analysis. arXiv.0806.4168, 2008."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1038\/35065725"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"}],"event":{"name":"ACM SE '12: ACM Southeast Regional Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Tuscaloosa Alabama","acronym":"ACM SE '12"},"container-title":["Proceedings of the 50th Annual Southeast Regional Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184512.2184515","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2184512.2184515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:49:11Z","timestamp":1750236551000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184512.2184515"}},"subtitle":["an algorithm for detecting the presence of extrinsic network nodes using a message induced graph"],"short-title":[],"issued":{"date-parts":[[2012,3,29]]},"references-count":27,"alternative-id":["10.1145\/2184512.2184515","10.1145\/2184512"],"URL":"https:\/\/doi.org\/10.1145\/2184512.2184515","relation":{},"subject":[],"published":{"date-parts":[[2012,3,29]]},"assertion":[{"value":"2012-03-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}