{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:44Z","timestamp":1750306604318,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,14]],"date-time":"2015-04-14T00:00:00Z","timestamp":1428969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003407","name":"Ministero dell'Istruzione, dell'Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","award":["20103P34XC","PCIG11-GA-2012-321980"],"award-info":[{"award-number":["20103P34XC","PCIG11-GA-2012-321980"]}],"id":[{"id":"10.13039\/501100003407","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"Ministero dell'Istruzione, dell'Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","award":["20103P34XC","PCIG11-GA-2012-321980"],"award-info":[{"award-number":["20103P34XC","PCIG11-GA-2012-321980"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,14]]},"DOI":"10.1145\/2714576.2714612","type":"proceedings-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T16:27:14Z","timestamp":1428078434000},"page":"639-644","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["LineSwitch"],"prefix":"10.1145","author":[{"given":"Moreno","family":"Ambrosin","sequence":"first","affiliation":[{"name":"University of Padua, Padua, Italy"}]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padua, Padua, Italy"}]},{"given":"Fabio","family":"De Gaspari","sequence":"additional","affiliation":[{"name":"University of Padua, Padua, Italy"}]},{"given":"Radha","family":"Poovendran","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,4,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"OpenFlow Switch specificatio v.1.3.4. https:\/\/www.opennetworking.org\/images\/stories\/downloads\/sdn-resources\/onf-specifications\/openflow\/openflow-switch-v1.3.4.pdf.  OpenFlow Switch specificatio v.1.3.4. https:\/\/www.opennetworking.org\/images\/stories\/downloads\/sdn-resources\/onf-specifications\/openflow\/openflow-switch-v1.3.4.pdf."},{"key":"e_1_3_2_1_2_1","unstructured":"OpenFlow whitepaper. https:\/\/www.opennetworking.org\/sdn-resources\/sdn-library\/whitepapers.  OpenFlow whitepaper. https:\/\/www.opennetworking.org\/sdn-resources\/sdn-library\/whitepapers."},{"key":"e_1_3_2_1_3_1","unstructured":"Transmission Control Protocol. RFC 793 IETF September 1981.  Transmission Control Protocol. RFC 793 IETF September 1981."},{"key":"e_1_3_2_1_4_1","unstructured":"TCP SYN Flooding Attacks and Common Mitigations. RFC 4987 IETF August 2007.  TCP SYN Flooding Attacks and Common Mitigations. RFC 4987 IETF August 2007."},{"key":"e_1_3_2_1_5_1","unstructured":"Defending against Sequence Number Attacks. RFC 6528 IETF February 2012.  Defending against Sequence Number Attacks. RFC 6528 IETF February 2012."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491222"},{"key":"e_1_3_2_1_7_1","unstructured":"D. J. Bernstein. SYN Cookies. http:\/\/cr.yp.to\/syncookies.html.  D. J. Bernstein. SYN Cookies. http:\/\/cr.yp.to\/syncookies.html."},{"key":"e_1_3_2_1_8_1","volume-title":"USENIX Open Network Summit","author":"Haopei W.","year":"2014","unstructured":"W. Haopei , X. Lei , and G. Guofei . OF-GUARD: A DoS Attack Prevention Extension in Software-Defined Networks . In USENIX Open Network Summit , 2014 . W. Haopei, X. Lei, and G. Guofei. OF-GUARD: A DoS Attack Prevention Extension in Software-Defined Networks. In USENIX Open Network Summit, 2014."},{"key":"e_1_3_2_1_9_1","first-page":"1","volume-title":"ICNP '13","author":"Kloti R.","year":"2013","unstructured":"R. Kloti , V. Kotronis , and P. Smith . Open flow: A security analysis . ICNP '13 , pages 1 -- 6 , 2013 . R. Kloti, V. Kotronis, and P. Smith. Open flow: A security analysis. ICNP '13, pages 1--6, 2013."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_1_12_1","unstructured":"Mininet. http:\/\/mininet.org\/.  Mininet. http:\/\/mininet.org\/."},{"key":"e_1_3_2_1_13_1","volume-title":"A Weakness in the 4.2BSD Unix TCP\/IP Software","author":"Morris R. T.","year":"1985","unstructured":"R. T. Morris . A Weakness in the 4.2BSD Unix TCP\/IP Software , 1985 . R. T. Morris. A Weakness in the 4.2BSD Unix TCP\/IP Software, 1985."},{"key":"e_1_3_2_1_14_1","unstructured":"OpenFlow Software Switch. http:\/\/yuba.stanford.edu\/git\/gitweb.cgi?p=openflow.git;a=summary.  OpenFlow Software Switch. http:\/\/yuba.stanford.edu\/git\/gitweb.cgi?p=openflow.git;a=summary."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216370.1216373"},{"key":"e_1_3_2_1_16_1","unstructured":"POX. http:\/\/www.noxrepo.org\/pox\/about-pox\/.  POX. http:\/\/www.noxrepo.org\/pox\/about-pox\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"}],"event":{"name":"ASIA CCS '15: 10th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Republic of Singapore","acronym":"ASIA CCS '15"},"container-title":["Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2714576.2714612","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2714576.2714612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:54Z","timestamp":1750227414000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2714576.2714612"}},"subtitle":["Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks"],"short-title":[],"issued":{"date-parts":[[2015,4,14]]},"references-count":17,"alternative-id":["10.1145\/2714576.2714612","10.1145\/2714576"],"URL":"https:\/\/doi.org\/10.1145\/2714576.2714612","relation":{},"subject":[],"published":{"date-parts":[[2015,4,14]]},"assertion":[{"value":"2015-04-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}