{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T13:20:33Z","timestamp":1762953633562,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,8]],"date-time":"2015-06-08T00:00:00Z","timestamp":1433721600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,8]]},"DOI":"10.1145\/2775088.2775104","type":"proceedings-article","created":{"date-parts":[[2015,7,6]],"date-time":"2015-07-06T14:04:29Z","timestamp":1436191469000},"page":"51-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Security Analysis of Software Defined Networking Applications for Monitoring and Measurement"],"prefix":"10.1145","author":[{"given":"Pascal","family":"Dauer","sequence":"first","affiliation":[{"name":"Department of Computer Science, TU Darmstadt, Germany"}]},{"given":"Rahamatullah","family":"Khondoker","sequence":"additional","affiliation":[{"name":"Fraunhofer SIT, Darmstadt, Germany"}]},{"given":"Ronald","family":"Marx","sequence":"additional","affiliation":[{"name":"Fraunhofer SIT, Darmstadt, Germany"}]},{"given":"Kpatcha","family":"Bayarou","sequence":"additional","affiliation":[{"name":"Fraunhofer SIT, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2015,6,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Open Network Foundation Software-Defined Networking (SDN) Definition Available: https:\/\/www.opennetworking.org\/sdn-resources\/sdn-definition {Jan. 10 2014}.  Open Network Foundation Software-Defined Networking (SDN) Definition Available: https:\/\/www.opennetworking.org\/sdn-resources\/sdn-definition {Jan. 10 2014}."},{"key":"e_1_3_2_1_2_1","unstructured":"Shawn Hernan and Scott Lambert and Tomasz Ostwald and Adam Shostack Uncover Security Design Flaws Using The STRIDE Approach Available: http:\/\/msdn.microsoft.com\/en-us\/magazine\/cc163519.aspx {Jan. 10 2014}.  Shawn Hernan and Scott Lambert and Tomasz Ostwald and Adam Shostack Uncover Security Design Flaws Using The STRIDE Approach Available: http:\/\/msdn.microsoft.com\/en-us\/magazine\/cc163519.aspx {Jan. 10 2014}."},{"key":"e_1_3_2_1_3_1","unstructured":"Microsoft Corporation The STRIDE Threat Model Available: http:\/\/msdn.microsoft.com\/en-US\/library\/ee823878(v=cs.20).aspx {Jan. 10 2014}.  Microsoft Corporation The STRIDE Threat Model Available: http:\/\/msdn.microsoft.com\/en-US\/library\/ee823878(v=cs.20).aspx {Jan. 10 2014}."},{"volume-title":"Jan, 2014}.","author":"Network Visible Flow","key":"e_1_3_2_1_4_1"},{"volume-title":"Jan, 2014}.","author":"Specification Flow Version","key":"e_1_3_2_1_5_1"},{"volume-title":"Feb, 2014}.","author":"Case J.","key":"e_1_3_2_1_6_1"},{"volume-title":"Feb, 2014}.","author":"Networks Big Switch","key":"e_1_3_2_1_7_1"},{"volume-title":"Feb, 2014}.","author":"Networks Big Switch","key":"e_1_3_2_1_8_1"},{"volume-title":"Feb, 2014}.","author":"Application Security Open Web","key":"e_1_3_2_1_9_1"},{"volume-title":"Feb, 2014}.","author":"CERT---Software Engineering Institute","key":"e_1_3_2_1_10_1"},{"volume-title":"Feb, 2014}.","author":"John","key":"e_1_3_2_1_11_1"},{"volume-title":"Feb, 2014}.","author":"Microsoft Corporation","key":"e_1_3_2_1_12_1"},{"volume-title":"IEEE ICCE 2014","year":"2014","author":"Brandt Markus","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684793.2684796"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684793.2684797"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838409"}],"event":{"name":"CFI '15: The 10th International Conference on Future Internet","sponsor":["AsiaFI Asia Future Internet","FIF Future Internet Forum","ACM Association for Computing Machinery"],"location":"Seoul Republic of Korea","acronym":"CFI '15"},"container-title":["The 10th International Conference on Future Internet"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2775088.2775104","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2775088.2775104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:39Z","timestamp":1750231179000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2775088.2775104"}},"subtitle":["sFlow and BigTap"],"short-title":[],"issued":{"date-parts":[[2015,6,8]]},"references-count":16,"alternative-id":["10.1145\/2775088.2775104","10.1145\/2775088"],"URL":"https:\/\/doi.org\/10.1145\/2775088.2775104","relation":{},"subject":[],"published":{"date-parts":[[2015,6,8]]},"assertion":[{"value":"2015-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}