{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:50:51Z","timestamp":1763459451177,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,9]],"date-time":"2017-11-09T00:00:00Z","timestamp":1510185600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-0963754"],"award-info":[{"award-number":["CNS-0963754"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,11,9]]},"DOI":"10.1145\/3005745.3005767","type":"proceedings-article","created":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T08:22:17Z","timestamp":1478074937000},"page":"36-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Canaries in the Network"],"prefix":"10.1145","author":[{"given":"Danyang","family":"Zhuo","sequence":"first","affiliation":[{"name":"University of Washington"}]},{"given":"Qiao","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Washington"}]},{"given":"Xin","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Washington"}]},{"given":"Vincent","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]}],"member":"320","published-online":{"date-parts":[[2016,11,9]]},"reference":[{"unstructured":"Cisco NX-OS Software Malformed DHCPv4 Packet Denial of Service Vulnerability. https:\/\/quickview:cloudapps:cisco:com\/quickview\/bug\/CSCuq39250.","key":"e_1_3_2_1_1_1"},{"unstructured":"Google Compute Engine Incident 16007. https:\/\/status:cloud:google:com\/incident\/compute\/16007.","key":"e_1_3_2_1_2_1"},{"unstructured":"Summary of the October 22 2012 AWS Service Event in the US-East Region. https:\/\/aws:amazon:com\/message\/680342\/.","key":"e_1_3_2_1_3_1"},{"unstructured":"What's Behind Network Downtime?. http:\/\/www-05:ibm:com\/uk\/juniper\/pdf\/200249:pdf.","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/2670518.2673884"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.5555\/1855711.1855730"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/2619239.2626316"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/2535838.2535862"},{"key":"e_1_3_2_1_9_1","volume-title":"The Visible Ops Handbook","author":"Behr K.","year":"2005","unstructured":"K. Behr, G. Kim, and G. Spafford. The Visible Ops Handbook. Information Technology Process Institute, 2005."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.5555\/2228298.2228312"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2620728.2620781"},{"unstructured":"R. J. Colville and G. Spafford. Top seven considerations for configuration management for virtual and cloud infrastructures. Technical Report G00208328 Gartner Inc. Stamford Connecticut October 2010.","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/360051.360056"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.5555\/2789770.2789803"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/2934872.2934891"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/1921168.1921188"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/2486001.2486019"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/2619239.2626307"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/2774993.2774996"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.5555\/2482626.2482630"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.5555\/2789770.2789775"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.5555\/1924943.1924968"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/2486001.2486005"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.5555\/2482626.2482665"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/2535771.2535791"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/2018436.2018470"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/2737924.2737980"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/1355734.1355746"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/2491185.2491186"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/2342356.2342427"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/2619239.2626304"},{"key":"e_1_3_2_1_32_1","volume-title":"M. Casado, N. Mckeown, and G. Parulkar. FlowVisor: A Network Virtualization Layer. Technical report","author":"Sherwood R.","year":"2009","unstructured":"R. Sherwood, G. Gibb, K. kiong Yap, M. Casado, N. Mckeown, and G. Parulkar. FlowVisor: A Network Virtualization Layer. Technical report, 2009."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/2491185.2491194"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1109\/INFOCOM.2016.7524419"}],"event":{"sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"acronym":"HotNets-XV","name":"HotNets-XV: The 15th ACM Workshop on Hot Topics in Networks","location":"Atlanta GA USA"},"container-title":["Proceedings of the 15th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3005745.3005767","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3005745.3005767","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3005745.3005767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:46:17Z","timestamp":1763459177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3005745.3005767"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,9]]},"references-count":34,"alternative-id":["10.1145\/3005745.3005767","10.1145\/3005745"],"URL":"https:\/\/doi.org\/10.1145\/3005745.3005767","relation":{},"subject":[],"published":{"date-parts":[[2016,11,9]]},"assertion":[{"value":"2016-11-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}