{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:40Z","timestamp":1750308580210,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T00:00:00Z","timestamp":1490313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,24]]},"DOI":"10.1145\/3040992.3041005","type":"proceedings-article","created":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T14:54:21Z","timestamp":1490367261000},"page":"43-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Dynamic Defense Provision via Network Functions Virtualization"],"prefix":"10.1145","author":[{"given":"Younghee","family":"Park","sequence":"first","affiliation":[{"name":"San Jose State University, San Jose, USA"}]},{"given":"Pritesh","family":"Chandaliya","sequence":"additional","affiliation":[{"name":"San Jose State University, San Jose, USA"}]},{"given":"Akshaya","family":"Muralidharan","sequence":"additional","affiliation":[{"name":"San Jose State University, San Jose, USA"}]},{"given":"Nikash","family":"Kumar","sequence":"additional","affiliation":[{"name":"San Jose State University, San Jose, USA"}]},{"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,3,24]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"107","volume-title":"2015 IEEE Conference on","author":"Juan","year":"2015"},{"key":"e_1_3_2_1_2_1","first-page":"1622","volume-title":"Communications and Informatics (ICACCI, 2014 International Conference on, vol., no.","author":"Network Security Function L.R.","year":"2014"},{"volume-title":"2015 24th USENIX Security Symposium (USENIX Security 15)","author":"Seyed","key":"e_1_3_2_1_3_1"},{"volume-title":"2015 Asia-Pacific Network Operations and Management Symposium (APNOMS).","author":"Kim Taekhee","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113223"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620749"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2631448"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Yong Li and Min Chen \"Software-Defined Network Function Virtualization: A Survey \" in IEEE Access vol. 3 no. pp. 2542--2553 2015.  Yong Li and Min Chen \"Software-Defined Network Function Virtualization: A Survey \" in IEEE Access vol. 3 no. pp. 2542--2553 2015.","DOI":"10.1109\/ACCESS.2015.2499271"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Konglong Tang Yong Wang Hao Liu Yanxiu Sheng Xi Wang Zhiqiang Wei \"Design and Implementation of Push Notification System Based on the MQTT Protocol \" International Conference on Information Science and Computer Applications 2013.  Konglong Tang Yong Wang Hao Liu Yanxiu Sheng Xi Wang Zhiqiang Wei \"Design and Implementation of Push Notification System Based on the MQTT Protocol \" International Conference on Information Science and Computer Applications 2013.","DOI":"10.2991\/isca-13.2013.20"},{"volume-title":"2015 Asia-Pacific Network Operations and Management Symposium (APNOMS).","author":"Kim Taekhee","key":"e_1_3_2_1_11_1"},{"first-page":"80","volume-title":"ON, 2015","author":"Ben-Itzhak Y.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","first-page":"439","volume-title":"2012 International Conference on","author":"Vijayalakshmi M.","year":"2012"},{"key":"e_1_3_2_1_14_1","unstructured":"W. Kinney \"Protecting against application DDoS attacks with BIG-IP ASM: A Three-Step solution \" 2012.  W. Kinney \"Protecting against application DDoS attacks with BIG-IP ASM: A Three-Step solution \" 2012."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.926503"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674984"},{"key":"e_1_3_2_1_18_1","unstructured":"Joao Martins Mohamed Ahmed Costin Raiciu Vladimir Olteanu Michio Honda Roberto Bifulco and Felipe Huici \"ClickOS and the art of network function virtualization.\" In Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation (NSDI). USENIX Association Berkeley CA USA 459--473 2014.   Joao Martins Mohamed Ahmed Costin Raiciu Vladimir Olteanu Michio Honda Roberto Bifulco and Felipe Huici \"ClickOS and the art of network function virtualization.\" In Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation (NSDI). USENIX Association Berkeley CA USA 459--473 2014."},{"key":"e_1_3_2_1_19_1","unstructured":"OpenDaylight project. http:\/\/www.opendaylight.org  OpenDaylight project. http:\/\/www.opendaylight.org"}],"event":{"name":"CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CODASPY '17"},"container-title":["Proceedings of the ACM International Workshop on Security in Software Defined Networks &amp; Network Function Virtualization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3040992.3041005","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3040992.3041005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:58Z","timestamp":1750273498000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3040992.3041005"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,24]]},"references-count":18,"alternative-id":["10.1145\/3040992.3041005","10.1145\/3040992"],"URL":"https:\/\/doi.org\/10.1145\/3040992.3041005","relation":{},"subject":[],"published":{"date-parts":[[2017,3,24]]},"assertion":[{"value":"2017-03-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}