{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:47Z","timestamp":1750221287263,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T00:00:00Z","timestamp":1522627200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DFG","award":["KO 3445\/16-1"],"award-info":[{"award-number":["KO 3445\/16-1"]}]},{"name":"German Research Foundation (DFG)","award":["KO 3445\/15-1"],"award-info":[{"award-number":["KO 3445\/15-1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,2]]},"DOI":"10.1145\/3185768.3186309","type":"proceedings-article","created":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T12:47:13Z","timestamp":1523278033000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["The Vision of Self-aware Reordering of Security Network Function Chains"],"prefix":"10.1145","author":[{"given":"Lukas","family":"Iffl\u00e4nder","sequence":"first","affiliation":[{"name":"University of W\u00fcrzburg, W\u00fcrzburg, Germany"}]},{"given":"J\u00fcrgen","family":"Walter","sequence":"additional","affiliation":[{"name":"University of W\u00fcrzburg, W\u00fcrzburg, Germany"}]},{"given":"Simon","family":"Eismann","sequence":"additional","affiliation":[{"name":"University of W\u00fcrzburg, W\u00fcrzburg, Germany"}]},{"given":"Samuel","family":"Kounev","sequence":"additional","affiliation":[{"name":"University of W\u00fcrzburg, W\u00fcrzburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,4,2]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/3150928.3150967"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1007\/978-3-319-47474-8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/TNSM.2016.2598068"},{"key":"e_1_3_2_1_4_1","first-page":"62","volume-title":"Optimal Service Function Chain Composition in Network Functions Virtualization","author":"Ocampo A. F.","year":"2017","unstructured":"A. F. Ocampo , J. Gil-Herrera , P. H. Isolani , M. C. Neves , J. F. Botero , S. Latr\u00e9 , L. Zambenedetti , M. P. Barcellos , and L. P. Gaspary . Optimal Service Function Chain Composition in Network Functions Virtualization , pages 62 -- 76 . Springer International Publishing , Cham , 2017 . A. F. Ocampo, J. Gil-Herrera, P. H. Isolani, M. C. Neves, J. F. Botero, S. Latr\u00e9, L. Zambenedetti, M. P. Barcellos, and L. P. Gaspary. Optimal Service Function Chain Composition in Network Functions Virtualization, pages 62--76. Springer International Publishing, Cham, 2017."},{"key":"e_1_3_2_1_5_1","first-page":"66","volume-title":"Proceedings of the Ninth International Conference on Simulation Tools and Techniques (SIMUTools 2016","author":"Rygielski P.","year":"2016","unstructured":"P. Rygielski , M. Seliuchenko , and S. Kounev . Modeling and Prediction of Software-Defined Networks Performance using Queueing Petri Nets . In Proceedings of the Ninth International Conference on Simulation Tools and Techniques (SIMUTools 2016 ), pages 66 -- 75 , August 2016 . P. Rygielski, M. Seliuchenko, and S. Kounev. Modeling and Prediction of Software-Defined Networks Performance using Queueing Petri Nets. In Proceedings of the Ninth International Conference on Simulation Tools and Techniques (SIMUTools 2016), pages 66--75, August 2016."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/2851553.2851570"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/MCSE.2017.29"},{"issue":"3","key":"e_1_3_2_1_8_1","first-page":"251","article-title":"False positive decrement for snort intrusion detection","volume":"36","author":"Lertwatechakul S.","year":"2012","unstructured":"S. Thian-ngam and M. Lertwatechakul . False positive decrement for snort intrusion detection . Engineering and Applied Science Research , 36 ( 3 ): 251 -- 259 , 2012 . S. Thian-ngam and M. Lertwatechakul. False positive decrement for snort intrusion detection. Engineering and Applied Science Research, 36(3):251--259, 2012.","journal-title":"Engineering and Applied Science Research"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/3053600.3053634"}],"event":{"sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGSOFT ACM Special Interest Group on Software Engineering"],"acronym":"ICPE '18","name":"ICPE '18: ACM\/SPEC International Conference on Performance Engineering","location":"Berlin Germany"},"container-title":["Companion of the 2018 ACM\/SPEC International Conference on Performance Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3185768.3186309","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3185768.3186309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:27Z","timestamp":1750212687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3185768.3186309"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,2]]},"references-count":9,"alternative-id":["10.1145\/3185768.3186309","10.1145\/3185768"],"URL":"https:\/\/doi.org\/10.1145\/3185768.3186309","relation":{},"subject":[],"published":{"date-parts":[[2018,4,2]]},"assertion":[{"value":"2018-04-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}