{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:25Z","timestamp":1750220845216,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T00:00:00Z","timestamp":1573689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,14]]},"DOI":"10.1145\/3360664.3360676","type":"proceedings-article","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T15:44:57Z","timestamp":1571845497000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Network Forensic Investigation in OpenContrail Environments"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Heckel","sequence":"first","affiliation":[{"name":"FernUniversit\u00e4t Hagen, Hagen, Germany"}]},{"given":"Daniel","family":"Spiekermann","sequence":"additional","affiliation":[{"name":"FernUniversit\u00e4t Hagen, Hagen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Energy Sciences Network. 2018. What is iPerf \/ iPerf3? https:\/\/iperf.fr  Energy Sciences Network. 2018. What is iPerf \/ iPerf3? https:\/\/iperf.fr"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Rob Enns Martin Bjorklund Andy Bierman and Jurgen Schonwalder. 2011. Network Configuration Protocol (NETCONF). RFC 6241.  Rob Enns Martin Bjorklund Andy Bierman and Jurgen Schonwalder. 2011. Network Configuration Protocol (NETCONF). RFC 6241.","DOI":"10.17487\/rfc6241"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602219"},{"key":"e_1_3_2_1_4_1","unstructured":"Armstrong Tita Foundjem. 2017. Towards Improving the Reliability of Live Migration Operations in Openstack Clouds. Ph.D. Dissertation. \u00c9cole Polytechnique de Montr\u00e9al.  Armstrong Tita Foundjem. 2017. Towards Improving the Reliability of Live Migration Operations in Openstack Clouds. Ph.D. Dissertation. \u00c9cole Polytechnique de Montr\u00e9al."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.4018\/jdcf.2012040103"},{"key":"e_1_3_2_1_6_1","unstructured":"Hetzner Online GmbH. 2018. Homepage. https:\/\/www.hetzner.de\/  Hetzner Online GmbH. 2018. Homepage. https:\/\/www.hetzner.de\/"},{"key":"e_1_3_2_1_7_1","unstructured":"Juniper Networks Inc. 2012. Portfolio. https:\/\/www.juniper.net\/de\/de\/company\/investments\/portfolio  Juniper Networks Inc. 2012. Portfolio. https:\/\/www.juniper.net\/de\/de\/company\/investments\/portfolio"},{"key":"e_1_3_2_1_8_1","unstructured":"Juniper Networks Inc. 2017. Contrail Tops SDN Controller Evaluations! https:\/\/forums.juniper.net\/t5\/Enterprise-Cloud-and\/Contrail-Tops-SDN-Controller-Evaluations\/ba-p\/303181  Juniper Networks Inc. 2017. Contrail Tops SDN Controller Evaluations! https:\/\/forums.juniper.net\/t5\/Enterprise-Cloud-and\/Contrail-Tops-SDN-Controller-Evaluations\/ba-p\/303181"},{"key":"e_1_3_2_1_9_1","unstructured":"Juniper Networks Inc. 2018. Ansible deployment for contrail. https:\/\/github.com\/Juniper\/contrail-ansible-deployer  Juniper Networks Inc. 2018. Ansible deployment for contrail. https:\/\/github.com\/Juniper\/contrail-ansible-deployer"},{"key":"e_1_3_2_1_10_1","unstructured":"Juniper Networks Inc. 2018. Homepage. https:\/\/www.juniper.net\/  Juniper Networks Inc. 2018. Homepage. https:\/\/www.juniper.net\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Peter M. Mell and Timothy Grance. 2011. SP 800-145. The NIST Definition of Cloud Computing. Technical Report. Gaithersburg MD United States.  Peter M. Mell and Timothy Grance. 2011. SP 800-145. The NIST Definition of Cloud Computing. Technical Report. Gaithersburg MD United States.","DOI":"10.6028\/NIST.SP.800-145"},{"volume-title":"First Digital Forensic Research Workshop","year":"2001","author":"Palmer Gary","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5120\/251-408"},{"key":"e_1_3_2_1_14_1","unstructured":"RCRWireless News. 2018. Juniper OpenContrail evolves into the Linux Foundation's Tungsten Fabric. https:\/\/www.rcrwireless.com\/20180403\/juniper-opencontrail-evolves-into-the-linux-foundations-tungsten-fabric-tag27  RCRWireless News. 2018. Juniper OpenContrail evolves into the Linux Foundation's Tungsten Fabric. https:\/\/www.rcrwireless.com\/20180403\/juniper-opencontrail-evolves-into-the-linux-foundations-tungsten-fabric-tag27"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Yakov Rekhter Susan Hares and Tony Li. 2006. A Border Gateway Protocol 4 (BGP-4). RFC 4271.  Yakov Rekhter Susan Hares and Tony Li. 2006. A Border Gateway Protocol 4 (BGP-4). RFC 4271.","DOI":"10.17487\/rfc4271"},{"volume-title":"Proceedings of the Conference on Digital Forensics, Security and Law. Association of Digital Forensics, Security and Law, 55","year":"2011","author":"Ruan Keyun","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24212-0_3"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Peter Saint-Andre. 2011. Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence. RFC 6121. https:\/\/rfc-editor.org\/rfc\/rfc6121.txt  Peter Saint-Andre. 2011. Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence. RFC 6121. https:\/\/rfc-editor.org\/rfc\/rfc6121.txt","DOI":"10.17487\/rfc6121"},{"volume-title":"Cloud Forensics: Identifying the Major Issues and Challenges. In International Conference on Advanced Information Systems Engineering. Springer, 271--284","year":"2014","author":"Simou Stavros","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5769\/J201501002"},{"key":"e_1_3_2_1_21_1","unstructured":"Daniel Spiekermann. 2017. Netzwerkforensik in virtuellen Umgebungen. Ph.D. Dissertation. FernUniversit\u00e4t Hagen.  Daniel Spiekermann. 2017. Netzwerkforensik in virtuellen Umgebungen. Ph.D. Dissertation. FernUniversit\u00e4t Hagen."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.522"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.34"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2015.7237027"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.01.007"},{"volume-title":"INFORMATIK","year":"2017","author":"Spiekermann Daniel","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","unstructured":"Tungsten Fabric. 2018. Homepage. https:\/\/tungsten.io\/  Tungsten Fabric. 2018. Homepage. https:\/\/tungsten.io\/"},{"key":"e_1_3_2_1_28_1","unstructured":"Amos Waterland. 2018. stress Homepage. https:\/\/people.seas.harvard.edu\/~apw\/stress\/  Amos Waterland. 2018. stress Homepage. https:\/\/people.seas.harvard.edu\/~apw\/stress\/"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsit.2011.3302"},{"volume-title":"Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems. Computing Research Repository abs\/1302.6312","year":"2013","author":"Zawoad Shams","key":"e_1_3_2_1_30_1"}],"event":{"name":"CECC 2019: Central European Cybersecurity Conference","sponsor":["University of Maribor"],"location":"Munich Germany","acronym":"CECC 2019"},"container-title":["Proceedings of the Third Central European Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360664.3360676","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3360664.3360676","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:00Z","timestamp":1750202580000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360664.3360676"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,14]]},"references-count":30,"alternative-id":["10.1145\/3360664.3360676","10.1145\/3360664"],"URL":"https:\/\/doi.org\/10.1145\/3360664.3360676","relation":{},"subject":[],"published":{"date-parts":[[2019,11,14]]},"assertion":[{"value":"2019-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}