{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:45Z","timestamp":1750220865359,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T00:00:00Z","timestamp":1574899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union","award":["780139"],"award-info":[{"award-number":["780139"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,28]]},"DOI":"10.1145\/3368640.3368690","type":"proceedings-article","created":{"date-parts":[[2019,12,5]],"date-time":"2019-12-05T14:07:37Z","timestamp":1575554857000},"page":"43-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Routing policy verification for enhanced energy quality of service and security monitoring in IoT networks"],"prefix":"10.1145","author":[{"given":"Konstantinos","family":"Papachristou","sequence":"first","affiliation":[{"name":"Centre for Research &amp; Technology Hellas, Thessaloniki, Greece"}]},{"given":"Traianos-Ioannis","family":"Theodorou","sequence":"additional","affiliation":[{"name":"Centre for Research &amp; Technology Hellas, Thessaloniki, Greece"}]},{"given":"Stavros","family":"Papadopoulos","sequence":"additional","affiliation":[{"name":"Centre for Research &amp; Technology Hellas, Thessaloniki, Greece"}]},{"given":"Aikaterini","family":"Protogerou","sequence":"additional","affiliation":[{"name":"Centre for Research &amp; Technology Hellas, Thessaloniki, Greece"}]},{"given":"Anastasios","family":"Drosou","sequence":"additional","affiliation":[{"name":"Centre for Research &amp; Technology Hellas, Thessaloniki, Greece"}]},{"given":"Dimitrios","family":"Tzovaras","sequence":"additional","affiliation":[{"name":"Centre for Research &amp; Technology Hellas, Thessaloniki, Greece"}]}],"member":"320","published-online":{"date-parts":[[2019,11,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Reaz Ahmed, and Raouf Boutaba.","author":"Bari Md Faizul","year":"2013","unstructured":"Md Faizul Bari , Shihabur Rahman Chowdhury , Reaz Ahmed, and Raouf Boutaba. 2013 . PolicyCop: An autonomic QoS policy enforcement framework for software defined networks. In IEEE SDN for Future Networks and Services (SDN4FNS). IEEE , 1--7. Md Faizul Bari, Shihabur Rahman Chowdhury, Reaz Ahmed, and Raouf Boutaba. 2013. PolicyCop: An autonomic QoS policy enforcement framework for software defined networks. In IEEE SDN for Future Networks and Services (SDN4FNS). IEEE, 1--7."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2746186"},{"volume-title":"Multi-Objective Optimization Using Evolutionary Algorithms","author":"Deb Kalyanmoy","key":"e_1_3_2_1_3_1","unstructured":"Kalyanmoy Deb and Deb Kalyanmoy . 2001. Multi-Objective Optimization Using Evolutionary Algorithms . John Wiley & Sons, Inc. , New York, NY, USA . Kalyanmoy Deb and Deb Kalyanmoy. 2001. Multi-Objective Optimization Using Evolutionary Algorithms. John Wiley & Sons, Inc., New York, NY, USA."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2437951"},{"key":"e_1_3_2_1_5_1","volume-title":"OpenSec: Policy-based security using software-defined networking","author":"Lara Adrian","year":"2016","unstructured":"Adrian Lara and Byrav Ramamurthy . 2016. OpenSec: Policy-based security using software-defined networking . IEEE transactions on network and service management 13, 1 ( 2016 ), 30--42. Adrian Lara and Byrav Ramamurthy. 2016. OpenSec: Policy-based security using software-defined networking. IEEE transactions on network and service management 13, 1 (2016), 30--42."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.08.019"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140416"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM.2017.8255990"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2453114"},{"key":"e_1_3_2_1_10_1","first-page":"1207","article-title":"Internet of things based smart transportation systems","volume":"2","author":"Sherly J","year":"2015","unstructured":"J Sherly and D Somasundareswari . 2015 . Internet of things based smart transportation systems . International Research Journal of Engineering and Technology 2 , 7 (2015), 1207 -- 1210 . J Sherly and D Somasundareswari. 2015. Internet of things based smart transportation systems. International Research Journal of Engineering and Technology 2, 7 (2015), 1207--1210.","journal-title":"International Research Journal of Engineering and Technology"},{"key":"e_1_3_2_1_11_1","volume-title":"Vijay Varadharajan, Uday Tupakula, and Shui Yu.","author":"Sood Keshav","year":"2019","unstructured":"Keshav Sood , Kallol Krishna Karmakar , Vijay Varadharajan, Uday Tupakula, and Shui Yu. 2019 . Analysis of Policy-based Security Management System in Software-defined Networks. IEEE Communications Letters ( 2019). Keshav Sood, Kallol Krishna Karmakar, Vijay Varadharajan, Uday Tupakula, and Shui Yu. 2019. Analysis of Policy-based Security Management System in Software-defined Networks. IEEE Communications Letters (2019)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9489-2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"}],"event":{"name":"PCI '19: 23rd Pan-Hellenic Conference on Informatics","acronym":"PCI '19","location":"Nicosia Cyprus"},"container-title":["Proceedings of the 23rd Pan-Hellenic Conference on Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368640.3368690","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368640.3368690","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:43Z","timestamp":1750202623000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368640.3368690"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,28]]},"references-count":14,"alternative-id":["10.1145\/3368640.3368690","10.1145\/3368640"],"URL":"https:\/\/doi.org\/10.1145\/3368640.3368690","relation":{},"subject":[],"published":{"date-parts":[[2019,11,28]]},"assertion":[{"value":"2019-11-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}