{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:20Z","timestamp":1750220900824,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T00:00:00Z","timestamp":1575590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,6]]},"DOI":"10.1145\/3374587.3374614","type":"proceedings-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T18:16:31Z","timestamp":1583345791000},"page":"245-251","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting and Resolving Flow Entries Collisions in Software Defined Networks"],"prefix":"10.1145","author":[{"given":"Guangyu","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, University of Science and Technology of China, China, Hefei, Anhui, P.R. China"}]},{"given":"Shaoyin","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, University of Science and Technology of China, China, Hefei, Anhui, P.R. China"}]},{"given":"Xiang","family":"Song","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, University of Science and Technology of China, China, Hefei, Anhui, P.R. China"}]},{"given":"Fan","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, University of Science and Technology of China, China, Hefei, Anhui, P.R. China"}]}],"member":"320","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"issue":"4","key":"e_1_3_2_1_2_1","first-page":"3","article-title":"B4: Experience with a globally-deployed software defined WAN[C]\/\/ACM SIGCOMM Computer Communication Review","volume":"43","author":"Jain S","year":"2013","unstructured":"Jain S , Kumar A , Mandal S , B4: Experience with a globally-deployed software defined WAN[C]\/\/ACM SIGCOMM Computer Communication Review . ACM , 2013 , 43 ( 4 ): 3 -- 14 . Jain S, Kumar A, Mandal S, et al. B4: Experience with a globally-deployed software defined WAN[C]\/\/ACM SIGCOMM Computer Communication Review. ACM, 2013, 43(4): 3--14.","journal-title":"ACM"},{"key":"e_1_3_2_1_3_1","first-page":"2211","article-title":"Traffic engineering in software defined networks[C]\/\/2013 Proceedings IEEE INFOCOM","volume":"2013","author":"Agarwal S","unstructured":"Agarwal S , Kodialam M , Lakshman T V . Traffic engineering in software defined networks[C]\/\/2013 Proceedings IEEE INFOCOM . IEEE , 2013 : 2211 -- 2219 . Agarwal S, Kodialam M, Lakshman T V. Traffic engineering in software defined networks[C]\/\/2013 Proceedings IEEE INFOCOM. IEEE, 2013: 2211--2219.","journal-title":"IEEE"},{"key":"e_1_3_2_1_4_1","first-page":"12","article-title":"OpenFlow-Based Server Load Balancing Gone Wild[J]","volume":"11","author":"Wang R","year":"2011","unstructured":"Wang R , Butnariu D , Rexford J . OpenFlow-Based Server Load Balancing Gone Wild[J] . Hot-ICE , 2011 , 11 : 12 -- 12 . Wang R, Butnariu D, Rexford J. OpenFlow-Based Server Load Balancing Gone Wild[J]. Hot-ICE, 2011, 11: 12--12.","journal-title":"Hot-ICE"},{"issue":"4","key":"e_1_3_2_1_5_1","first-page":"254","article-title":"DevoFlow: Scaling flow management for high-performance networks[C]\/\/ACM SIGCOMM Computer Communication Review","volume":"41","author":"Curtis A R","year":"2011","unstructured":"Curtis A R , Mogul J C , Tourrilhes J , DevoFlow: Scaling flow management for high-performance networks[C]\/\/ACM SIGCOMM Computer Communication Review . ACM , 2011 , 41 ( 4 ): 254 -- 265 . Curtis A R, Mogul J C, Tourrilhes J, et al. DevoFlow: Scaling flow management for high-performance networks[C]\/\/ACM SIGCOMM Computer Communication Review. ACM, 2011, 41(4): 254--265.","journal-title":"ACM"},{"key":"e_1_3_2_1_6_1","volume-title":"Multiple service load-balancing with OpenFlow[C]\/\/2012 IEEE 13th International Conference on High Performance Switching and Routing","author":"Koerner M","year":"2012","unstructured":"Koerner M , Kao O. Multiple service load-balancing with OpenFlow[C]\/\/2012 IEEE 13th International Conference on High Performance Switching and Routing . IEEE , 2012 : 210--214. Koerner M, Kao O. Multiple service load-balancing with OpenFlow[C]\/\/2012 IEEE 13th International Conference on High Performance Switching and Routing. IEEE, 2012: 210--214."},{"key":"e_1_3_2_1_7_1","first-page":"2018","article-title":"A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN[J]","author":"Cheng H","year":"2018","unstructured":"Cheng H , Liu J , Mao J , A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN[J] . Security and Communication Networks , 2018 , 2018 . Cheng H, Liu J, Mao J, et al. A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN[J]. Security and Communication Networks, 2018, 2018.","journal-title":"Security and Communication Networks"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.04.002"},{"key":"e_1_3_2_1_9_1","volume-title":"Lee P P C, et al. Security Policy Violations in SDN Data Plane[J]","author":"Li Q","year":"2018","unstructured":"Li Q , Chen Y , Lee P P C, et al. Security Policy Violations in SDN Data Plane[J] . IEEE\/ACM Transactions on Networking (TON) , 2018 , 26(4): 1715--1727. Li Q, Chen Y, Lee P P C, et al. Security Policy Violations in SDN Data Plane[J]. IEEE\/ACM Transactions on Networking (TON), 2018, 26(4): 1715--1727."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.09.016"},{"key":"e_1_3_2_1_11_1","unstructured":"An Innovative Combination of Standards and Open Source Software https:\/\/www.opennetworking.org\/software-defined-standards\/overview\/  An Innovative Combination of Standards and Open Source Software https:\/\/www.opennetworking.org\/software-defined-standards\/overview\/"},{"volume-title":"ACM","author":"Porras P","key":"e_1_3_2_1_12_1","unstructured":"Porras P , Shin S , Yegneswaran V , A security enforcement kernel for OpenFlow networks[C]\/\/Proceedings of the first workshop on Hot topics in software defined networks . ACM , 2012: 121--126. Porras P, Shin S, Yegneswaran V, et al. A security enforcement kernel for OpenFlow networks[C]\/\/Proceedings of the first workshop on Hot topics in software defined networks. ACM, 2012: 121--126."},{"key":"e_1_3_2_1_13_1","unstructured":"Ryu SDN Framework http:\/\/osrg.github.io\/ryu\/  Ryu SDN Framework http:\/\/osrg.github.io\/ryu\/"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Son S Shin S Yegneswaran V etal Model checking invariant security properties in OpenFlow[C]\/\/ICC. 2013: 1974--1979.  Son S Shin S Yegneswaran V et al. Model checking invariant security properties in OpenFlow[C]\/\/ICC. 2013: 1974--1979.","DOI":"10.1109\/ICC.2013.6654813"},{"key":"e_1_3_2_1_15_1","first-page":"1","article-title":"Rule anomalies detecting and resolving for software defined networks[C]\/\/2015 IEEE Global Communications Conference (GLOBECOM)","volume":"2015","author":"Wang P","unstructured":"Wang P , Huang L , Xu H , Rule anomalies detecting and resolving for software defined networks[C]\/\/2015 IEEE Global Communications Conference (GLOBECOM) . IEEE , 2015 : 1 -- 6 . Wang P, Huang L, Xu H, et al. Rule anomalies detecting and resolving for software defined networks[C]\/\/2015 IEEE Global Communications Conference (GLOBECOM). IEEE, 2015: 1--6.","journal-title":"IEEE"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2004.4623689"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.854119"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.20"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.772439"},{"volume-title":"ACM","author":"Fundulaki I","key":"e_1_3_2_1_20_1","unstructured":"Fundulaki I , Marx M. Specifying access control policies for XML documents with XPath[C]\/\/Proceedings of the ninth ACM symposium on Access control models and technologies . ACM , 2004: 61--69. Fundulaki I, Marx M. Specifying access control policies for XML documents with XPath[C]\/\/Proceedings of the ninth ACM symposium on Access control models and technologies. ACM, 2004: 61--69."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601312"}],"event":{"name":"CSAI2019: 2019 3rd International Conference on Computer Science and Artificial Intelligence","sponsor":["Shenzhen University Shenzhen University"],"location":"Normal IL USA","acronym":"CSAI2019"},"container-title":["Proceedings of the 2019 3rd International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374587.3374614","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374587.3374614","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:44Z","timestamp":1750203884000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374587.3374614"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,6]]},"references-count":21,"alternative-id":["10.1145\/3374587.3374614","10.1145\/3374587"],"URL":"https:\/\/doi.org\/10.1145\/3374587.3374614","relation":{},"subject":[],"published":{"date-parts":[[2019,12,6]]},"assertion":[{"value":"2020-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}