{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T05:46:48Z","timestamp":1751521608179,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1145\/3508072.3508092","type":"proceedings-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T17:01:56Z","timestamp":1649869316000},"page":"119-127","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Two routers network architecture and scheduling algorithms under packet category classification constraint"],"prefix":"10.1145","author":[{"given":"Akram","family":"Sarhan","sequence":"first","affiliation":[{"name":"Department of Information systems, College of Computing and information technology, University of Jeddah, Saudi Arabia"}]},{"given":"Mahdi","family":"Jemmali","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information, College of Science at Zulfi, Majmaah University, Saudi Arabia and University of Sousse, MARS Laboratory, University of Sousse, Tunisia"}]},{"given":"Abir","family":"Ben Hmida","sequence":"additional","affiliation":[{"name":"Department of Information systems, College of Computing and Information Technology at Khulis, University of Jeddah, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"An Optimized and Efficient Routing Protocol Application for IoV. Mathematical Problems in Engineering 2021","author":"Afzal Kiran","year":"2021","unstructured":"Kiran Afzal , Rehan Tariq , Farhan Aadil , Zeshan Iqbal , Nouman Ali , and Muhammad Sajid . 2021. An Optimized and Efficient Routing Protocol Application for IoV. Mathematical Problems in Engineering 2021 ( 2021 ). Kiran Afzal, Rehan Tariq, Farhan Aadil, Zeshan Iqbal, Nouman Ali, and Muhammad Sajid. 2021. An Optimized and Efficient Routing Protocol Application for IoV. Mathematical Problems in Engineering 2021 (2021)."},{"key":"e_1_3_2_1_2_1","unstructured":"Hani Alquhayz and Mahdi Jemmali. 2021. Fixed Urgent Window Pass for a Wireless Network with User Preferences. Wireless Personal Communications(2021) 1\u201327.  Hani Alquhayz and Mahdi Jemmali. 2021. Fixed Urgent Window Pass for a Wireless Network with User Preferences. Wireless Personal Communications(2021) 1\u201327."},{"key":"e_1_3_2_1_3_1","volume-title":"Generic threats to routing protocols. IETF Draft: draft-ietf-rpsec-routing-threats-07","author":"Barbir Abbie","year":"2004","unstructured":"Abbie Barbir , Sandra Murphy , and Yibin Yang . 2004. Generic threats to routing protocols. IETF Draft: draft-ietf-rpsec-routing-threats-07 ( 2004 ). Abbie Barbir, Sandra Murphy, and Yibin Yang. 2004. Generic threats to routing protocols. IETF Draft: draft-ietf-rpsec-routing-threats-07 (2004)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/s140100795"},{"key":"e_1_3_2_1_5_1","volume-title":"A blockchain-based secure routing protocol for opportunistic networks. Journal of Ambient Intelligence and Humanized Computing","author":"Dhurandher K","year":"2021","unstructured":"Sanjay\u00a0 K Dhurandher , Jagdeep Singh , Petros Nicopolitidis , Raghav Kumar , and Geetanshu Gupta . 2021. A blockchain-based secure routing protocol for opportunistic networks. Journal of Ambient Intelligence and Humanized Computing ( 2021 ), 1\u201313. Sanjay\u00a0K Dhurandher, Jagdeep Singh, Petros Nicopolitidis, Raghav Kumar, and Geetanshu Gupta. 2021. A blockchain-based secure routing protocol for opportunistic networks. Journal of Ambient Intelligence and Humanized Computing (2021), 1\u201313."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02014-x"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Qiang Duan and Shangguang Wang. 2017. Network as a service for next generation internet. Institution of Engineering and Technology.  Qiang Duan and Shangguang Wang. 2017. Network as a service for next generation internet. Institution of Engineering and Technology.","DOI":"10.1049\/PBTE073E"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3067106"},{"key":"e_1_3_2_1_9_1","unstructured":"Michael\u00a0R Garey and David\u00a0S Johnson. 1979. Computers and intractability. Vol.\u00a0174. freeman San Francisco.  Michael\u00a0R Garey and David\u00a0S Johnson. 1979. Computers and intractability. Vol.\u00a0174. freeman San Francisco."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0324-5_26"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT-144147971.2020.9213736"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Dalip Kamboj and Pankaj\u00a0Kumar Sehgal. 2011. A Comparative Study of various Secure Routing Protocols based on AODV. IJACSA Editorial (2011).  Dalip Kamboj and Pankaj\u00a0Kumar Sehgal. 2011. A Comparative Study of various Secure Routing Protocols based on AODV. IJACSA Editorial (2011).","DOI":"10.14569\/IJACSA.2011.020712"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCO.2016.7727096"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102266"},{"key":"e_1_3_2_1_15_1","volume-title":"A Survey on Sinkhole Attack in RPL. Annals of the Romanian Society for Cell Biology","author":"Parkavi T","year":"2021","unstructured":"T Parkavi and L Arockiam . 2021. A Survey on Sinkhole Attack in RPL. Annals of the Romanian Society for Cell Biology ( 2021 ), 511\u2013515. T Parkavi and L Arockiam. 2021. A Survey on Sinkhole Attack in RPL. Annals of the Romanian Society for Cell Biology (2021), 511\u2013515."},{"volume-title":"Security in Computing","author":"Pfleeger P","key":"e_1_3_2_1_16_1","unstructured":"Charles\u00a0 P Pfleeger , Shari\u00a0Lawrence Pfleeger , and Jonathan Margulies . 2017. Security in Computing , ProQuest Safari Tech Books Online . Charles\u00a0P Pfleeger, Shari\u00a0Lawrence Pfleeger, and Jonathan Margulies. 2017. Security in Computing, ProQuest Safari Tech Books Online."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.01.019"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/RWS.2012.6175380"},{"key":"e_1_3_2_1_19_1","unstructured":"Akram Sarhan and Leszek Lilien. 2019. An Approach to identity management in clouds without trusted third parties. arXiv preprint arXiv:1904.00880(2019).  Akram Sarhan and Leszek Lilien. 2019. An Approach to identity management in clouds without trusted third parties. arXiv preprint arXiv:1904.00880(2019)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2017.36"},{"key":"e_1_3_2_1_21_1","first-page":"390","article-title":"A Survey on Various Cyber Attacks and their","volume":"15","author":"Uma M","year":"2013","unstructured":"M Uma and Ganapathi Padmavathi . 2013 . A Survey on Various Cyber Attacks and their Classification.Int. J. Netw. Secur. 15 , 5 (2013), 390 \u2013 396 . M Uma and Ganapathi Padmavathi. 2013. A Survey on Various Cyber Attacks and their Classification.Int. J. Netw. Secur. 15, 5 (2013), 390\u2013396.","journal-title":"Classification.Int. J. Netw. Secur."},{"key":"e_1_3_2_1_22_1","unstructured":"George Varghese. 2005. Network Algorithmics: an interdisciplinary approach to designing fast networked devices. Morgan Kaufmann.  George Varghese. 2005. Network Algorithmics: an interdisciplinary approach to designing fast networked devices. Morgan Kaufmann."},{"key":"e_1_3_2_1_23_1","volume-title":"Blockchain Medical Data Sharing. Wireless Blockchain: Principles, Technologies and Applications","author":"Xia Qi","year":"2021","unstructured":"Qi Xia , Jianbin Gao , and Sandro Amofa . 2021. Blockchain Medical Data Sharing. Wireless Blockchain: Principles, Technologies and Applications ( 2021 ). Qi Xia, Jianbin Gao, and Sandro Amofa. 2021. Blockchain Medical Data Sharing. Wireless Blockchain: Principles, Technologies and Applications (2021)."},{"key":"e_1_3_2_1_24_1","unstructured":"William Yurcik Clay Woolam Greg Hellings Latifur Khan and Bhavani Thuraisingham. 2007. Toward trusted sharing of network packet traces using anonymization: Single-field privacy\/analysis tradeoffs. arXiv preprint arXiv:0710.3979(2007).  William Yurcik Clay Woolam Greg Hellings Latifur Khan and Bhavani Thuraisingham. 2007. Toward trusted sharing of network packet traces using anonymization: Single-field privacy\/analysis tradeoffs. arXiv preprint arXiv:0710.3979(2007)."}],"event":{"name":"ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems","acronym":"ICFNDS 2021","location":"Dubai United Arab Emirates"},"container-title":["The 5th International Conference on Future Networks &amp; Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508092","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508072.3508092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:30Z","timestamp":1750191150000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508092"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":24,"alternative-id":["10.1145\/3508072.3508092","10.1145\/3508072"],"URL":"https:\/\/doi.org\/10.1145\/3508072.3508092","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]},"assertion":[{"value":"2022-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}