{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:12Z","timestamp":1750219752601,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3615366.3625070","type":"proceedings-article","created":{"date-parts":[[2023,10,17]],"date-time":"2023-10-17T18:17:34Z","timestamp":1697566654000},"page":"192-195","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Identification of High Delay Links in Internet Service Providers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-3120-6507","authenticated-orcid":false,"given":"Francisco Valderlan","family":"Nobre","sequence":"first","affiliation":[{"name":"State Univerisity of Ceara (UECE), Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5963-8012","authenticated-orcid":false,"given":"Danielle","family":"Santos","sequence":"additional","affiliation":[{"name":"State Univerisity of Ceara (UECE), Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8876-5926","authenticated-orcid":false,"given":"Silvio","family":"Ribeiro","sequence":"additional","affiliation":[{"name":"State Univerisity of Ceara (UECE), Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7749-6559","authenticated-orcid":false,"given":"Maria","family":"Mesquita","sequence":"additional","affiliation":[{"name":"State Univerisity of Ceara (UECE), Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7922-0695","authenticated-orcid":false,"given":"Rafael Lopes","family":"Gomes","sequence":"additional","affiliation":[{"name":"State Univerisity of Ceara (UECE), Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7064-9452","authenticated-orcid":false,"given":"Thelmo","family":"Ara\u00fajo","sequence":"additional","affiliation":[{"name":"State Univerisity of Ceara (UECE), Brazil"}]}],"member":"320","published-online":{"date-parts":[[2023,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Fast and efficient algorithm for delay-sensitive QoS provisioning in SDN networks. Wireless Networks","author":"BinSahaq Ahmed","year":"2022","unstructured":"Ahmed BinSahaq , Tarek Sheltami , Ashraf Mahmoud , and Nidal Nasser . 2022. Fast and efficient algorithm for delay-sensitive QoS provisioning in SDN networks. Wireless Networks ( 2022 ), 1\u201322. Ahmed BinSahaq, Tarek Sheltami, Ashraf Mahmoud, and Nidal Nasser. 2022. Fast and efficient algorithm for delay-sensitive QoS provisioning in SDN networks. Wireless Networks (2022), 1\u201322."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/LATINCOM50620.2020.9282265"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000753"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444815"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/LatinCOM.2011.6107410"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.008"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.frl.2014.12.005"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.11.032"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487862"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369449"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219550"},{"key":"e_1_3_2_1_12_1","volume-title":"Cyber Threat Analysis Using Pearson and Spearman Correlation Via Exploratory Data Analysis. In 2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC). 257\u2013262","author":"Pires Samara","year":"2023","unstructured":"Samara Pires and Cynthia Mascarenhas . 2023 . Cyber Threat Analysis Using Pearson and Spearman Correlation Via Exploratory Data Analysis. In 2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC). 257\u2013262 . https:\/\/doi.org\/10.1109\/ICSCCC58608.2023.10176973 10.1109\/ICSCCC58608.2023.10176973 Samara Pires and Cynthia Mascarenhas. 2023. Cyber Threat Analysis Using Pearson and Spearman Correlation Via Exploratory Data Analysis. In 2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC). 257\u2013262. https:\/\/doi.org\/10.1109\/ICSCCC58608.2023.10176973"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3300151"}],"event":{"name":"LADC 2023: 12th Latin-American Symposium on Dependable and Secure Computing","acronym":"LADC 2023","location":"La Paz Bolivia"},"container-title":["12th Latin-American Symposium on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3615366.3625070","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3615366.3625070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:54Z","timestamp":1750178214000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3615366.3625070"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":13,"alternative-id":["10.1145\/3615366.3625070","10.1145\/3615366"],"URL":"https:\/\/doi.org\/10.1145\/3615366.3625070","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}