{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T17:59:21Z","timestamp":1770832761213,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T00:00:00Z","timestamp":1723680000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,15]]},"DOI":"10.1145\/3685323.3685331","type":"proceedings-article","created":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T18:58:31Z","timestamp":1723575511000},"page":"32-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Connection Management Using Automated Firewall Based on Threat Intelligence"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-9473-6003","authenticated-orcid":false,"given":"Marcus A.","family":"Costa","sequence":"first","affiliation":[{"name":"State University of Cear\u00e1 (UECE), Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6062-8118","authenticated-orcid":false,"given":"Yago M.","family":"Costa","sequence":"additional","affiliation":[{"name":"State University of Cear\u00e1 (UECE), Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3987-423X","authenticated-orcid":false,"given":"Yanne O.","family":"Almeida","sequence":"additional","affiliation":[{"name":"State University of Cear\u00e1 (UECE), Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2687-6450","authenticated-orcid":false,"given":"Francisco J.","family":"Cardoso","sequence":"additional","affiliation":[{"name":"State University of Cear\u00e1 (UECE), Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7922-0695","authenticated-orcid":false,"given":"Rafael L.","family":"Gomes","sequence":"additional","affiliation":[{"name":"State University of Cear\u00e1 (UECE), Brazil"}]}],"member":"320","published-online":{"date-parts":[[2024,8,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2966760"},{"key":"e_1_3_2_1_2_1","first-page":"491","article-title":"Features-aware ddos detection in heterogeneous smart environments based on fog and cloud computing","volume":"13","author":"Costa L","year":"2021","unstructured":"Wanderson\u00a0L Costa, Ariel\u00a0LC Portela, and Rafael\u00a0L Gomes. 2021. Features-aware ddos detection in heterogeneous smart environments based on fog and cloud computing. International Journal of Communication Networks and Information Security 13, 3 (2021), 491\u2013498.","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/LATINCOM50620.2020.9282265"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/GCCT.2015.7342657"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179467"},{"key":"e_1_3_2_1_6_1","first-page":"953","article-title":"Network Structures and Network Effects Across Management and Policy Contexts","volume":"101","author":"Hu Qian","year":"2023","unstructured":"Qian Hu, Alejandra Medina, Michael\u00a0D Siciliano, and Weijie Wang. 2023. Network Structures and Network Effects Across Management and Policy Contexts: A Systematic Review. Public Administration 101, 3 (2023), 953\u2013972.","journal-title":"A Systematic Review. Public Administration"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Dan Komosny. 2023. Evidential Value of Country Location Evidence Obtained from IP Address Geolocation.PeerJ Comput Sci. (2023).","DOI":"10.7717\/peerj-cs.1305"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3066957"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2012.6222579"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS56928.2023.10154276"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587342"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.22146\/jise.v3i1.3978"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS56928.2023.10154280"},{"key":"e_1_3_2_1_14_1","first-page":"1","article-title":"Human-as-a-security-sensor for Harvesting Threat Intelligence","volume":"2","author":"Vielberth Manfred","year":"2019","unstructured":"Manfred Vielberth, Florian Menges, and G\u00fcnther Pernul. 2019. Human-as-a-security-sensor for Harvesting Threat Intelligence. Cybersecurity 2 (2019), 1\u201315.","journal-title":"Cybersecurity"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings, Part II 20","author":"Wang Qing","year":"2020","unstructured":"Qing Wang, Linyu Li, Bo Jiang, Zhigang Lu, Junrong Liu, and Shijie Jian. 2020. Malicious Domain Detection Based on k-means and Smote. In Computational Science\u2013ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, June 3\u20135, 2020, Proceedings, Part II 20. Springer, 468\u2013481."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Mukesh Yadav and Dhirendra\u00a0S Mishra. 2023. Identification of Network Threats Using Live Log Stream Analysis. In 2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems Machine Learning and Signal Processing (PCEMS). 1\u20136.","DOI":"10.1109\/PCEMS58491.2023.10136070"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3064561"}],"event":{"name":"LANC 2024: 2024 Latin America Networking Conference","location":"Bahia Blanca Argentina","acronym":"LANC 2024"},"container-title":["Proceedings of the 2024 Latin America Networking Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3685323.3685331","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3685323.3685331","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T20:32:06Z","timestamp":1755981126000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3685323.3685331"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,15]]},"references-count":17,"alternative-id":["10.1145\/3685323.3685331","10.1145\/3685323"],"URL":"https:\/\/doi.org\/10.1145\/3685323.3685331","relation":{},"subject":[],"published":{"date-parts":[[2024,8,15]]},"assertion":[{"value":"2024-08-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}