{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T08:06:57Z","timestamp":1777363617869,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,8,16]],"date-time":"2013-08-16T00:00:00Z","timestamp":1376611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,8,16]]},"DOI":"10.1145\/2491185.2491199","type":"proceedings-article","created":{"date-parts":[[2013,8,20]],"date-time":"2013-08-20T14:07:21Z","timestamp":1377007641000},"page":"55-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":522,"title":["Towards secure and dependable software-defined networks"],"prefix":"10.1145","author":[{"given":"Diego","family":"Kreutz","sequence":"first","affiliation":[{"name":"University of Lisbon, Lisbon, Portugal"}]},{"given":"Fernando M.V.","family":"Ramos","sequence":"additional","affiliation":[{"name":"University of Lisbon, Lisbon, Portugal"}]},{"given":"Paulo","family":"Verissimo","sequence":"additional","affiliation":[{"name":"University of Lisbon, Lisbon, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2013,8,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Onix: a distributed control platform for large-scale production networks","author":"Koponen T.","year":"2010","unstructured":"T. Koponen \" Onix: a distributed control platform for large-scale production networks \". In : OSDI. 2010 . T. Koponen et al. \"Onix: a distributed control platform for large-scale production networks\". In: OSDI. 2010."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384625"},{"key":"e_1_3_2_1_3_1","volume-title":"Design and implementation of a routing control platform","author":"Caesar M.","year":"2005","unstructured":"M. Caesar \" Design and implementation of a routing control platform \". In : NSDI. 2005 . M. Caesar et al. \"Design and implementation of a routing control platform\". In: NSDI. 2005."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2026415"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342466"},{"key":"e_1_3_2_1_6_1","volume-title":"FRESCO: Modular Composable Security Services for Software-Defined Networks","author":"Shin S.","year":"2013","unstructured":"S. Shin \" FRESCO: Modular Composable Security Services for Software-Defined Networks \". In : Internet Society NDSS. 2013 . S. Shin et al. \"FRESCO: Modular Composable Security Services for Software-Defined Networks\". In: Internet Society NDSS. 2013."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_1_8_1","volume-title":"Security implications of software-defined networks","author":"Sorensen S.","year":"2012","unstructured":"S. Sorensen . Security implications of software-defined networks . 2012 . url: http:\/\/goo.gl\/BiXH2. S. Sorensen. Security implications of software-defined networks. 2012. url: http:\/\/goo.gl\/BiXH2."},{"key":"e_1_3_2_1_9_1","volume-title":"Is SDN Secure?","author":"Kerner S. M.","year":"2013","unstructured":"S. M. Kerner . Is SDN Secure? 2013 . url: http:\/\/goo.gl\/lPn2V. S. M. Kerner. Is SDN Secure? 2013. url: http:\/\/goo.gl\/lPn2V."},{"key":"e_1_3_2_1_10_1","volume-title":"The Real Story of Stuxnet","author":"Kushner D.","year":"2013","unstructured":"D. Kushner . The Real Story of Stuxnet . 2013 . url: http:\/\/goo.gl\/HIEHQ. D. Kushner. The Real Story of Stuxnet. 2013. url: http:\/\/goo.gl\/HIEHQ."},{"key":"e_1_3_2_1_11_1","volume-title":"Network Sec.","author":"Tankard C.","year":"2011","unstructured":"C. Tankard . \"Advanced Persistent threats and how to monitor and deter them\". In: Network Sec. ( 2011 ). C. Tankard. \"Advanced Persistent threats and how to monitor and deter them\". In: Network Sec. (2011)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.47"},{"key":"e_1_3_2_1_13_1","volume-title":"Computer Security. LNCS.","author":"Holz R.","year":"2012","unstructured":"R. Holz X. 509 Forensics: Detecting and Localising the SSL\/TLS Men-in-the-Middle \". In: Computer Security. LNCS. 2012 . R. Holz et al. \"X.509 Forensics: Detecting and Localising the SSL\/TLS Men-in-the-Middle\". In: Computer Security. LNCS. 2012."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382204"},{"key":"e_1_3_2_1_15_1","volume-title":"Stanford","author":"Sherwood R.","year":"2009","unstructured":"R. Sherwood : A Network Virtualization Layer. Tech. rep. Deutsche Telekom Inc. R&D Lab , Stanford , Nicira Networks , 2009 . R. Sherwood et al. FlowVisor: A Network Virtualization Layer. Tech. rep. Deutsche Telekom Inc. R&D Lab, Stanford, Nicira Networks, 2009."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460050407"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.83"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.221"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2010.19"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168866"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294269"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.95"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2166776"},{"key":"e_1_3_2_1_25_1","volume-title":"7th USENIX HotSec.","author":"Neti S.","year":"2012","unstructured":"S. Neti , A. Somayaji , and M. E. Locasto . \" Software diversity: Security, Entropy and Game Theory \". In: 7th USENIX HotSec. 2012 . S. Neti, A. Somayaji, and M. E. Locasto. \"Software diversity: Security, Entropy and Game Theory\". In: 7th USENIX HotSec. 2012."},{"key":"e_1_3_2_1_26_1","volume-title":"Software: Practice and Experience","author":"Garcia M.","year":"2013","unstructured":"M. Garcia \" Analysis of operating system diversity for intrusion tolerance \". In: Software: Practice and Experience ( 2013 ). M. Garcia et al. \"Analysis of operating system diversity for intrusion tolerance\". In: Software: Practice and Experience (2013)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342444"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342447"},{"key":"e_1_3_2_1_29_1","volume-title":"The Security Architecture of the Chro-mium Browser. Tech. rep","author":"Barth A.","year":"2008","unstructured":"A. Barth The Security Architecture of the Chro-mium Browser. Tech. rep . Stanford University , 2008 . A. Barth et al. The Security Architecture of the Chro-mium Browser. Tech. rep. Stanford University, 2008."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034574.2034812"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342452"}],"event":{"name":"SIGCOMM'13: ACM SIGCOMM 2013 Conference","location":"Hong Kong China","acronym":"SIGCOMM'13","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2491185.2491199","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2491185.2491199","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:37Z","timestamp":1750235977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2491185.2491199"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,16]]},"references-count":32,"alternative-id":["10.1145\/2491185.2491199","10.1145\/2491185"],"URL":"https:\/\/doi.org\/10.1145\/2491185.2491199","relation":{},"subject":[],"published":{"date-parts":[[2013,8,16]]},"assertion":[{"value":"2013-08-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}