{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:20:46Z","timestamp":1725744046231},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.23919\/apnoms.2019.8893030","type":"proceedings-article","created":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T12:43:46Z","timestamp":1573649026000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Hybrid Controller for Securing SDN from Switched DDoS and ARP Poisoning Attacks"],"prefix":"10.23919","author":[{"given":"Teerapat","family":"Sanguankotchakorn","sequence":"first","affiliation":[]},{"given":"Shiva Kumar","family":"Arugonda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524500"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254079"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2011.6089085"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535411"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2011.6013582"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCT.2015.98"},{"key":"ref6","first-page":"1","article-title":"DDoS attack and defence mechanism: A classification","author":"mitrocotsa","year":"2013","journal-title":"3rd Signal processing and information technology"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120048"},{"key":"ref8","first-page":"1","article-title":"DDoS attack detection under SDN context","author":"wang","year":"2015","journal-title":"In Icomputer networks 2015"},{"key":"ref7","first-page":"5","article-title":"Implementation of Content-Oriented Networking Architecture (CONA): A Focus on DDoS Countermeasure","author":"suh","year":"0","journal-title":"2010 proceedings of 1st European netf-pga developers"},{"key":"ref2","first-page":"385","article-title":"A Novel Design for future On-Demand Service and Security","author":"hunag","year":"0","journal-title":"2010 IEEE 12th International Conference on Communication Technology"},{"journal-title":"Mitigation ARP Spoofing Attacks in Software-Defined Networks","year":"2015","author":"abdelsalam","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.389"}],"event":{"name":"2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS)","start":{"date-parts":[[2019,9,18]]},"location":"Matsue, Japan","end":{"date-parts":[[2019,9,20]]}},"container-title":["2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8886548\/8892835\/08893030.pdf?arnumber=8893030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T23:32:23Z","timestamp":1598225543000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8893030\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.23919\/apnoms.2019.8893030","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}