{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:46:37Z","timestamp":1725518797143},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.23919\/cnsm46954.2019.9012668","type":"proceedings-article","created":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T04:56:25Z","timestamp":1582865785000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions"],"prefix":"10.23919","author":[{"given":"Hoang Long","family":"Mai","sequence":"first","affiliation":[]},{"given":"Guillaume","family":"Doyen","sequence":"additional","affiliation":[]},{"given":"Wissam","family":"Mallouli","sequence":"additional","affiliation":[]},{"given":"Edgardo Montes","family":"de Oca","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Festor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Python library for probabilistic graphical models","year":"0","key":"ref31"},{"journal-title":"Picn Python icn and nfn by university of basel","year":"0","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PV.2013.6691449"},{"key":"ref11","article-title":"Innetwork live stream processing with named functions","author":"scherb","year":"2017","journal-title":"Workshop on Information-Centric Fog Computing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3125719.3125735"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2984356.2984366"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3125719.3125736"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3125719.3125727"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2654119"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3098208.3098210"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038469"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2015.7157985"},{"key":"ref28","first-page":"1","article-title":"Implementation of content poisoning attack detection and reaction in virtualized NDN networks","year":"2018","journal-title":"2018 21st Conference on Innovation in Clouds Internet and Networks and Workshops (ICIN)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2014.6940518"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.278"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660150"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2006.301508"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406246"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701135"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3061"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.043"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10990-007-9018-9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISSC.2016.7528464"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2017.7993754"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502908"},{"key":"ref24","first-page":"249","article-title":"Energy efficient context based forwarding strategy in named data networking of things","author":"jsm","year":"2016","journal-title":"Proceedings of ACM Information Centric Networking Conference"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2984356.2984379"},{"key":"ref26","article-title":"Belief propagation by message passing in junction trees: Computing each message faster using gpu parallelization","author":"zheng","year":"2012","journal-title":"arXiv preprint arXiv 1202 3777"},{"journal-title":"Probabilistic Graphical Models Principles and Techniques","year":"2009","author":"koller","key":"ref25"}],"event":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2019,10,21]]},"location":"Halifax, NS, Canada","end":{"date-parts":[[2019,10,25]]}},"container-title":["2019 15th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8977268\/9012657\/09012668.pdf?arnumber=9012668","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T23:55:52Z","timestamp":1586476552000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9012668\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.23919\/cnsm46954.2019.9012668","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}