{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T22:31:38Z","timestamp":1772836298727,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,25]]},"DOI":"10.23919\/cnsm52442.2021.9615598","type":"proceedings-article","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T20:30:34Z","timestamp":1638477034000},"page":"187-193","source":"Crossref","is-referenced-by-count":17,"title":["Link Latency Attack in Software-Defined Networks"],"prefix":"10.23919","author":[{"given":"Sanaz","family":"Soltani","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Shojafar","sequence":"additional","affiliation":[]},{"given":"Habib","family":"Mostafaei","sequence":"additional","affiliation":[]},{"given":"Zahra","family":"Pooranian","sequence":"additional","affiliation":[]},{"given":"Rahim","family":"Tafazolli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00047"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23064"},{"key":"ref12","year":"0","journal-title":"An Instant Virtual Network on Your Laptop"},{"key":"ref13","year":"0","journal-title":"Open sdn controller"},{"key":"ref14","author":"abley","year":"2005","journal-title":"Ipv4 multi-homing practices and limitations"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365865"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230558"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2984088"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354194"},{"key":"ref19","first-page":"228","article-title":"A comparison of outlier detection algorithms for machine learning","author":"escalante","year":"0","journal-title":"Proceedings of the International Conference on Communications in Computing"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23283"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2597193"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366363"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS.2014.7021050"},{"key":"ref8","year":"2021","journal-title":"Software-defined networking market by component (sdn infrastructure software and services) sdn type (open sdn sdn via overlay and sdn via api) end user organization size enterprise vertical and region - global forecast to 2025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3136825.3136881"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref9","year":"2021","journal-title":"Cost of a data breach report 2020"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602219"},{"key":"ref20","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038435"},{"key":"ref21","year":"0","journal-title":"Scapy Packet crafting for python2 and python3"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98989-1_23"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3013093"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2931294"},{"key":"ref25","article-title":"Causal analysis for software-defined networking attacks","author":"ujcich","year":"0","journal-title":"30th USENIX Security Symposium (USENIX Security 21)"}],"event":{"name":"2021 17th International Conference on Network and Service Management (CNSM)","location":"Izmir, Turkey","start":{"date-parts":[[2021,10,25]]},"end":{"date-parts":[[2021,10,29]]}},"container-title":["2021 17th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9615441\/9615442\/09615598.pdf?arnumber=9615598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T20:53:30Z","timestamp":1647896010000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9615598\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,25]]},"references-count":26,"URL":"https:\/\/doi.org\/10.23919\/cnsm52442.2021.9615598","relation":{},"subject":[],"published":{"date-parts":[[2021,10,25]]}}}