{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T06:40:35Z","timestamp":1766472035706,"version":"3.48.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.23919\/cnsm67658.2025.11297512","type":"proceedings-article","created":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T18:40:10Z","timestamp":1766428810000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Enforcing Security Policies in the Application Layer and the Data Plane"],"prefix":"10.23919","author":[{"given":"Federico","family":"Rinaudi","sequence":"first","affiliation":[{"name":"Politecnico di Torino,Department of Control and Computer Engineering,Italy"}]},{"given":"Alessio","family":"Sacco","sequence":"additional","affiliation":[{"name":"Politecnico di Torino,Department of Control and Computer Engineering,Italy"}]},{"given":"Guido","family":"Marchetto","sequence":"additional","affiliation":[{"name":"Politecnico di Torino,Department of Control and Computer Engineering,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3457904"},{"key":"ref2","first-page":"1507","article-title":"Mutant: Learning congestion control from existing protocols via online reinforcement learning","volume-title":"22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25)","author":"Pappone"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2025.111235"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134075"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382209"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3594255.3594256"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3442530"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DSN64029.2025.00048"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7858"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8484"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365429"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LCN53696.2022.9843593"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc9250"},{"key":"ref17","article-title":"Oblivious DNS over HTTPS","author":"Kinnear","year":"2022","journal-title":"RFC 9230"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0085"},{"key":"ref19","first-page":"753","article-title":"Online website fingerprinting: Evaluating website fingerprinting attacks on tor in the real world","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Cherubin"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"ref21","first-page":"1375","article-title":"Walkie-talkie: an efficient defense against passive website fingerprinting attacks","volume-title":"Proceedings of the 26th USENIX Conference on Security Symposium, ser. SEC\u201917. USA: USENIX Association","volume":"2017","author":"Wang"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833801"},{"key":"ref23","first-page":"513","article-title":"Re-architecting traffic analysis with neural network interface cards","volume-title":"19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Siracusano"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110162"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM52923.2024.10901356"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM55648.2025.11044678"}],"event":{"name":"2025 21st International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2025,10,27]]},"location":"Bologna, Italy","end":{"date-parts":[[2025,10,31]]}},"container-title":["2025 21st International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11297200\/11297407\/11297512.pdf?arnumber=11297512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T06:38:15Z","timestamp":1766471895000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11297512\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":26,"URL":"https:\/\/doi.org\/10.23919\/cnsm67658.2025.11297512","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]}}}