{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:34:29Z","timestamp":1729676069695,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.23919\/iconac.2017.8082061","type":"proceedings-article","created":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T17:36:33Z","timestamp":1509644193000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Software defined networks: An analysis on robust security practices"],"prefix":"10.23919","author":[{"given":"Tamour","family":"Bilal","sequence":"first","affiliation":[]},{"given":"Zafar","family":"Faiz","sequence":"additional","affiliation":[]},{"given":"Munam Ali","family":"Shah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"123","author":"li","year":"2016","journal-title":"A One-Way Proof-of-Work Protocol to Protect Controllers in Software-Defined Networks"},{"key":"ref11","first-page":"3","article-title":"in Proceedings of the 2010 internet network management conference on Research on enterprise networking. USENIX Association","author":"and","year":"2010","journal-title":"HyperFlow A Distrib Control P1 OpenFlow"},{"key":"ref12","article-title":"A replication component for resilient OpenFlow-based networking","author":"fonseca","year":"2013","journal-title":"Proc Netw Oper Manage Symp"},{"key":"ref13","first-page":"2317","volume":"17","author":"ahmad","year":"2015","journal-title":"Security in Software Defined Networks A Survey"},{"journal-title":"Open Network Foundatino","article-title":"OpenFlow Switch Specification Version 1.4","year":"0","key":"ref14"},{"journal-title":"Seungwon Shiny Vinod Yegneswaranz","article-title":"Yegneswaranz Phillip Porrasz Guofei GuyyTexas A&M University zSRI International {swshin, guofei}","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"},{"key":"ref17","first-page":"7","article-title":"Source address validation solution with OpenFlow\/NOX architecture","author":"yao","year":"2012","journal-title":"19th IEEE Int Conf Netw Protoc (ICNP) IEEE"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491222"},{"year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"journal-title":"Software-Defined Networking The New Norm for Networks","year":"2012","author":"paper","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.081313.00105"},{"year":"0","key":"ref5"},{"journal-title":"The Real Story of Stuxnet","year":"0","author":"kushner","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","article-title":"Software-Defined Networking: A Comprehensive Survey","volume":"103","author":"ieee","year":"2015","journal-title":"Proc IEEE"},{"key":"ref1","first-page":"493","article-title":"Software-Defined Networking (SDN): Layers and Architecture Terminology","volume":"15","author":"evangelos haleplidis","year":"2014","journal-title":"IEEE Commun Surv Tut"},{"year":"0","key":"ref9"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1145\/2377677.2377766","article-title":"VeriFlow: Verifying network-wide invariants in real time","volume":"42","author":"khurshid","year":"2015","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"ref22","article-title":"No Title","author":"ijaz ahmad","year":"0","journal-title":"A Surv Secur Softw Defin Networks"},{"key":"ref21","article-title":"No Title","author":"sandra scott-hayward","year":"0","journal-title":"A Surv Secur Softw Defin Networks"},{"key":"ref24","first-page":"5","article-title":"Securing distributed control of software defined networks","volume":"13","year":"0","journal-title":"Int J Comput Sci Netw Secur"},{"journal-title":"Security in Software Defined Networks A Survey","year":"0","author":"hayward","key":"ref23"}],"event":{"name":"2017 23rd International Conference on Automation and Computing (ICAC)","start":{"date-parts":[[2017,9,7]]},"location":"Huddersfield, United Kingdom","end":{"date-parts":[[2017,9,8]]}},"container-title":["2017 23rd International Conference on Automation and Computing (ICAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8067274\/8081956\/08082061.pdf?arnumber=8082061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T10:08:56Z","timestamp":1570270136000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8082061\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":24,"URL":"https:\/\/doi.org\/10.23919\/iconac.2017.8082061","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}