{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T19:15:28Z","timestamp":1726168528268},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031067877"},{"type":"electronic","value":"9783031067884"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-06788-4_38","type":"book-chapter","created":{"date-parts":[[2022,7,3]],"date-time":"2022-07-03T19:03:27Z","timestamp":1656875007000},"page":"448-459","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Review of\u00a0Detection and\u00a0Avoidance of\u00a0Interference Among Multiple Applications in\u00a0Software-Defined Networks"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6337-0728","authenticated-orcid":false,"given":"Jiangyuan","family":"Yao","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4180-8949","authenticated-orcid":false,"given":"Shengjun","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3391-8582","authenticated-orcid":false,"given":"Chunxiang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Min","family":"Jing","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2026-9288","authenticated-orcid":false,"given":"Deshun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Minrui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xingcan","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,4]]},"reference":[{"issue":"2","key":"38_CR1","doi-asserted-by":"publisher","first-page":"2807","DOI":"10.32604\/cmc.2022.019766","volume":"71","author":"R Alkanhel","year":"2022","unstructured":"Alkanhel, R., et al.: Intelligent transmission control for efficient operations in SDN. CMC-Comput. Mater. Continua 71(2), 2807\u20132825 (2022)","journal-title":"CMC-Comput. Mater. Continua"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Ball, T., et al.: Vericon: towards verifying controller programs in software-defined networks. In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 282\u2013293 (2014)","DOI":"10.1145\/2594291.2594317"},{"key":"38_CR3","unstructured":"Canini, M., Venzano, D., Pere\u0161\u00edni, P., Kosti\u0107, D., Rexford, J.: A $$\\{$$NICE$$\\}$$ way to test openflow applications. In: 9th $$\\{$$USENIX$$\\}$$ Symposium on Networked Systems Design and Implementation ($$\\{$$NSDI$$\\}$$ 12), pp. 127\u2013140 (2012)"},{"issue":"9","key":"38_CR4","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1145\/2034574.2034812","volume":"46","author":"N Foster","year":"2011","unstructured":"Foster, N., et al.: Frenetic: a network programming language. ACM Sigplan Notices 46(9), 279\u2013291 (2011)","journal-title":"ACM Sigplan Notices"},{"key":"38_CR5","doi-asserted-by":"crossref","unstructured":"Guha, A., Reitblatt, M., Foster, N.: Machine-verified network controllers. ACM Sigplan Notices 48(6), 483\u2013494 (2013)","DOI":"10.1145\/2499370.2462178"},{"key":"38_CR6","unstructured":"Hindman, B., et al.: Mesos: a platform for $$\\{$$Fine-Grained$$\\}$$ resource sharing in the data center. In: 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 11) (2011)"},{"key":"38_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107619","volume":"183","author":"T Hu","year":"2020","unstructured":"Hu, T., Yi, P., Hu, Y., Lan, J., Zhang, Z., Li, Z.: Saide: efficient application interference detection and elimination in SDN. Comput. Netw. 183, 107619 (2020)","journal-title":"Comput. Netw."},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Krishnamoorthy, S., Narayanaswamy, K.: SDN controller allocation and assignment based on multicriterion chaotic salp swarm algorithm. Intell. Autom. Soft Comput. 27(1), 89\u2013102 (2021)","DOI":"10.32604\/iasc.2021.013643"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Lee, C., Shin, S.: Shield: an automated framework for static analysis of SDN applications. In: Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, pp. 29\u201334 (2016)","DOI":"10.1145\/2876019.2876026"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Li, Y., Wang, Z., Yao, J., Yin, X., Shi, X., Wu, J.: Msaid: automated interference detection for multiple SDN applications. In: 2017 IEEE 25th International Conference on Network Protocols (ICNP), pp. 1\u20132. IEEE (2017)","DOI":"10.1109\/ICNP.2017.8117575"},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Lin, L., Sun, X.: A case for systematic detection and rigorous location of SDNcontrol conflicts. In: 2018 IEEE 43rd Conference on Local Computer Networks (LCN), pp. 291\u2013294. IEEE (2018)","DOI":"10.1109\/LCN.2018.8638123"},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"Malavika, R., Valarmathi, M.: Adaptive server load balancing in SDN using PID neural network controller. Comput. Syst. Sci. Eng. 42(1), 229\u2013243 (2022)","DOI":"10.32604\/csse.2022.020947"},{"key":"38_CR13","doi-asserted-by":"crossref","unstructured":"Mogul, J.C., et al.: Corybantic: towards the modular composition of SDN control programs. In: Proceedings of the twelfth ACM Workshop on hot Topics in Networks, pp. 1\u20137 (2013)","DOI":"10.1145\/2535771.2535795"},{"key":"38_CR14","doi-asserted-by":"crossref","unstructured":"Pisharody, S., Natarajan, J., Chowdhary, A., Alshalan, A., Huang, D.: Brew: a security policy analysis framework for distributed SDN-based cloud environments. IEEE Trans. Dependable Secure Comput. 16(6), 1011\u20131025 (2017)","DOI":"10.1109\/TDSC.2017.2726066"},{"key":"38_CR15","doi-asserted-by":"crossref","unstructured":"Porras, P.A., Cheung, S., Fong, M.W., Skinner, K., Yegneswaran, V.: Securing the software defined network control layer. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23222"},{"key":"38_CR16","unstructured":"Reich, J., Monsanto, C., Foster, N., Rexford, J., Walker, D.: Modular SDN programming with pyretic. Technical Reprot of USENIX, p. 30 (2013)"},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"Saraswat, S., Agarwal, V., Gupta, H.P., Mishra, R., Gupta, A., Dutta, T.: Challenges and solutions in software defined networking: a survey. J. Netw. Comput. Appl. 141, 23\u201358 (2019)","DOI":"10.1016\/j.jnca.2019.04.020"},{"key":"38_CR18","doi-asserted-by":"crossref","unstructured":"Shahzadi, S., et al.: Machine learning empowered security management and quality of service provision in SDN-NFV environment. CMC-Comput. Mater. Continua 66(3), 2723\u20132749 (2021)","DOI":"10.32604\/cmc.2021.014594"},{"key":"38_CR19","doi-asserted-by":"crossref","unstructured":"Shukla, N., Pandey, M., Srivastava, S.: Formal modeling and verification of software-defined networks: a survey. Int. J. Netw. Manag. 29(5), e2082 (2019)","DOI":"10.1002\/nem.2082"},{"key":"38_CR20","doi-asserted-by":"crossref","unstructured":"Son, S., Shin, S., Yegneswaran, V., Porras, P., Gu, G.: Model checking invariant security properties in openflow. In: 2013 IEEE International Conference on Communications (ICC), pp. 1974\u20131979. IEEE (2013)","DOI":"10.1109\/ICC.2013.6654813"},{"key":"38_CR21","doi-asserted-by":"crossref","unstructured":"Souri, A., Norouzi, M., Asghari, P., Rahmani, A.M., Emadi, G.: A systematic literature review on formal verification of software-defined networks. Trans. Emerg. Telecommun. Technol. 31(2), e3788 (2020)","DOI":"10.1002\/ett.3788"},{"key":"38_CR22","doi-asserted-by":"crossref","unstructured":"Sreekanth, G., Ahmed, S., Sarac, M., Strumberger, I., Bacanin, N., Zivkovic, M.: Mobile fog computing by using SDN\/NFV on 5g edge nodes. Comput. Syst. Sci. Eng. 41(2), 751\u2013765 (2022)","DOI":"10.32604\/csse.2022.020534"},{"key":"38_CR23","doi-asserted-by":"crossref","unstructured":"Sun, P., Mahajan, R., Rexford, J., Yuan, L., Zhang, M., Arefin, A.: A network-state management service. In: Proceedings of the 2014 ACM Conference on SIGCOMM, pp. 563\u2013574 (2014)","DOI":"10.1145\/2619239.2626298"},{"key":"38_CR24","doi-asserted-by":"crossref","unstructured":"Volpano, D.M., Sun, X., Xie, G.G.: Towards systematic detection and resolution of network control conflicts. In: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, pp. 67\u201372 (2014)","DOI":"10.1145\/2620728.2620745"},{"key":"38_CR25","doi-asserted-by":"crossref","unstructured":"Yu, Y., et al.: Fault management in software-defined networking: a survey. IEEE Commun. Surv. Tutorials 21(1), 349\u2013392 (2018)","DOI":"10.1109\/COMST.2018.2868922"},{"key":"38_CR26","doi-asserted-by":"crossref","unstructured":"Yuan, H., Bi, J., Zhou, M., Sedraoui, K.: Warm: workload-aware multi-application task scheduling for revenue maximization in SDN-based cloud data center. IEEE Access 6, 645\u2013657 (2017)","DOI":"10.1109\/ACCESS.2017.2773645"},{"key":"38_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, H., et al.: Da&fd-deadline-aware and flow duration-based rate control for mixed flows in DCNS. IEEE\/ACM Trans. Netw. 27(6), 2458\u20132471 (2019)","DOI":"10.1109\/TNET.2019.2951925"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-06788-4_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T08:27:27Z","timestamp":1657700847000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-06788-4_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031067877","9783031067884"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-06788-4_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qinghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1124","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}