callback( { "result":{ "query":":facetid:toc:\"db/series/ccn/ZSJH2017.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"61.72" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"13", "@dc":"13", "@oc":"13", "@id":"43386584", "text":":facetid:toc:db/series/ccn/ZSJH2017.bht" } }, "hits":{ "@total":"13", "@computed":"13", "@sent":"13", "@first":"0", "hit":[{ "@score":"1", "@id":"3013184", "info":{"authors":{"author":[{"@pid":"213/3468","text":"Abeer Ali"},{"@pid":"154/8209","text":"Richard Cziva"},{"@pid":"139/1448","text":"Simon Jouët"},{"@pid":"49/1051","text":"Dimitrios P. Pezaros"}]},"title":"SDNFV-Based DDoS Detection and Remediation in Multi-tenant, Virtualised Infrastructures.","venue":"Guide to Security in SDN and NFV","pages":"171-196","year":"2017","type":"Parts in Books or Collections","access":"closed","key":"series/ccn/AliCJP17","doi":"10.1007/978-3-319-64653-4_7","ee":"https://doi.org/10.1007/978-3-319-64653-4_7","url":"https://dblp.org/rec/series/ccn/AliCJP17"}, "url":"URL#3013184" }, { "@score":"1", "@id":"3013186", "info":{"authors":{"author":[{"@pid":"205/8920","text":"Hamza Attak"},{"@pid":"84/2474","text":"Marco Casassa Mont"},{"@pid":"204/5600","text":"Cristian Dávila"},{"@pid":"159/2124","text":"Eleni-Constantina Davri"},{"@pid":"153/4120","text":"Carolina Fernandez"},{"@pid":"80/6095","text":"Georgios Gardikis"},{"@pid":"73/8316","text":"Bernat Gastón"},{"@pid":"72/9379","text":"Ludovic Jacquin"},{"@pid":"39/5082","text":"Antonio Lioy"},{"@pid":"48/3224","text":"Antonis Litke"},{"@pid":"27/3463","text":"Nikolaos K. Papadakis"},{"@pid":"66/5996","text":"Dimitris Papadopoulos"},{"@pid":"236/8154","text":"Jerónimo Núñez"},{"@pid":"84/9838","text":"Eleni Trouva"}]},"title":"SHIELD: Securing Against Intruders and Other Threats Through an NFV-Enabled Environment.","venue":"Guide to Security in SDN and NFV","pages":"197-225","year":"2017","type":"Parts in Books or Collections","access":"closed","key":"series/ccn/AttakMDDFGGJLLPPNT17","doi":"10.1007/978-3-319-64653-4_8","ee":"https://doi.org/10.1007/978-3-319-64653-4_8","url":"https://dblp.org/rec/series/ccn/AttakMDDFGGJLLPPNT17"}, "url":"URL#3013186" }, { "@score":"1", "@id":"3013188", "info":{"authors":{"author":[{"@pid":"173/0907","text":"Théo Combe"},{"@pid":"74/4777","text":"Wissam Mallouli"},{"@pid":"10/3971","text":"Thibault Cholez"},{"@pid":"56/5177","text":"Guillaume Doyen"},{"@pid":"19/3021","text":"Bertrand Mathieu"},{"@pid":"46/6203","text":"Edgardo Montes de Oca"}]},"title":"An SDN and NFV Use Case: NDN Implementation and Security Monitoring.","venue":"Guide to Security in SDN and NFV","pages":"299-321","year":"2017","type":"Parts in Books or Collections","access":"closed","key":"series/ccn/CombeMCDMO17","doi":"10.1007/978-3-319-64653-4_12","ee":"https://doi.org/10.1007/978-3-319-64653-4_12","url":"https://dblp.org/rec/series/ccn/CombeMCDMO17"}, "url":"URL#3013188" }, { "@score":"1", "@id":"3013190", "info":{"authors":{"author":[{"@pid":"177/3013","text":"Jacob H. Cox Jr."},{"@pid":"91/3070-1","text":"Russell J. Clark 0001"},{"@pid":"77/6321","text":"Henry L. Owen III"}]},"title":"A Security Policy Transition Framework for Software-Defined Networks.","venue":"Guide to Security in SDN and NFV","pages":"149-169","year":"2017","type":"Parts in Books or Collections","access":"closed","key":"series/ccn/CoxCO17","doi":"10.1007/978-3-319-64653-4_6","ee":"https://doi.org/10.1007/978-3-319-64653-4_6","url":"https://dblp.org/rec/series/ccn/CoxCO17"}, "url":"URL#3013190" }, { "@score":"1", "@id":"3013194", "info":{"authors":{"author":[{"@pid":"48/421","text":"Igor Faynberg"},{"@pid":"236/8138","text":"Steve Goeringer"}]},"title":"NFV Security: Emerging Technologies and Standards.","venue":"Guide to Security in SDN and NFV","pages":"33-73","year":"2017","type":"Parts in Books or Collections","access":"closed","key":"series/ccn/FaynbergG17","doi":"10.1007/978-3-319-64653-4_2","ee":"https://doi.org/10.1007/978-3-319-64653-4_2","url":"https://dblp.org/rec/series/ccn/FaynbergG17"}, "url":"URL#3013194" }, { "@score":"1", "@id":"3013196", "info":{"authors":{"author":[{"@pid":"02/5254","text":"Doan B. Hoang"},{"@pid":"210/6075","text":"Sarah Farahmandian"}]},"title":"Security of Software-Defined Infrastructures with SDN, NFV, and Cloud Computing Technologies.","venue":"Guide to Security in SDN and NFV","pages":"3-32","year":"2017","type":"Parts in Books or Collections","access":"closed","key":"series/ccn/HoangF17","doi":"10.1007/978-3-319-64653-4_1","ee":"https://doi.org/10.1007/978-3-319-64653-4_1","url":"https://dblp.org/rec/series/ccn/HoangF17"}, "url":"URL#3013196" }, { "@score":"1", "@id":"3013198", "info":{"authors":{"author":[{"@pid":"09/9980","text":"Rahamatullah Khondoker"},{"@pid":"39/9386","text":"Pedro Larbig"},{"@pid":"03/6860","text":"Dirk Scheuermann"},{"@pid":"180/3019","text":"Frank G. Weber"},{"@pid":"64/6668","text":"Kpatcha M. Bayarou"}]},"title":"Addressing Industry 4.0 Security by Software-Defined Networking.","venue":"Guide to Security in SDN and NFV","pages":"229-251","year":"2017","type":"Parts in Books or Collections","access":"closed","key":"series/ccn/KhondokerLSWB17","doi":"10.1007/978-3-319-64653-4_9","ee":"https://doi.org/10.1007/978-3-319-64653-4_9","url":"https://dblp.org/rec/series/ccn/KhondokerLSWB17"}, "url":"URL#3013198" }, { "@score":"1", "@id":"3013199", "info":{"authors":{"author":[{"@pid":"39/5082","text":"Antonio Lioy"},{"@pid":"64/6461","text":"Tao Su"},{"@pid":"151/4996","text":"Adrian L. Shaw"},{"@pid":"205/8920","text":"Hamza Attak"},{"@pid":"78/1845","text":"Diego R. López"},{"@pid":"52/8149-1","text":"Antonio Pastor 0001"}]},"title":"Trust in SDN/NFV Environments.","venue":"Guide to Security in SDN and NFV","pages":"103-124","year":"2017","type":"Parts in Books or Collections","access":"closed","key":"series/ccn/LioySSALP17","doi":"10.1007/978-3-319-64653-4_4","ee":"https://doi.org/10.1007/978-3-319-64653-4_4","url":"https://dblp.org/rec/series/ccn/LioySSALP17"}, "url":"URL#3013199" }, { "@score":"1", "@id":"3013202", "info":{"authors":{"author":[{"@pid":"233/3395","text":"Vinod K. Mishra"},{"@pid":"45/4989","text":"Dinesh C. Verma"},{"@pid":"85/6792-1","text":"Christopher Williams 0001"}]},"title":"Improving Security in Coalition Tactical Environments Using an SDN Approach.","venue":"Guide to Security in SDN and NFV","pages":"273-298","year":"2017","type":"Parts in Books or Collections","access":"closed","key":"series/ccn/MishraVW17","doi":"10.1007/978-3-319-64653-4_11","ee":"https://doi.org/10.1007/978-3-319-64653-4_11","url":"https://dblp.org/rec/series/ccn/MishraVW17"}, "url":"URL#3013202" }, { "@score":"1", "@id":"3013204", "info":{"authors":{"author":[{"@pid":"190/4645","text":"Andrés F. Murillo P."},{"@pid":"173/2490","text":"Sandra Julieta Rueda"},{"@pid":"173/2430","text":"Laura Victoria Morales Medina"},{"@pid":"48/6119","text":"Alvaro A. Cárdenas"}]},"title":"SDN and NFV Security: Challenges for Integrated Solutions.","venue":"Guide to Security in SDN and NFV","pages":"75-101","year":"2017","type":"Parts in Books or Collections","access":"closed","key":"series/ccn/PRMC17","doi":"10.1007/978-3-319-64653-4_3","ee":"https://doi.org/10.1007/978-3-319-64653-4_3","url":"https://dblp.org/rec/series/ccn/PRMC17"}, "url":"URL#3013204" }, { "@score":"1", "@id":"3013206", "info":{"authors":{"author":[{"@pid":"52/8149-1","text":"Antonio Pastor 0001"},{"@pid":"118/9827","text":"Jesús Folgueira"}]},"title":"Practical Experience in NFV Security Field: Virtual Home Gateway.","venue":"Guide to Security in SDN and NFV","pages":"127-148","year":"2017","type":"Parts in Books or Collections","access":"closed","key":"series/ccn/PastorF17","doi":"10.1007/978-3-319-64653-4_5","ee":"https://doi.org/10.1007/978-3-319-64653-4_5","url":"https://dblp.org/rec/series/ccn/PastorF17"}, "url":"URL#3013206" }, { "@score":"1", "@id":"3013208", "info":{"authors":{"author":[{"@pid":"74/9386","text":"Mateus Augusto Silva Santos"},{"@pid":"177/5019","text":"Alireza Ranjbar"},{"@pid":"83/2180","text":"Gergely Biczók"},{"@pid":"62/5621","text":"Barbara Martini"},{"@pid":"74/6741","text":"Francesco Paolucci"}]},"title":"Security Requirements for Multi-operator Virtualized Network and Service Orchestration for 5G.","venue":"Guide to Security in SDN and NFV","pages":"253-272","year":"2017","type":"Parts in Books or Collections","access":"closed","key":"series/ccn/SantosRBMP17","doi":"10.1007/978-3-319-64653-4_10","ee":"https://doi.org/10.1007/978-3-319-64653-4_10","url":"https://dblp.org/rec/series/ccn/SantosRBMP17"}, "url":"URL#3013208" }, { "@score":"1", "@id":"3016433", "info":{"authors":{"author":[{"@pid":"51/5178","text":"Shao Ying Zhu"},{"@pid":"23/10701","text":"Sandra Scott-Hayward"},{"@pid":"72/9379","text":"Ludovic Jacquin"},{"@pid":"35/4189","text":"Richard Hill"}]},"title":"Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications","venue":["Guide to Security in SDN and NFV","Computer Communications and Networks"],"publisher":"Springer","year":"2017","type":"Editorship","key":"series/ccn/ZSJH2017","doi":"10.1007/978-3-319-64653-4","ee":"https://doi.org/10.1007/978-3-319-64653-4","url":"https://dblp.org/rec/series/ccn/ZSJH2017"}, "url":"URL#3016433" } ] } } } )