{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期-部件”:[[2023,9,26]],“日期-时间”:“2023-09-26T05:23:52Z”,“时间戳”:169570583221},“引用-计数”:31,“发布者”:“IEEE”,“许可证”:[{“开始”:{'日期-部件“:[2023,7,1]],”日期-时间“:”2023-07-01T00:00:00Z“,”timestamp“:1688169600000},”content-version“:”stm-asf“,“delay-in-days”:0,“URL”:“https:\/\/doi.org\/10.15223\/policy-029”},{“start”:{“date-parts”:[[2023,7,1]],“date-time”:“2023-07-01T00:00:00Z”,“timestamp”:1688169600000},“content-version”:“stm-asf”,“dellay-in-days”:0 content-domain“:{“domain”:[],“crossmark-restriction”:false},“short-container-title”:[],“published-print”:{“date-parts”:[[2023,7]]},“DOI”:“10.1109\/icccn58024.2023.10230113”,“type”:“procedings-article”,“created”:{“date-ports”:[[2023,9,1]],“date-time”:“2023-09-01T17:22:54Z”,“timestamp”:1693588974000},”source“Crossref”,“is-referenced-by-count”:0,“title”:[“外包网络安全选择器保密保护”网络测试“],“prefix”:“10.1109”,“author”:[{“given”:“Sultan”,“family”:“Alasmari”,“sequence”:“first”,“affiliation”:[}“name”:“Majmaah University CS and IT College”}]},{“fivent”:“Weichao”,“家庭”:“Wang”,“序列”:“additional”,“从属关系”:[[{”name“:北卡罗来纳州夏洛特大学,计算与信息学,夏洛特,北卡罗来来纳州夏洛特”}]{,“序列”:“additional”,“affiliation”:[{“name”:“北卡罗来纳州夏洛特大学,计算与信息学,夏洛特,NC”}]}},{“key”:“ref12”,“year”:“2023”,“journal-title”:“Cyber security platform”},{”key“:”ref15“,”doi-asserted-by“:”publisher“,”doi“:”10.1016\/j.ins.2018.12.022“},”{“密钥”:“ref14”,“doi-assert-by”:“publisher”,“doi”:“10.1109\/MeditCom49071.2021.9647609”}“,”doi“:”10.1007\/s10922-020-09518-z“},{”key“:”ref30“,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ICNP.2019.8888057”},{“key”:“ref11”,“doi-asserted-by”:”publisher“,”doi“:”10.1109\/CNS.2018.8433212“},}“key”:”ref10“,”doi-assert-by“:”publister“,”doi“:“10.109\/TVT.2020.3027568”}doi“:”10.1007\/s42045-020-00046-7“},{“key”:“ref1”,“doi-asserted-by”:“publisher”,“DOI”:“10.1145\/3442520.3442533”},{“key”:“ref17”,“author”:“rasic”,“year”:“2020”,“journal-title”:“网络安全监视事件日志的匿名”}109\/WETICE.2019.00073“},{“键”:“参考18”,“author”:“dagher”,“year”:“2016”,“journal-title”:“保密数据外包集成和审计的安全协议”},{“key”:“ref24”,“article-title“:“Aws网络防火墙定价”,“年”:“2023”,“日记标题”:“On Aws”}},{“key”:“ref26”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/SEC50012.2020.00032”},“文章标题”:“sdn \/nfv-enabled iot系统中的语义软件安全编排”,“卷”:“20”,“作者”:“zarca”,“年份”:“2020”,“日志标题”:“SENSORS”},{“密钥”:“ref21”,“article-title”:“context-aware byod policies的可编程网络内安全”,“作家”:“kang”,“年”:“2020”,“日记标题”::“publisher”,“DOI”:“10.1007\/s42979-022-01017-z”},{“key”:“ref27”,“DOI-asserted-by”:“publicher”,“DI:”10.2139\/ssrn.3713860“},}“key:”ref29“,”DOI-assert-by“:”publisher“,”DOI“:”10.1109\/TNSM.2021.3062488“}ITMS51158.2020.9259305“},{“key”:“ref7”,“DOI-asserted-by”:“publisher”,“DOI”:“10.1016\/j.jnca.2022.103397”},{“key”:“ref9”,“doi-asserted-by”:“publisher”,“doi”:“10.1002\/int.22367”},{“key”:“ref6”,“doi-asserted-by”:“publisher”,“doi”:“10.5220\/001089730003120”},{”key“:“ref5”,“doi-asserted-by”:“publisher”,“doi”:“10.17705\/1jais.00681”}],“event”:{“name”:“2023年第32届国际计算机通信与网络会议(ICCCN)”,“location”:“Honolulu,HI,USA”,“start”:}“date-parts”:[2023,7,24]]},“end”:{“date-parts”:[[2023,7,27]]}},”container-title“用法:[“2023年第32届计算机通信与网络国际会议(ICCCN)”],“原始标题”:[],“链接”:[{“URL”:“http://\/xplorestaging.ieee.org\/ielx7\/10230087\/102300113.pdf?arnumber=10230113”,“内容类型”:“未指定”,“content-version”:“vor”,“intended-application”:“相似性检查”}],“存放”:{“日期段”用法:[[2023,9,25]],“日期时间”:“2023-09-25T17:54:46Z”,“时间戳”:1695664486000},“分数”:1,“资源”:{“主要”:{“URL”:“https:\/\/ieeexplore.ieee.org\/document\/10230113\/”}},”副标题“:[],”短标题“:[],”已发布“:{”日期部分“:[2023,7]]},\\/dx.doi.org \\10.1109 \\icccn58024.2023.10230113“,”关系“:{},”主题“:[],“已发布”:{“日期部分”:[[2023,7]]}}