{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T12:37:20Z","timestamp":1723034240775},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/icnp.2009.5339690","type":"proceedings-article","created":{"date-parts":[[2009,11,30]],"date-time":"2009-11-30T19:36:24Z","timestamp":1259609784000},"source":"Crossref","is-referenced-by-count":109,"title":["Network configuration in a box: towards end-to-end verification of network reachability and security"],"prefix":"10.1109","author":[{"given":"Ehab","family":"Al-Shaer","sequence":"first","affiliation":[]},{"given":"Will","family":"Marrero","sequence":"additional","affiliation":[]},{"given":"Adel","family":"El-Atawy","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"ElBadawi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"0"},{"key":"17","first-page":"155","article-title":"network configuration management via model finding","author":"narain","year":"2005","journal-title":"LISA"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498492"},{"key":"15","author":"lind-nielsen","year":"0","journal-title":"The BuDDy OBDD package"},{"key":"16","article-title":"understanding bgp misconfiguration","author":"mahajan","year":"0","journal-title":"SIGCOMM '02 Proceedings of the ACM SIGCOMM 2002 conference on Data communications"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2005.25"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402962"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2004.1281597"},{"key":"12","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/633025.633028","article-title":"on the correctness of ibgp configuration","author":"griffin","year":"2002","journal-title":"SIGCOMM '02 Proceedings of the ACM SIGCOMM 2002 conference on Data communication"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354680"},{"key":"20","article-title":"fireman: a toolkit for firewall modeling and analysis","author":"yuan","year":"2006","journal-title":"IEEE Symposium on Security and Privacy (SSP'06)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2009.090406"},{"key":"1","year":"0","journal-title":"Configchecker"},{"key":"10","article-title":"detecting bgp configuration faults with static analysis","author":"feamster","year":"2005","journal-title":"NSDI"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(92)90017-A"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676819"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402972"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.854119"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-444-88074-1.50021-4"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208982"}],"event":{"name":"2009 17th IEEE International Conference on Network Protocols (ICNP)","location":"Plainsboro, NJ, USA","start":{"date-parts":[[2009,10,13]]},"end":{"date-parts":[[2009,10,16]]}},"container-title":["2009 17th IEEE International Conference on Network Protocols"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5335585\/5339659\/05339690.pdf?arnumber=5339690","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,17]],"date-time":"2024-03-17T22:31:56Z","timestamp":1710714716000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5339690\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icnp.2009.5339690","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}
  NODES
INTERN 2