{"id":"https://openalex.org/W2783408164","doi":"https://doi.org/10.1109/etfa.2017.8247728","title":"Automatic mapping of cyber security requirements to support network slicing in software-defined networks","display_name":"Automatic mapping of cyber security requirements to support network slicing in software-defined networks","publication_year":2017,"publication_date":"2017-09-01","ids":{"openalex":"https://openalex.org/W2783408164","doi":"https://doi.org/10.1109/etfa.2017.8247728","mag":"2783408164"},"language":"en","primary_location":{"id":"doi:10.1109/etfa.2017.8247728","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2017.8247728","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005787965","display_name":"Marco Ehrlich","orcid":null},"institutions":[{"id":"https://openalex.org/I5209920","display_name":"Ostwestfalen-Lippe University of Applied Sciences and Arts","ror":"https://ror.org/04eka8j06","country_code":"DE","type":"education","lineage":["https://openalex.org/I5209920"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Marco Ehrlich","raw_affiliation_strings":["inIT - Institute Industrial IT, OWL University of Applied Sciences, Langenbruch 6, 32657 Lemgo, Germany"],"affiliations":[{"raw_affiliation_string":"inIT - Institute Industrial IT, OWL University of Applied Sciences, Langenbruch 6, 32657 Lemgo, Germany","institution_ids":["https://openalex.org/I5209920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068583836","display_name":"\u0141ukasz Wi\u015bniewski","orcid":"https://orcid.org/0000-0001-6537-4511"},"institutions":[{"id":"https://openalex.org/I5209920","display_name":"Ostwestfalen-Lippe University of Applied Sciences and Arts","ror":"https://ror.org/04eka8j06","country_code":"DE","type":"education","lineage":["https://openalex.org/I5209920"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Lukasz Wisniewski","raw_affiliation_strings":["inIT - Institute Industrial IT, OWL University of Applied Sciences, Langenbruch 6, 32657 Lemgo, Germany"],"affiliations":[{"raw_affiliation_string":"inIT - Institute Industrial IT, OWL University of Applied Sciences, Langenbruch 6, 32657 Lemgo, Germany","institution_ids":["https://openalex.org/I5209920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032285377","display_name":"Henning Trsek","orcid":"https://orcid.org/0000-0002-0133-0656"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Henning Trsek","raw_affiliation_strings":["rt-solutions GmbH, Industrial Security, Oberlander Ufer 190a, 50968 Cologne, Germany"],"affiliations":[{"raw_affiliation_string":"rt-solutions GmbH, Industrial Security, Oberlander Ufer 190a, 50968 Cologne, Germany","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077758042","display_name":"Daniel Mahrenholz","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Daniel Mahrenholz","raw_affiliation_strings":["rt-solutions GmbH, Industrial Security, Oberlander Ufer 190a, 50968 Cologne, Germany"],"affiliations":[{"raw_affiliation_string":"rt-solutions GmbH, Industrial Security, Oberlander Ufer 190a, 50968 Cologne, Germany","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025905769","display_name":"J\u00fcrgen Jasperneite","orcid":"https://orcid.org/0000-0001-7962-2491"},"institutions":[{"id":"https://openalex.org/I4210111500","display_name":"Fraunhofer Institute of Optronics, System Technologies and Image Exploitation","ror":"https://ror.org/01zx97922","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210111500","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jurgen Jasperneite","raw_affiliation_strings":["Fraunhofer IOSB-INA, Application Center Industrial Automation, Langenbruch 6 32657 Lemgo, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer IOSB-INA, Application Center Industrial Automation, Langenbruch 6 32657 Lemgo, Germany","institution_ids":["https://openalex.org/I4210111500"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5005787965"],"corresponding_institution_ids":["https://openalex.org/I5209920"],"apc_list":null,"apc_paid":null,"fwci":1.8648,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.88143348,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9805999994277954,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9765999913215637,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.764854371547699},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6207814812660217},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.4468275308609009},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4380936920642853},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.4253285229206085},{"id":"https://openalex.org/keywords/network-management","display_name":"Network management","score":0.42411568760871887},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3427354395389557},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2460479438304901},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15378421545028687},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1526905596256256}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.764854371547699},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6207814812660217},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.4468275308609009},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4380936920642853},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.4253285229206085},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.42411568760871887},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3427354395389557},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2460479438304901},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15378421545028687},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1526905596256256},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/etfa.2017.8247728","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2017.8247728","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"},{"id":"pmh:oai:fraunhofer.de:N-479990","is_oa":false,"landing_page_url":"http://publica.fraunhofer.de/documents/N-479990.html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400801","display_name":"Publikationsdatenbank der Fraunhofer-Gesellschaft (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fraunhofer IOSB","raw_type":"Conference Paper"},{"id":"pmh:oai:publica.fraunhofer.de:publica/399140","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/399140","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5099999904632568}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2040340473","https://openalex.org/W2078540087","https://openalex.org/W2130599237","https://openalex.org/W2143771583","https://openalex.org/W2295939521","https://openalex.org/W2426218908","https://openalex.org/W2555116455","https://openalex.org/W2564243131","https://openalex.org/W2599557761","https://openalex.org/W6729899647"],"related_works":["https://openalex.org/W2218202131","https://openalex.org/W84108837","https://openalex.org/W2519676117","https://openalex.org/W2155740880","https://openalex.org/W4253249845","https://openalex.org/W2148444631","https://openalex.org/W1988425686","https://openalex.org/W1826068234","https://openalex.org/W2125452230","https://openalex.org/W3086216911"],"abstract_inverted_index":{"The":[0],"process":[1],"of":[2,26,28,59,76,130],"digitalisation":[3],"has":[4,62,72],"an":[5],"advanced":[6],"impact":[7],"on":[8],"social":[9],"lives,":[10],"state":[11],"affairs,":[12],"and":[13,20,116,135,154,159],"the":[14,21,32,48,56,67,145,166],"industrial":[15,87],"automation":[16],"domain.":[17],"Ubiquitous":[18],"networks":[19],"increased":[22],"requirements":[23,103,164],"in":[24,66,140],"terms":[25],"Quality":[27],"Service":[29],"(QoS)":[30],"create":[31],"demand":[33],"for":[34,99,165],"future-proof":[35,155],"network":[36,106,169],"management.":[37,170],"Therefore,":[38,144],"new":[39],"technological":[40],"approaches,":[41],"such":[42,85],"as":[43,86],"Software-Defined":[44],"Networks":[45],"(SDN)":[46],"or":[47,89],"5G":[49],"Network":[50],"Slicing":[51],"concept,":[52],"are":[53,118,123],"considered.":[54],"However,":[55,120],"important":[57],"topic":[58,71],"cyber":[60,101,161],"security":[61,82,102,113,162],"mainly":[63,124],"been":[64],"ignored":[65],"past.":[68],"Recently,":[69],"this":[70,94,110],"gained":[73],"a":[74,97,127,141,149],"lot":[75],"attention":[77],"due":[78],"to":[79,104,137,157],"frequently":[80],"reported":[81],"related":[83,114],"incidents,":[84],"espionage,":[88],"production":[90],"system":[91],"manipulations.":[92],"Hence,":[93],"work":[95],"proposes":[96],"concept":[98],"adding":[100],"future":[105],"management":[107],"paradigms.":[108],"For":[109],"purpose,":[111],"various":[112],"standards":[115],"guidelines":[117],"available.":[119],"these":[121],"approaches":[122],"static,":[125],"require":[126],"high":[128],"amount":[129],"manual":[131],"efforts":[132],"by":[133],"experts,":[134],"need":[136],"be":[138],"performed":[139],"steady":[142],"manner.":[143],"proposed":[146],"solution":[147],"contains":[148],"dynamic,":[150],"machine-readable,":[151],"automatic,":[152],"continuous,":[153],"approach":[156],"model":[158],"describe":[160],"QoS":[163],"next":[167],"generation":[168]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
