{"id":"https://openalex.org/W4392153092","doi":"https://doi.org/10.1109/globecom54140.2023.10436953","title":"Cost Optimization in Security-Aware Service Function Chain Deployment with Diverse Vendors","display_name":"Cost Optimization in Security-Aware Service Function Chain Deployment with Diverse Vendors","publication_year":2023,"publication_date":"2023-12-04","ids":{"openalex":"https://openalex.org/W4392153092","doi":"https://doi.org/10.1109/globecom54140.2023.10436953"},"language":"en","primary_location":{"id":"doi:10.1109/globecom54140.2023.10436953","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/globecom54140.2023.10436953","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2023 - 2023 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079356223","display_name":"Danyang Zheng","orcid":"https://orcid.org/0000-0002-3031-7856"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Danyang Zheng","raw_affiliation_strings":["School of Computing and Artificial Intelligence, Southwest Jiaotong University,China","School of Computing and Artificial Intelligence, Southwest Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"School of Computing and Artificial Intelligence, Southwest Jiaotong University,China","institution_ids":["https://openalex.org/I4800084"]},{"raw_affiliation_string":"School of Computing and Artificial Intelligence, Southwest Jiaotong University, China","institution_ids":["https://openalex.org/I4800084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106627819","display_name":"Xiaorong Liu","orcid":"https://orcid.org/0009-0003-6883-7480"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaorong Liu","raw_affiliation_strings":["School of Computing and Artificial Intelligence, Southwest Jiaotong University,China","School of Computing and Artificial Intelligence, Southwest Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"School of Computing and Artificial Intelligence, Southwest Jiaotong University,China","institution_ids":["https://openalex.org/I4800084"]},{"raw_affiliation_string":"School of Computing and Artificial Intelligence, Southwest Jiaotong University, China","institution_ids":["https://openalex.org/I4800084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103273855","display_name":"Wenyi Tang","orcid":"https://orcid.org/0000-0002-2655-8884"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenyi Tang","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University,China","School of Cyber Science and Engineering, Sichuan University, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University,China","institution_ids":["https://openalex.org/I24185976"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064192743","display_name":"Honghui Xu","orcid":"https://orcid.org/0000-0002-9128-8454"},"institutions":[{"id":"https://openalex.org/I181565077","display_name":"Georgia State University","ror":"https://ror.org/03qt6ba18","country_code":"US","type":"education","lineage":["https://openalex.org/I181565077"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Honghui Xu","raw_affiliation_strings":["Georgia State University,Department of Computer Science,USA","Department of Computer Science, Georgia State University, USA"],"affiliations":[{"raw_affiliation_string":"Georgia State University,Department of Computer Science,USA","institution_ids":["https://openalex.org/I181565077"]},{"raw_affiliation_string":"Department of Computer Science, Georgia State University, USA","institution_ids":["https://openalex.org/I181565077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069042354","display_name":"Xiaojun Cao","orcid":"https://orcid.org/0009-0001-7432-7837"},"institutions":[{"id":"https://openalex.org/I181565077","display_name":"Georgia State University","ror":"https://ror.org/03qt6ba18","country_code":"US","type":"education","lineage":["https://openalex.org/I181565077"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojun Cao","raw_affiliation_strings":["Georgia State University,Department of Computer Science,USA","Department of Computer Science, Georgia State University, USA"],"affiliations":[{"raw_affiliation_string":"Georgia State University,Department of Computer Science,USA","institution_ids":["https://openalex.org/I181565077"]},{"raw_affiliation_string":"Department of Computer Science, Georgia State University, USA","institution_ids":["https://openalex.org/I181565077"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5079356223"],"corresponding_institution_ids":["https://openalex.org/I4800084"],"apc_list":null,"apc_paid":null,"fwci":1.0061,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.78518772,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"2093","last_page":"2098"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.652726411819458},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6361515522003174},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4844801127910614},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4695877134799957},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45445844531059265},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3684425354003906},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2584226727485657},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.13595473766326904}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.652726411819458},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6361515522003174},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4844801127910614},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4695877134799957},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45445844531059265},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3684425354003906},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2584226727485657},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.13595473766326904},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom54140.2023.10436953","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/globecom54140.2023.10436953","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2023 - 2023 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1986685589","https://openalex.org/W2994604822","https://openalex.org/W3047197714","https://openalex.org/W3082398320","https://openalex.org/W3095215734","https://openalex.org/W3105784185","https://openalex.org/W3153694850","https://openalex.org/W3217809388","https://openalex.org/W4224932126","https://openalex.org/W4225937726","https://openalex.org/W4229029708","https://openalex.org/W4290702409","https://openalex.org/W4292260424","https://openalex.org/W4293902050","https://openalex.org/W4309880845","https://openalex.org/W4328027902"],"related_works":["https://openalex.org/W2770234245","https://openalex.org/W96612179","https://openalex.org/W4229499248","https://openalex.org/W2566006169","https://openalex.org/W1567818861","https://openalex.org/W2987774938","https://openalex.org/W4256492088","https://openalex.org/W632915154","https://openalex.org/W2055733372","https://openalex.org/W3022067003"],"abstract_inverted_index":{"Frequent":[0],"cyber-attacks":[1],"force":[2],"the":[3,52,66,84,89,96,110,113,120,127,130,136,162,167],"service":[4,9,59,100],"provider":[5],"to":[6,12,18,63,75,82,117,134],"employ":[7],"security-aware":[8,23,58,99],"functions":[10],"(SFs)":[11],"accommodate":[13],"client":[14],"network":[15,49],"requests.":[16],"Thanks":[17],"virtualization":[19],"techniques'":[20],"maturity,":[21],"a":[22,47,123],"SF":[24],"can":[25],"be":[26],"provided":[27],"by":[28],"diverse":[29],"vendors":[30],"with":[31],"various":[32,38,57],"configurations,":[33],"each":[34],"of":[35,91,98,112,122],"which":[36],"needs":[37],"implementation":[39],"cost":[40,92,128],"and":[41,78,104,126],"provides":[42],"different":[43],"security":[44,67,86,138],"levels.":[45],"When":[46],"client's":[48,85,137],"request":[50],"comes,":[51],"multi-configuration":[53],"SFs":[54],"could":[55],"compose":[56,77],"function":[60,101],"chains":[61],"(S-SFCs)":[62],"flexibly":[64],"satisfy":[65,83,135],"requirement.":[68,87,139],"In":[69],"this":[70,142],"paper,":[71],"we":[72,94,144],"investigate":[73],"how":[74],"efficiently":[76,118],"embed":[79],"an":[80,146],"S-SFC":[81,151],"With":[88],"objective":[90],"optimization,":[93],"formulate":[95],"problem":[97],"chain":[102],"deployment":[103,152],"prove":[105],"its":[106],"NP-hardness.":[107],"We":[108],"propose":[109],"technique":[111],"security-cost-balance":[114],"(SCB)":[115],"factor":[116],"consider":[119],"capability":[121],"physical":[124],"node":[125,131],"when":[129],"is":[132],"employed":[133],"Based":[140],"on":[141],"technique,":[143],"develop":[145],"efficient":[147],"algorithm":[148],"called":[149],"SCB-based":[150],"(SCB-SD).":[153],"The":[154],"simulation":[155],"results":[156],"show":[157],"that":[158],"SCB-SD":[159],"significantly":[160],"outperforms":[161],"benchmarks":[163],"directly":[164],"extended":[165],"from":[166],"state-of-the-art.":[168]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4}],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
