{"id":"https://openalex.org/W4402155935","doi":"https://doi.org/10.1109/icc51166.2024.10622657","title":"Deploying Security-Aware Service Function Chains with Asymmetric Dedicated Protection","display_name":"Deploying Security-Aware Service Function Chains with Asymmetric Dedicated Protection","publication_year":2024,"publication_date":"2024-06-09","ids":{"openalex":"https://openalex.org/W4402155935","doi":"https://doi.org/10.1109/icc51166.2024.10622657"},"language":"en","primary_location":{"id":"doi:10.1109/icc51166.2024.10622657","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc51166.2024.10622657","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2024 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079356223","display_name":"Danyang Zheng","orcid":"https://orcid.org/0000-0002-3031-7856"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Danyang Zheng","raw_affiliation_strings":["Southwest Jiaotong University,School of Computing and Artificial Intelligence,China"],"affiliations":[{"raw_affiliation_string":"Southwest Jiaotong University,School of Computing and Artificial Intelligence,China","institution_ids":["https://openalex.org/I4800084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043877842","display_name":"Shaohua Cao","orcid":"https://orcid.org/0000-0001-8287-2942"},"institutions":[{"id":"https://openalex.org/I4210162190","display_name":"China University of Petroleum, East China","ror":"https://ror.org/05gbn2817","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210162190"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaohua Cao","raw_affiliation_strings":["China University of Petroleum (East China),College of Computer Science and Technology,Qingdao,China"],"affiliations":[{"raw_affiliation_string":"China University of Petroleum (East China),College of Computer Science and Technology,Qingdao,China","institution_ids":["https://openalex.org/I4210162190"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064192743","display_name":"Honghui Xu","orcid":"https://orcid.org/0000-0002-9128-8454"},"institutions":[{"id":"https://openalex.org/I181565077","display_name":"Georgia State University","ror":"https://ror.org/03qt6ba18","country_code":"US","type":"education","lineage":["https://openalex.org/I181565077"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Honghui Xu","raw_affiliation_strings":["Georgia State University,Department of Computer Science,USA"],"affiliations":[{"raw_affiliation_string":"Georgia State University,Department of Computer Science,USA","institution_ids":["https://openalex.org/I181565077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069042354","display_name":"Xiaojun Cao","orcid":"https://orcid.org/0009-0001-7432-7837"},"institutions":[{"id":"https://openalex.org/I181565077","display_name":"Georgia State University","ror":"https://ror.org/03qt6ba18","country_code":"US","type":"education","lineage":["https://openalex.org/I181565077"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojun Cao","raw_affiliation_strings":["Georgia State University,Department of Computer Science,USA"],"affiliations":[{"raw_affiliation_string":"Georgia State University,Department of Computer Science,USA","institution_ids":["https://openalex.org/I181565077"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5079356223"],"corresponding_institution_ids":["https://openalex.org/I4800084"],"apc_list":null,"apc_paid":null,"fwci":1.0958,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.78916733,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1066","last_page":"1071"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6103069186210632},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.591863751411438},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5276638269424438},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.48337453603744507},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.33470603823661804}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6103069186210632},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.591863751411438},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5276638269424438},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.48337453603744507},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.33470603823661804},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc51166.2024.10622657","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc51166.2024.10622657","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2024 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2994604822","https://openalex.org/W3047197714","https://openalex.org/W3095215734","https://openalex.org/W3153694850","https://openalex.org/W4206171179","https://openalex.org/W4224932126","https://openalex.org/W4292260424","https://openalex.org/W4293902050","https://openalex.org/W4328027902"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"In":[0],"the":[1,23,38,49,65,73,89,109,116,129,138,171,175],"emerging":[2],"applications":[3],"of":[4,25,43,91,140,181],"edge":[5],"computing":[6],"(e.g.,":[7],"unmanned":[8],"factories":[9],"and":[10,19,40,82,94,103,118,144,147,183],"meta-verse),":[11],"network":[12],"requests":[13],"are":[14,35],"required":[15],"to":[16,47,63,123],"be":[17],"securely":[18],"reliably":[20],"delivered":[21],"in":[22,37],"form":[24],"service":[26,55],"function":[27],"chains":[28],"(SFCs).":[29],"To":[30,99,151],"enhance":[31],"security,":[32],"security-aware":[33,50,97],"SFs":[34],"employed":[36],"SFC,":[39],"this":[41,153],"type":[42],"SFC":[44,51,62,74,80,131],"is":[45],"referred":[46],"as":[48,128],"(S-SFC).":[52],"For":[53,84],"reliability,":[54],"providers":[56],"can":[57],"employ":[58],"a":[59,96],"dedicated":[60,132],"backup":[61,119],"protect":[64,104],"primary":[66,117],"one.":[67],"However,":[68],"no":[69],"existing":[70],"works":[71],"addressed":[72],"deployment":[75,163],"mechanisms":[76],"that":[77,170],"jointly":[78,92],"consider":[79],"reliability":[81],"security.":[83],"this,":[85],"here,":[86],"we":[87,107,136,155],"investigate":[88],"problem":[90,139],"embedding":[93],"protecting":[95],"SFC.":[98],"efficiently":[100],"compose,":[101],"embed,":[102],"an":[105,125,157,179],"S-SFC,":[106],"propose":[108],"S-SFC":[110,141,162],"asymmetric":[111],"protection":[112,133,145],"concept,":[113],"which":[114],"allows":[115],"SFCs":[120],"not":[121],"necessarily":[122],"follow":[124],"identical":[126],"structure":[127],"traditional":[130],"does.":[134],"Next,":[135],"formulate":[137,156],"composing,":[142],"embedding,":[143],"(S-SFCEP)":[146],"prove":[148],"its":[149],"NP-hardness.":[150],"tackle":[152],"problem,":[154],"efficient":[158],"algorithm,":[159],"namely,":[160],"sub-chain-based":[161],"(SCB-SD).":[164],"Our":[165],"extensive":[166],"simulation":[167],"results":[168],"show":[169],"proposed":[172],"SCB-SD":[173],"outperforms":[174],"state-of-the-art":[176],"benchmarks":[177],"by":[178],"average":[180],"13.86%":[182],"23.19%,":[184],"respectively.":[185]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
