{"id":"https://openalex.org/W4386352847","doi":"https://doi.org/10.1109/icccn58024.2023.10230115","title":"Automatic Synthesis of Network Security Services: A First Step","display_name":"Automatic Synthesis of Network Security Services: A First Step","publication_year":2023,"publication_date":"2023-07-01","ids":{"openalex":"https://openalex.org/W4386352847","doi":"https://doi.org/10.1109/icccn58024.2023.10230115"},"language":"en","primary_location":{"id":"doi:10.1109/icccn58024.2023.10230115","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn58024.2023.10230115","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084553698","display_name":"Lei Xu","orcid":"https://orcid.org/0000-0002-3556-8873"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lei Xu","raw_affiliation_strings":["Texas A&#x0026;M University,SUCCESS Lab"],"affiliations":[{"raw_affiliation_string":"Texas A&#x0026;M University,SUCCESS Lab","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033486717","display_name":"Yangyong Zhang","orcid":"https://orcid.org/0000-0003-3324-2949"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yangyong Zhang","raw_affiliation_strings":["Texas A&#x0026;M University,SUCCESS Lab"],"affiliations":[{"raw_affiliation_string":"Texas A&#x0026;M University,SUCCESS Lab","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006230356","display_name":"Phakpoom Chinprutthiwong","orcid":"https://orcid.org/0000-0002-0177-5524"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Phakpoom Chinprutthiwong","raw_affiliation_strings":["Texas A&#x0026;M University,SUCCESS Lab"],"affiliations":[{"raw_affiliation_string":"Texas A&#x0026;M University,SUCCESS Lab","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058852421","display_name":"Guofei Gu","orcid":"https://orcid.org/0000-0003-0630-741X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guofei Gu","raw_affiliation_strings":["Texas A&#x0026;M University,SUCCESS Lab"],"affiliations":[{"raw_affiliation_string":"Texas A&#x0026;M University,SUCCESS Lab","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5084553698"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2006,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.49750099,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8268016576766968},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.6472231149673462},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.5779348611831665},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.5621006488800049},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5315119028091431},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.47446542978286743},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4479420483112335},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4412226974964142},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4284106492996216},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.424544095993042},{"id":"https://openalex.org/keywords/deliverable","display_name":"Deliverable","score":0.41850125789642334},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.41803228855133057},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.23777088522911072},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.13529419898986816},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11657789349555969},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1022733747959137}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8268016576766968},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.6472231149673462},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.5779348611831665},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.5621006488800049},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5315119028091431},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.47446542978286743},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4479420483112335},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4412226974964142},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4284106492996216},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.424544095993042},{"id":"https://openalex.org/C21883318","wikidata":"https://www.wikidata.org/wiki/Q2297847","display_name":"Deliverable","level":2,"score":0.41850125789642334},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.41803228855133057},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.23777088522911072},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.13529419898986816},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11657789349555969},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1022733747959137},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn58024.2023.10230115","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn58024.2023.10230115","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 32nd International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12","score":0.5099999904632568}],"awards":[{"id":"https://openalex.org/G4475599449","display_name":null,"funder_award_id":"N00014-20-1-2734","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G7968527118","display_name":null,"funder_award_id":"1700544,1816497,2148374","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W14283786","https://openalex.org/W49496018","https://openalex.org/W79696261","https://openalex.org/W766097457","https://openalex.org/W1437814062","https://openalex.org/W1438616768","https://openalex.org/W1486426806","https://openalex.org/W1488197732","https://openalex.org/W1647729745","https://openalex.org/W2019419295","https://openalex.org/W2019798206","https://openalex.org/W2028722148","https://openalex.org/W2057439722","https://openalex.org/W2062596448","https://openalex.org/W2078922545","https://openalex.org/W2079372196","https://openalex.org/W2111209739","https://openalex.org/W2134126205","https://openalex.org/W2137845741","https://openalex.org/W2150656895","https://openalex.org/W2155624544","https://openalex.org/W2163593754","https://openalex.org/W2251797829","https://openalex.org/W2256352919","https://openalex.org/W2498885363","https://openalex.org/W2514714814","https://openalex.org/W2538057479","https://openalex.org/W2538865281","https://openalex.org/W2571842322","https://openalex.org/W2612493356","https://openalex.org/W2762513422","https://openalex.org/W2892214024","https://openalex.org/W2963026732","https://openalex.org/W2963545046","https://openalex.org/W2963617989","https://openalex.org/W2964325845","https://openalex.org/W4234045312","https://openalex.org/W4235505822","https://openalex.org/W4292779060","https://openalex.org/W6603196380","https://openalex.org/W6628346335","https://openalex.org/W6628353899","https://openalex.org/W6628906117","https://openalex.org/W6629171565","https://openalex.org/W6636975626","https://openalex.org/W6682894363","https://openalex.org/W6684118736","https://openalex.org/W6691634304","https://openalex.org/W6732124536","https://openalex.org/W6749028843"],"related_works":["https://openalex.org/W1519114293","https://openalex.org/W2368931217","https://openalex.org/W2744631404","https://openalex.org/W2372674753","https://openalex.org/W3012238031","https://openalex.org/W2339586525","https://openalex.org/W2365272235","https://openalex.org/W2370916430","https://openalex.org/W3036769661","https://openalex.org/W2357867417"],"abstract_inverted_index":{"In":[0,60,169],"the":[1,46,53,95,106,170,174],"network":[2,11,71,80,108],"security":[3,6,26,40,50,81,109,122,161,167,180,194],"life":[4],"cycle,":[5],"needs":[7,51,87],"are":[8],"initialized":[9],"by":[10,34],"operators":[12,72],"and":[13,19,22,48,128,138,150,159,196],"typically":[14,28],"documented":[15],"in":[16,24,30,73,101,163],"natural":[17,102,125],"languages,":[18],"later":[20],"implemented":[21],"deployed":[23],"developed/acquired":[25],"appliances,":[27],"written":[29],"a":[31,65],"programming":[32],"language":[33,103,126],"third-party":[35],"developers.":[36],"However,":[37],"oftentimes,":[38],"those":[39],"appliances/programs":[41],"may":[42],"not":[43],"quite":[44],"match":[45],"urgent":[47],"fast-evolving":[49],"since":[52],"whole":[54],"developing/deployment":[55],"procedure":[56],"is":[57],"very":[58],"time-consuming.":[59],"this":[61],"paper,":[62],"we":[63,172],"propose":[64],"novel":[66],"framework,":[67],"AUTOSEC,":[68],"to":[69,105,120,133,136,156],"aid":[70],"building":[74],"up":[75],"or":[76],"rapid":[77],"prototyping":[78],"operational":[79],"services":[82,162],"directly":[83],"from":[84,98,124,184],"high-level":[85],"service":[86],"as":[88,90],"automatically":[89,157],"possible.":[91],"AUTOSEC":[92,113,144,178],"helps":[93],"bridge":[94],"huge":[96],"gap":[97],"human":[99],"intents":[100,123,141],"descriptions":[104,182],"deliverable":[107],"services.":[110],"More":[111],"specifically,":[112],"utilizes":[114],"Natural":[115],"Language":[116],"Processing":[117],"(NLP)":[118],"techniques":[119,155],"infer":[121],"descriptions,":[127,192],"then":[129],"performs":[130],"Interactive":[131],"Synthesis":[132],"assist":[134],"users":[135],"validate":[137],"refine":[139],"parsed":[140],"if":[142],"necessary.":[143],"further":[145],"lever-ages":[146],"Software-Defined":[147],"Networking":[148],"(SDN)":[149],"Network":[151],"Function":[152],"Virtualization":[153],"(NFV)":[154],"compose":[158],"instantiate":[160],"terms":[164],"of":[165,177],"refined":[166],"intents.":[168],"evaluation,":[171],"demonstrate":[173],"early":[175],"success":[176],"with":[179],"policy":[181],"collected":[183],"various":[185],"data":[186],"sources":[187],"including":[188],"research":[189],"papers,":[190],"appliance":[191],"real-world":[193],"standards,":[195],"human-written":[197],"policies.":[198]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
