{"id":"https://openalex.org/W2435336823","doi":"https://doi.org/10.1109/isias.2015.7492749","title":"Software-defined networks, security aspects analysis","display_name":"Software-defined networks, security aspects analysis","publication_year":2015,"publication_date":"2015-12-01","ids":{"openalex":"https://openalex.org/W2435336823","doi":"https://doi.org/10.1109/isias.2015.7492749","mag":"2435336823"},"language":"en","primary_location":{"id":"doi:10.1109/isias.2015.7492749","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2015.7492749","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 11th International Conference on Information Assurance and Security (IAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069167165","display_name":"Jaouad Benabbou","orcid":"https://orcid.org/0000-0001-8135-6954"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jaouad Benabbou","raw_affiliation_strings":["Network and Telecommunication Department, ENSA, Marrakech, Morocco"],"affiliations":[{"raw_affiliation_string":"Network and Telecommunication Department, ENSA, Marrakech, Morocco","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042920616","display_name":"Khalid Elbaamrani","orcid":"https://orcid.org/0000-0002-7902-9396"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Khalid Elbaamrani","raw_affiliation_strings":["Network and Telecommunication Department, ENSA, Marrakech, Morocco"],"affiliations":[{"raw_affiliation_string":"Network and Telecommunication Department, ENSA, Marrakech, Morocco","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064111211","display_name":"Noureddine Idboufker","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Noureddine Idboufker","raw_affiliation_strings":["Network and Telecommunication Department, ENSA, Marrakech, Morocco"],"affiliations":[{"raw_affiliation_string":"Network and Telecommunication Department, ENSA, Marrakech, Morocco","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108351052","display_name":"Raja Elassali","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Raja Elassali","raw_affiliation_strings":["Network and Telecommunication Department, ENSA, Marrakech, Morocco"],"affiliations":[{"raw_affiliation_string":"Network and Telecommunication Department, ENSA, Marrakech, Morocco","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5069167165"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7008,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.77966476,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"79","last_page":"84"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.7677310109138489},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.7248706817626953},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7147093415260315},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.6839219331741333},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5891532301902771},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.587731659412384},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5839591026306152},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.5578248500823975},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5465096235275269},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5322729349136353},{"id":"https://openalex.org/keywords/openflow","display_name":"OpenFlow","score":0.5158783197402954},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.5123649835586548},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4739938974380493},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.46461474895477295},{"id":"https://openalex.org/keywords/maturity","display_name":"Maturity (psychological)","score":0.4633638560771942},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.46055424213409424},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4563399851322174},{"id":"https://openalex.org/keywords/security-convergence","display_name":"Security convergence","score":0.45046207308769226},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.43706193566322327},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.42829132080078125},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17215973138809204},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.13048839569091797}],"concepts":[{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.7677310109138489},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.7248706817626953},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7147093415260315},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.6839219331741333},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5891532301902771},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.587731659412384},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5839591026306152},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.5578248500823975},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5465096235275269},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5322729349136353},{"id":"https://openalex.org/C192697461","wikidata":"https://www.wikidata.org/wiki/Q4045918","display_name":"OpenFlow","level":3,"score":0.5158783197402954},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.5123649835586548},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4739938974380493},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.46461474895477295},{"id":"https://openalex.org/C101433766","wikidata":"https://www.wikidata.org/wiki/Q3543263","display_name":"Maturity (psychological)","level":2,"score":0.4633638560771942},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.46055424213409424},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4563399851322174},{"id":"https://openalex.org/C52420254","wikidata":"https://www.wikidata.org/wiki/Q7445028","display_name":"Security convergence","level":5,"score":0.45046207308769226},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.43706193566322327},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.42829132080078125},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17215973138809204},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.13048839569091797},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C138496976","wikidata":"https://www.wikidata.org/wiki/Q175002","display_name":"Developmental psychology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isias.2015.7492749","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2015.7492749","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 11th International Conference on Information Assurance and Security (IAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12","score":0.5600000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W176839403","https://openalex.org/W2024851343","https://openalex.org/W2137845741","https://openalex.org/W2155624544","https://openalex.org/W2270185624"],"related_works":["https://openalex.org/W2368931217","https://openalex.org/W2378885848","https://openalex.org/W1519114293","https://openalex.org/W4282564355","https://openalex.org/W2379389012","https://openalex.org/W2165898552","https://openalex.org/W2183741450","https://openalex.org/W833563683","https://openalex.org/W2372674753","https://openalex.org/W3012238031"],"abstract_inverted_index":{"The":[0,81,103],"maturity":[1],"level":[2],"of":[3,30,50,63,66,75,87,110,118,146,162],"any":[4],"technology":[5],"grows":[6],"with":[7],"knowledge":[8],"from":[9],"different":[10,139],"security":[11,77,117,140,157],"incidents":[12],"experienced":[13],"throughout":[14],"its":[15,56],"life":[16],"cycle.":[17],"Security":[18],"solutions":[19],"for":[20],"conventional":[21],"networks":[22],"are":[23,34],"developed":[24,45],"by":[25,78,142],"capitalizing":[26],"on":[27,155],"the":[28,31,64,73,84,88,96,108,111,116,122,127,138,144,147,156,160,163],"profile":[29],"threats":[32],"that":[33,55,130,153],"specific":[35],"to":[36,107],"those":[37],"architectures.":[38],"Since":[39],"SDN":[40,76,112],"concept":[41,113],"has":[42],"not":[43],"yet":[44],"such":[46],"a":[47,92],"strong":[48],"base":[49],"knowledge;":[51],"it":[52],"must":[53],"show":[54],"design":[57],"and":[58,100,150],"implementation":[59],"take":[60],"full":[61],"account":[62],"requirements":[65],"security.":[67],"Through":[68],"this":[69],"article,":[70],"we":[71,135],"address":[72],"issue":[74],"two":[79,133],"dimensions.":[80],"first":[82],"is":[83,105],"intrinsic":[85],"resilience":[86],"network":[89,123],"itself":[90],"as":[91],"key":[93],"asset":[94],"within":[95],"information":[97],"system":[98],"(availability":[99],"access":[101],"control).":[102],"second":[104],"related":[106],"contribution":[109],"in":[114],"improving":[115],"data":[119],"transmitted":[120],"over":[121],"(security":[124],"applications).":[125],"Given":[126],"few":[128],"studies":[129,152],"discussed":[131],"these":[132],"dimensions,":[134],"will":[136],"analyze":[137],"issues":[141],"confronting":[143],"recommendations":[145],"OpenFlow":[148],"specification":[149],"some":[151],"focused":[154],"area":[158],"against":[159],"state":[161],"art.":[164]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
