{"id":"https://openalex.org/W2839163371","doi":"https://doi.org/10.1109/noms.2018.8406113","title":"Introducing network slice management inside M-CORD-based-5G framework","display_name":"Introducing network slice management inside M-CORD-based-5G framework","publication_year":2018,"publication_date":"2018-04-01","ids":{"openalex":"https://openalex.org/W2839163371","doi":"https://doi.org/10.1109/noms.2018.8406113","mag":"2839163371"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms.2018.8406113","pdf_url":null,"source":null,"license":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086310704","display_name":"Muhammad Tahir Abbas","orcid":"https://orcid.org/0000-0001-5495-4318"},"institutions":[{"id":"https://openalex.org/I83202590","display_name":"Jeju National University","ror":"https://ror.org/05hnb4n85","country_code":"KR","type":"education","lineage":["https://openalex.org/I83202590"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Muhammad Tahir Abbas","raw_affiliation_string":"Department of Computer Engineering, Jeju National University, Jeju, South Korea","raw_affiliation_strings":["Department of Computer Engineering, Jeju National University, Jeju, South Korea"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019376708","display_name":"Talha Ahmed Khan","orcid":"https://orcid.org/0000-0003-1552-2728"},"institutions":[{"id":"https://openalex.org/I83202590","display_name":"Jeju National University","ror":"https://ror.org/05hnb4n85","country_code":"KR","type":"education","lineage":["https://openalex.org/I83202590"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Talha Ahmed Khan","raw_affiliation_string":"Department of Computer Engineering, Jeju National University, Jeju, South Korea","raw_affiliation_strings":["Department of Computer Engineering, Jeju National University, Jeju, South Korea"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050762068","display_name":"Asif Mahmood","orcid":"https://orcid.org/0000-0001-6706-7435"},"institutions":[{"id":"https://openalex.org/I83202590","display_name":"Jeju National University","ror":"https://ror.org/05hnb4n85","country_code":"KR","type":"education","lineage":["https://openalex.org/I83202590"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Asif Mahmood","raw_affiliation_string":"Department of Computer Engineering, Jeju National University, Jeju, South Korea","raw_affiliation_strings":["Department of Computer Engineering, Jeju National University, Jeju, South Korea"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030633010","display_name":"Javier Jose Diaz Rivera","orcid":null},"institutions":[{"id":"https://openalex.org/I83202590","display_name":"Jeju National University","ror":"https://ror.org/05hnb4n85","country_code":"KR","type":"education","lineage":["https://openalex.org/I83202590"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Javier Jose Diaz Rivera","raw_affiliation_string":"Department of Computer Engineering, Jeju National University, Jeju, South Korea","raw_affiliation_strings":["Department of Computer Engineering, Jeju National University, Jeju, South Korea"]},{"author_position":"last","author":{"id":"https://openalex.org/A5066464184","display_name":"Wang\u2010Cheol Song","orcid":null},"institutions":[{"id":"https://openalex.org/I83202590","display_name":"Jeju National University","ror":"https://ror.org/05hnb4n85","country_code":"KR","type":"education","lineage":["https://openalex.org/I83202590"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Wang-Cheol Song","raw_affiliation_string":"Department of Computer Engineering, Jeju National University, Jeju, South Korea","raw_affiliation_strings":["Department of Computer Engineering, Jeju National University, Jeju, South Korea"]}],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":15,"cited_by_percentile_year":{"min":90,"max":91},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networking and Network Virtualization","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networking and Network Virtualization","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.995,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Log Analysis and System Performance Diagnosis","score":0.991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"keyword":"network slice management","score":0.6998},{"keyword":"m-cord-based","score":0.25}],"concepts":[{"id":"https://openalex.org/C2776190703","wikidata":"https://www.wikidata.org/wiki/Q488148","display_name":"Slicing","level":2,"score":0.9123727},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.78589725},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.55651444},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.5325398},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5202121},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41587687},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35208017},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.23509672},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13529465},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.119553},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms.2018.8406113","pdf_url":null,"source":null,"license":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.65,"id":"https://metadata.un.org/sdg/9"}],"grants":[],"referenced_works_count":3,"referenced_works":["https://openalex.org/W2042308583","https://openalex.org/W2203805592","https://openalex.org/W3143688091"],"related_works":["https://openalex.org/W2393746923","https://openalex.org/W2972496411","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W3033662781","https://openalex.org/W4239223006","https://openalex.org/W1590307681","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W17155033"],"ngrams_url":"https://api.openalex.org/works/W2839163371/ngrams","abstract_inverted_index":{"Network":[0],"slicing":[1,75,91],"has":[2],"been":[3],"considered":[4],"as":[5,52,126,128,134],"one":[6],"of":[7,44,49,64,76,89],"the":[8,12,37,47,90,100,107,116],"fundamental":[9],"technologies":[10],"in":[11],"fifth":[13],"generation":[14],"(5G)":[15],"mobile":[16],"networks.":[17,42],"Slicing":[18],"mechanism":[19],"enables":[20],"virtual":[21],"networks":[22],"while":[23],"providing":[24],"customized":[25],"services":[26],"on":[27,71,131],"demand.":[28],"There":[29],"are":[30],"several":[31],"papers":[32],"attempting":[33],"to":[34,68,82,102],"narrow":[35],"down":[36],"architectural":[38],"requirement":[39],"for":[40,139],"5G":[41],"Many":[43],"them":[45],"consider":[46],"aspect":[48],"slice":[50,60,73,101,143],"creation":[51],"a":[53,141],"central":[54],"point,":[55],"sometimes":[56],"strengthening":[57],"slices":[58],"with":[59],"isolation.":[61],"The":[62],"aim":[63],"this":[65],"paper":[66],"is":[67],"focus":[69],"more":[70],"network":[72,78,142],"management,":[74],"transport":[77],"(TN)":[79],"and":[80,86,98,124,137],"challenges":[81],"elaborate":[83],"technological":[84],"options":[85],"enablers,":[87],"irrespective":[88],"mechanism.":[92],"Our":[93],"proposed":[94],"framework":[95,114],"creates,":[96],"manages":[97],"associates":[99],"user":[103],"equipment":[104],"(UE)":[105],"upon":[106],"request":[108],"made":[109],"by":[110,120],"different":[111],"applications.":[112],"Proposed":[113],"exploits":[115],"key":[117],"features":[118],"offered":[119],"CORD":[121],"including":[122],"OpenStack":[123],"ONOS":[125],"well":[127],"modules":[129],"based":[130],"M-CORD":[132],"such":[133],"vBBU,":[135],"NSSF":[136],"vEPC":[138],"establishing":[140],"scenario.":[144]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2839163371","counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3}],"updated_date":"2024-03-25T18:59:28.877183","created_date":"2018-07-19"}