{"id":"https://openalex.org/W4281651520","doi":"https://doi.org/10.1109/noms54207.2022.9789909","title":"A NEAT way to test-driven network management","display_name":"A NEAT way to test-driven network management","publication_year":2022,"publication_date":"2022-04-25","ids":{"openalex":"https://openalex.org/W4281651520","doi":"https://doi.org/10.1109/noms54207.2022.9789909"},"language":"en","primary_location":{"id":"doi:10.1109/noms54207.2022.9789909","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms54207.2022.9789909","pdf_url":null,"source":{"id":"https://openalex.org/S4363605650","display_name":"NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078107667","display_name":"Will Fantom","orcid":null},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Will Fantom","raw_affiliation_strings":["Lancaster University,School of Computing and Communications","School of Computing and Communications, Lancaster University"],"affiliations":[{"raw_affiliation_string":"Lancaster University,School of Computing and Communications","institution_ids":["https://openalex.org/I67415387"]},{"raw_affiliation_string":"School of Computing and Communications, Lancaster University","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034473175","display_name":"Paul Alcock","orcid":"https://orcid.org/0000-0002-9231-9013"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Paul Alcock","raw_affiliation_strings":["Lancaster University,School of Computing and Communications","School of Computing and Communications, Lancaster University"],"affiliations":[{"raw_affiliation_string":"Lancaster University,School of Computing and Communications","institution_ids":["https://openalex.org/I67415387"]},{"raw_affiliation_string":"School of Computing and Communications, Lancaster University","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063078354","display_name":"Ben Simms","orcid":null},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ben Simms","raw_affiliation_strings":["Lancaster University,School of Computing and Communications","School of Computing and Communications, Lancaster University"],"affiliations":[{"raw_affiliation_string":"Lancaster University,School of Computing and Communications","institution_ids":["https://openalex.org/I67415387"]},{"raw_affiliation_string":"School of Computing and Communications, Lancaster University","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050029365","display_name":"Charalampos Rotsos","orcid":"https://orcid.org/0000-0003-0252-9373"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Charalampos Rotsos","raw_affiliation_strings":["Lancaster University,School of Computing and Communications","School of Computing and Communications, Lancaster University"],"affiliations":[{"raw_affiliation_string":"Lancaster University,School of Computing and Communications","institution_ids":["https://openalex.org/I67415387"]},{"raw_affiliation_string":"School of Computing and Communications, Lancaster University","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013891693","display_name":"Nicholas Race","orcid":"https://orcid.org/0000-0002-6870-8078"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nicholas Race","raw_affiliation_strings":["Lancaster University,School of Computing and Communications","School of Computing and Communications, Lancaster University"],"affiliations":[{"raw_affiliation_string":"Lancaster University,School of Computing and Communications","institution_ids":["https://openalex.org/I67415387"]},{"raw_affiliation_string":"School of Computing and Communications, Lancaster University","institution_ids":["https://openalex.org/I67415387"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5078107667"],"corresponding_institution_ids":["https://openalex.org/I67415387"],"apc_list":null,"apc_paid":null,"fwci":0.8591,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.65237239,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7880412936210632},{"id":"https://openalex.org/keywords/network-management-station","display_name":"Network management station","score":0.6582203507423401},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.6498972177505493},{"id":"https://openalex.org/keywords/network-simulation","display_name":"Network simulation","score":0.6451727151870728},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.6055102348327637},{"id":"https://openalex.org/keywords/network-monitoring","display_name":"Network monitoring","score":0.5258177518844604},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.5154862999916077},{"id":"https://openalex.org/keywords/configuration-management","display_name":"Configuration Management (ITSM)","score":0.4996626377105713},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.48215362429618835},{"id":"https://openalex.org/keywords/network-management","display_name":"Network management","score":0.46433770656585693},{"id":"https://openalex.org/keywords/networking-hardware","display_name":"Networking hardware","score":0.45890775322914124},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4567824602127075},{"id":"https://openalex.org/keywords/network-service","display_name":"Network service","score":0.44354817271232605},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43540021777153015},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4232610762119293},{"id":"https://openalex.org/keywords/dynamic-network-analysis","display_name":"Dynamic network analysis","score":0.4224848747253418},{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.41987258195877075},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.0996789038181305}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7880412936210632},{"id":"https://openalex.org/C16986412","wikidata":"https://www.wikidata.org/wiki/Q918419","display_name":"Network management station","level":3,"score":0.6582203507423401},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.6498972177505493},{"id":"https://openalex.org/C139940560","wikidata":"https://www.wikidata.org/wiki/Q290036","display_name":"Network simulation","level":2,"score":0.6451727151870728},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6055102348327637},{"id":"https://openalex.org/C81877898","wikidata":"https://www.wikidata.org/wiki/Q1965787","display_name":"Network monitoring","level":2,"score":0.5258177518844604},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.5154862999916077},{"id":"https://openalex.org/C78873551","wikidata":"https://www.wikidata.org/wiki/Q5160111","display_name":"Configuration Management (ITSM)","level":2,"score":0.4996626377105713},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.48215362429618835},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.46433770656585693},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.45890775322914124},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4567824602127075},{"id":"https://openalex.org/C2779618445","wikidata":"https://www.wikidata.org/wiki/Q1640628","display_name":"Network service","level":2,"score":0.44354817271232605},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43540021777153015},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4232610762119293},{"id":"https://openalex.org/C13540734","wikidata":"https://www.wikidata.org/wiki/Q5318996","display_name":"Dynamic network analysis","level":2,"score":0.4224848747253418},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.41987258195877075},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0996789038181305},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/noms54207.2022.9789909","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms54207.2022.9789909","pdf_url":null,"source":{"id":"https://openalex.org/S4363605650","display_name":"NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.lancs.ac.uk:165262","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401916","display_name":"Lancaster EPrints (Lancaster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67415387","host_organization_name":"Lancaster University","host_organization_lineage":["https://openalex.org/I67415387"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1435010830","https://openalex.org/W1574929047","https://openalex.org/W2136451165","https://openalex.org/W2139592393","https://openalex.org/W2146077028","https://openalex.org/W2218937857","https://openalex.org/W2587087058","https://openalex.org/W2774532408","https://openalex.org/W2824525340","https://openalex.org/W2891367726","https://openalex.org/W2963885243","https://openalex.org/W3010728436","https://openalex.org/W4288028074","https://openalex.org/W6628561984","https://openalex.org/W6719622580","https://openalex.org/W6769828913"],"related_works":["https://openalex.org/W2770733137","https://openalex.org/W1593892783","https://openalex.org/W2187171335","https://openalex.org/W1172579643","https://openalex.org/W2057433950","https://openalex.org/W2876187414","https://openalex.org/W4321846333","https://openalex.org/W2964966918","https://openalex.org/W4360977660","https://openalex.org/W2894004150"],"abstract_inverted_index":{"The":[0,13],"increasing":[1],"softwarization":[2],"of":[3,15,23,31,53,128,137,145],"network":[4,11,17,32,37,57,70,95,99,103,119,122,130],"infrastructures":[5],"introduces":[6,84],"an":[7,90],"important":[8],"challenge":[9],"for":[10,94],"configuration.":[12,96],"growth":[14],"the":[16,28,36,51,126,134],"configuration":[18,38,55,71],"space":[19],"as":[20,140,142],"a":[21],"result":[22],"new":[24,43,64],"device":[25],"types":[26],"and":[27,68,105,132],"expanding":[29],"inter-dependence":[30],"service":[33,44,54],"components":[34],"increases":[35],"complexity.":[39],"Compounding":[40],"this":[41],"issue,":[42],"deployment":[45],"architectures":[46],"lack":[47],"mechanisms":[48,65],"to":[49,62,66,101,110,148],"validate":[50,67],"impact":[52],"on":[56],"resilience.":[58],"Network":[59,85],"operators":[60],"need":[61],"adopt":[63],"verify":[69],"changes,":[72],"taking":[73],"inspiration":[74],"from":[75],"popular":[76],"Continuous":[77],"Integration/Continuous":[78],"Development":[79],"(CI/CD)":[80],"mechanisms.":[81],"This":[82],"paper":[83],"Emulation-based":[86],"Automated":[87],"Testing":[88],"(NEAT),":[89],"automated":[91],"testing":[92,138],"framework":[93],"NEAT":[97,116],"allows":[98],"managers":[100,123],"define":[102],"topologies":[104],"tests":[106,131],"through":[107],"YAML":[108],"files,":[109],"then":[111],"be":[112],"later":[113],"executed":[114],"by":[115],"within":[117],"realistic":[118],"topologies.":[120],"Furthermore,":[121],"can":[124],"control":[125],"fidelity":[127],"their":[129],"bound":[133],"execution":[135],"time":[136],"suites,":[139],"well":[141],"exploit":[143],"parallelization":[144],"modern":[146],"servers":[147],"speedup":[149],"test":[150],"execution.":[151]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
