{"id":"https://openalex.org/W4381734242","doi":"https://doi.org/10.1109/noms56928.2023.10154457","title":"Towards Autonomous Computer Networks in Support of Critical Systems","display_name":"Towards Autonomous Computer Networks in Support of Critical Systems","publication_year":2023,"publication_date":"2023-05-08","ids":{"openalex":"https://openalex.org/W4381734242","doi":"https://doi.org/10.1109/noms56928.2023.10154457"},"language":"en","primary_location":{"id":"doi:10.1109/noms56928.2023.10154457","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/noms56928.2023.10154457","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011246061","display_name":"Alessio Sacco","orcid":"https://orcid.org/0000-0003-2835-5455"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Alessio Sacco","raw_affiliation_strings":["Politecnico di Torino,Department of Control and Computer Engineering,Italy","Department of Control and Computer Engineering, Politecnico di Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino,Department of Control and Computer Engineering,Italy","institution_ids":["https://openalex.org/I177477856"]},{"raw_affiliation_string":"Department of Control and Computer Engineering, Politecnico di Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010269472","display_name":"Guido Marchetto","orcid":"https://orcid.org/0000-0003-3588-9367"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Guido Marchetto","raw_affiliation_strings":["Politecnico di Torino,Department of Control and Computer Engineering,Italy","Department of Control and Computer Engineering, Politecnico di Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino,Department of Control and Computer Engineering,Italy","institution_ids":["https://openalex.org/I177477856"]},{"raw_affiliation_string":"Department of Control and Computer Engineering, Politecnico di Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5011246061"],"corresponding_institution_ids":["https://openalex.org/I177477856"],"apc_list":null,"apc_paid":null,"fwci":0.2012,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.47383846,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8496459722518921},{"id":"https://openalex.org/keywords/orchestration","display_name":"Orchestration","score":0.7656887769699097},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.6070270538330078},{"id":"https://openalex.org/keywords/control-reconfiguration","display_name":"Control reconfiguration","score":0.5146099328994751},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.502868115901947},{"id":"https://openalex.org/keywords/network-management","display_name":"Network management","score":0.48974132537841797},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4803091883659363},{"id":"https://openalex.org/keywords/network-congestion","display_name":"Network congestion","score":0.45521894097328186},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.44730043411254883},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4144958555698395},{"id":"https://openalex.org/keywords/virtual-network","display_name":"Virtual network","score":0.4111120402812958},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3633860945701599},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.315104603767395},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.31501346826553345},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.26614657044410706},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.22980079054832458},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13835975527763367},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12169584631919861}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8496459722518921},{"id":"https://openalex.org/C199168358","wikidata":"https://www.wikidata.org/wiki/Q3367000","display_name":"Orchestration","level":3,"score":0.7656887769699097},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6070270538330078},{"id":"https://openalex.org/C119701452","wikidata":"https://www.wikidata.org/wiki/Q5165881","display_name":"Control reconfiguration","level":2,"score":0.5146099328994751},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.502868115901947},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.48974132537841797},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4803091883659363},{"id":"https://openalex.org/C195563490","wikidata":"https://www.wikidata.org/wiki/Q180368","display_name":"Network congestion","level":3,"score":0.45521894097328186},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.44730043411254883},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4144958555698395},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.4111120402812958},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3633860945701599},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.315104603767395},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.31501346826553345},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.26614657044410706},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.22980079054832458},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13835975527763367},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12169584631919861},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C558565934","wikidata":"https://www.wikidata.org/wiki/Q2743","display_name":"Musical","level":2,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/noms56928.2023.10154457","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/noms56928.2023.10154457","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W79913212","https://openalex.org/W2094884983","https://openalex.org/W2890601616","https://openalex.org/W2768673452","https://openalex.org/W2079417790","https://openalex.org/W58944773","https://openalex.org/W1992059001","https://openalex.org/W2794617229","https://openalex.org/W2793291865","https://openalex.org/W2910175092"],"abstract_inverted_index":{"A":[0],"recent":[1,49],"trend":[2],"dictating":[3],"evolution":[4],"of":[5,9,19,30,74,86,105,141,149,162,169,186],"management":[6,50,178],"and":[7,17,27,38,51,61,70,119,129,152,183,220,231,247,254,259],"orchestration":[8,52],"computer":[10,154],"networks":[11,56,249],"is":[12,101,209],"constituted":[13],"by":[14,110,250],"the":[15,25,72,77,84,97,117,147,160,166,193,199,212,228,236],"softwarization":[16],"virtualization":[18],"them,":[20],"which":[21],"have":[22],"drastically":[23],"simplified":[24],"deployment":[26],"real-time":[28],"reconfiguration":[29],"network":[31,78,106,143,177,188,223,261],"functions,":[32],"allowing":[33],"them":[34],"to":[35,39,65,83,158,164,197,210,256],"continuously":[36],"adapt":[37],"deal":[40],"with":[41,174,203],"dynamic":[42],"demands":[43],"in":[44],"an":[45],"automated":[46,82,131,239],"way.":[47],"Alongside,":[48],"approaches":[53],"for":[54,180,238],"softwarized":[55],"employ":[57],"Artificial":[58],"Intelligence":[59],"(AI)":[60],"Machine":[62],"Learning":[63],"(ML)":[64],"further":[66],"reduce":[67],"reaction":[68],"time":[69],"improve":[71,96],"accuracy":[73],"decisions,":[75],"where":[76],"operations":[79,94],"can":[80,95,234],"be":[81],"point":[85],"realizing":[87],"autonomous":[88,153,184],"driving":[89],"networks.":[90],"However,":[91],"while":[92],"automating":[93],"overall":[98],"system":[99],"(it":[100],"acknowledged":[102],"that":[103,145,227,241],"70%":[104],"faults":[107],"are":[108,115,121],"caused":[109],"manual":[111],"errors),":[112],"AI/ML":[113,163],"methods":[114],"not":[116],"panaceas,":[118],"we":[120,136,195],"still":[122],"far":[123],"from":[124,217],"having":[125],"a":[126,138,175,204],"fully":[127],"operating":[128],"efficient":[130],"architecture.":[132],"In":[133],"this":[134],"dissertation,":[135],"present":[137],"novel":[139],"class":[140],"software":[142],"solutions":[144],"share":[146],"goal":[148,208],"enabling":[150],"intelligent":[151],"networks,":[155],"exploring":[156],"how":[157],"exploit":[159],"power":[161],"handle":[165],"growing":[167],"complexity":[168],"critical":[170],"systems.":[171],"We":[172,225],"start":[173],"new":[176],"scheme":[179],"adaptive":[181],"routing":[182],"scaling":[185],"virtual":[187],"resources.":[189],"Then,":[190],"acting":[191],"on":[192],"hosts,":[194],"propose":[196],"adjust":[198],"TCP":[200],"congestion":[201,214],"control":[202],"ML-based":[205],"solution,":[206],"whose":[207],"select":[211],"proper":[213],"window":[215],"learning":[216],"end-to-end":[218],"features":[219],"(when":[221],"available)":[222],"signals.":[224],"believe":[226],"proposed":[229],"solutions,":[230],"their":[232],"combination,":[233],"lay":[235],"foundation":[237],"systems":[240],"better":[242],"suit":[243],"modern":[244],"edge":[245],"environments":[246],"cellular":[248],"providing":[251],"unprecedented":[252],"flexibility":[253],"adaptation":[255],"even":[257],"unseen":[258],"unknown":[260],"conditions.":[262]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
