{"id":"https://openalex.org/W2049138679","doi":"https://doi.org/10.1109/sii.2012.6427357","title":"Data-wise Routing in Virtualization Environment (DRIVE) with multiple level of security for tactical network","display_name":"Data-wise Routing in Virtualization Environment (DRIVE) with multiple level of security for tactical network","publication_year":2012,"publication_date":"2012-12-01","ids":{"openalex":"https://openalex.org/W2049138679","doi":"https://doi.org/10.1109/sii.2012.6427357","mag":"2049138679"},"language":"en","primary_location":{"id":"doi:10.1109/sii.2012.6427357","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sii.2012.6427357","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE/SICE International Symposium on System Integration (SII)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077226157","display_name":"Jiradett Kerdsri","orcid":"https://orcid.org/0000-0003-0257-131X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jiradett Kerdsri","raw_affiliation_strings":["School of Information, Computer and Communication Technology (ICT), Sirindhorn International Institute of Technology, Thailand and Defence Technology Institute, Thailand","School of Information, Computer, and Communication Technology (ICT), Sirindhorn International Institute of Technology, Thailand"],"affiliations":[{"raw_affiliation_string":"School of Information, Computer and Communication Technology (ICT), Sirindhorn International Institute of Technology, Thailand and Defence Technology Institute, Thailand","institution_ids":[]},{"raw_affiliation_string":"School of Information, Computer, and Communication Technology (ICT), Sirindhorn International Institute of Technology, Thailand","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033769180","display_name":"Komwut Wipusitwarkun","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Komwut Wipusitwarkun","raw_affiliation_strings":["School of Information, Computer, and Communication Technology (ICT), Sirindhorn International Institute of Technology, Thailand"],"affiliations":[{"raw_affiliation_string":"School of Information, Computer, and Communication Technology (ICT), Sirindhorn International Institute of Technology, Thailand","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5077226157"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3546,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.6282229,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"5","issue":null,"first_page":"933","last_page":"938"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7546491622924805},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6704664826393127},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.5675296187400818},{"id":"https://openalex.org/keywords/network-virtualization","display_name":"Network virtualization","score":0.4798992872238159},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4687115550041199},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.4567086398601532},{"id":"https://openalex.org/keywords/network-management-station","display_name":"Network management station","score":0.44156602025032043},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4290429353713989},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.42058658599853516},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.3954182267189026},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38862845301628113},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3371387720108032},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.1726786494255066},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.16601932048797607},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15609130263328552},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10765248537063599},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0797819197177887}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7546491622924805},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6704664826393127},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.5675296187400818},{"id":"https://openalex.org/C2779898492","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Network virtualization","level":4,"score":0.4798992872238159},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4687115550041199},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.4567086398601532},{"id":"https://openalex.org/C16986412","wikidata":"https://www.wikidata.org/wiki/Q918419","display_name":"Network management station","level":3,"score":0.44156602025032043},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4290429353713989},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.42058658599853516},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.3954182267189026},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38862845301628113},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3371387720108032},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1726786494255066},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.16601932048797607},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15609130263328552},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10765248537063599},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0797819197177887},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sii.2012.6427357","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sii.2012.6427357","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE/SICE International Symposium on System Integration (SII)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","id":"https://metadata.un.org/sdg/13","score":0.7099999785423279}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1570144471","https://openalex.org/W1572481965","https://openalex.org/W1728204734","https://openalex.org/W1982888589","https://openalex.org/W1989522807","https://openalex.org/W2021497904","https://openalex.org/W2032094375","https://openalex.org/W2060898162","https://openalex.org/W2115456330","https://openalex.org/W2147118406","https://openalex.org/W2157232606","https://openalex.org/W2163071443","https://openalex.org/W2169366906","https://openalex.org/W2963005734","https://openalex.org/W6637556565","https://openalex.org/W6682906865"],"related_works":["https://openalex.org/W2461440407","https://openalex.org/W2317094215","https://openalex.org/W112648010","https://openalex.org/W2947277503","https://openalex.org/W2038957884","https://openalex.org/W206565998","https://openalex.org/W2122873612","https://openalex.org/W2802062002","https://openalex.org/W4386487255","https://openalex.org/W1510463083"],"abstract_inverted_index":{"With":[0],"the":[1,36,78,93,101,109,131,142,150,160,165],"rapid":[2],"advanced":[3,116],"in":[4,92,108,155],"network":[5,23,43,80,113,145,157],"technology,":[6],"Network":[7],"Virtualization":[8],"has":[9],"come":[10],"into":[11],"existence":[12],"as":[13,52],"a":[14],"new":[15,79],"approach":[16],"of":[17,73,97,103,111,126,135,144,152,168],"Active/Programmable":[18],"Network.":[19],"This":[20,137],"software":[21],"defined":[22],"platform":[24],"makes":[25],"it":[26,119],"possible":[27],"to":[28,60,82,89,122,148],"design":[29],"revolutionary":[30],"networking":[31],"architectures":[32],"that":[33,128],"go":[34],"beyond":[35],"current":[37],"TCP/IP":[38],"based":[39,163],"network.":[40,172],"Clearly,":[41],"traditional":[42,156],"can":[44,129],"suffer":[45],"and":[46,66,86,158],"fail":[47],"under":[48],"extreme":[49],"environment":[50],"such":[51],"disaster":[53],"recovery":[54],"or":[55],"military":[56,112,153],"tactical":[57,74,117,171],"networks":[58,75],"due":[59],"their":[61],"wireless":[62],"ad":[63],"hoc":[64],"nature":[65],"inherent":[67],"node":[68],"mobility.":[69],"The":[70],"peculiar":[71],"characteristics":[72],"call":[76],"for":[77,170],"paradigms":[81],"realize":[83],"complex,":[84],"adaptive,":[85],"fault-tolerant":[87],"applications":[88],"be":[90],"deployed":[91],"battlefield.":[94],"However,":[95],"none":[96],"approaches":[98],"concerns":[99],"about":[100],"significance":[102],"data":[104],"which":[105],"is":[106,120,139],"crucial":[107],"concept":[110],"operation.":[114],"For":[115],"network,":[118],"necessary":[121],"provide":[123],"multiple":[124],"level":[125,167],"security":[127,169],"accommodate":[130],"different":[132],"sensitivity":[133],"levels":[134],"information.":[136],"research":[138],"focused":[140],"on":[141,164],"use":[143],"virtualization":[146],"technique":[147],"address":[149],"restricts":[151],"communication":[154],"proposes":[159],"routing":[161],"mechanism":[162],"multi":[166]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
