{"id":"https://openalex.org/W2987773263","doi":"https://doi.org/10.1109/tdsc.2019.2906921","title":"Guest Editors\u2019 Introduction: Special Section on Security in Emerging Networking Technologies","display_name":"Guest Editors\u2019 Introduction: Special Section on Security in Emerging Networking Technologies","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W2987773263","doi":"https://doi.org/10.1109/tdsc.2019.2906921","mag":"2987773263"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2019.2906921","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tdsc.2019.2906921","pdf_url":"https://ieeexplore.ieee.org/ielx7/8858/8895602/08895668.pdf","source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/8858/8895602/08895668.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025770693","display_name":"Gail\u2010Joon Ahn","orcid":"https://orcid.org/0000-0002-4271-1666"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Gail-Joon Ahn","raw_affiliation_strings":["Security Engineering for Future Computing (SEFCOM) Laboratory, Arizona State University, Tempe, USA"],"affiliations":[{"raw_affiliation_string":"Security Engineering for Future Computing (SEFCOM) Laboratory, Arizona State University, Tempe, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058852421","display_name":"Guofei Gu","orcid":"https://orcid.org/0000-0003-0630-741X"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guofei Gu","raw_affiliation_strings":["Secure Communication and Computer Systems (SUCCESS) Laboratory, Texas A&M University, College Station, USA"],"affiliations":[{"raw_affiliation_string":"Secure Communication and Computer Systems (SUCCESS) Laboratory, Texas A&M University, College Station, USA","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056657952","display_name":"Hongxin Hu","orcid":"https://orcid.org/0000-0001-8710-247X"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hongxin Hu","raw_affiliation_strings":["School of Computing, Clemson University, Clemson, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing, Clemson University, Clemson, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084473174","display_name":"Seungwon Shin","orcid":"https://orcid.org/0000-0002-1077-5606"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seungwon Shin","raw_affiliation_strings":["School of Electrical Engineering, KAIST, Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, KAIST, Daejeon, South Korea","institution_ids":["https://openalex.org/I157485424"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5025770693"],"corresponding_institution_ids":["https://openalex.org/I55732556"],"apc_list":null,"apc_paid":null,"fwci":0.3708,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.66029573,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"16","issue":"6","first_page":"913","last_page":"914"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9440000057220459,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9440000057220459,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/special-section","display_name":"Special section","score":0.8498721122741699},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6763919591903687},{"id":"https://openalex.org/keywords/section","display_name":"Section (typography)","score":0.6298984289169312},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45858025550842285},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3523332476615906},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12654569745063782},{"id":"https://openalex.org/keywords/engineering-physics","display_name":"Engineering physics","score":0.07564771175384521},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07089397311210632}],"concepts":[{"id":"https://openalex.org/C2993458768","wikidata":"https://www.wikidata.org/wiki/Q3477549","display_name":"Special section","level":2,"score":0.8498721122741699},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6763919591903687},{"id":"https://openalex.org/C2780129039","wikidata":"https://www.wikidata.org/wiki/Q1931107","display_name":"Section (typography)","level":2,"score":0.6298984289169312},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45858025550842285},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3523332476615906},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12654569745063782},{"id":"https://openalex.org/C61696701","wikidata":"https://www.wikidata.org/wiki/Q770766","display_name":"Engineering physics","level":1,"score":0.07564771175384521},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07089397311210632}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2019.2906921","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tdsc.2019.2906921","pdf_url":"https://ieeexplore.ieee.org/ielx7/8858/8895602/08895668.pdf","source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/tdsc.2019.2906921","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tdsc.2019.2906921","pdf_url":"https://ieeexplore.ieee.org/ielx7/8858/8895602/08895668.pdf","source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6499999761581421,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2987773263.pdf","grobid_xml":"https://content.openalex.org/works/W2987773263.grobid-xml"},"referenced_works_count":1,"referenced_works":["https://openalex.org/W2987773263"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2560853036","https://openalex.org/W2566696415","https://openalex.org/W1563787543","https://openalex.org/W4249026152","https://openalex.org/W2909241626","https://openalex.org/W2890304493","https://openalex.org/W590015412","https://openalex.org/W4211021113","https://openalex.org/W2966241533"],"abstract_inverted_index":{"The":[0],"papers":[1],"in":[2,8,52,75],"this":[3,32,68],"special":[4],"section":[5],"examine":[6],"security":[7],"emerging":[9],"networking":[10],"technologies.":[11],"Network":[12,128],"infrastructure":[13],"is":[14,35],"undergoing":[15],"a":[16,95],"major":[17],"shift":[18,34],"away":[19],"from":[20,78,170],"ossified":[21],"hardware-based":[22,102,145],"networks":[23,91],"to":[24,63,82,124,139],"programmable":[25],"software-based":[26],"networks.":[27,85],"One":[28],"compelling":[29],"example":[30],"of":[31,38,98],"paradigm":[33,138],"the":[36,57,72,79,87],"advent":[37],"Software-":[39],"Defined":[40],"Networking":[41],"(SDN).":[42],"A":[43],"traditional":[44],"network":[45,58,76,137,146],"mixes":[46],"control":[47,73],"and":[48,61,100,108,126,155,163,173],"traffic":[49],"processing":[50],"logic":[51],"single":[53],"hardware":[54],"devices,":[55],"making":[56],"more":[59],"complex":[60],"harder":[62],"manage.":[64],"SDN":[65,162],"has":[66],"addressed":[67],"issue":[69],"by":[70,143],"decoupling":[71],"plane":[74,81],"devices":[77],"data":[80],"simplify":[83],"production":[84],"On":[86],"other":[88],"hand,":[89],"enterprise":[90],"are":[92],"populated":[93],"with":[94,148],"large":[96],"number":[97],"proprietary":[99],"expensive":[101],"middleboxes,":[103],"such":[104,116],"as":[105,117,134],"firewall,":[106],"IDS/IPS,":[107],"load":[109],"balancing.":[110],"Hardware-based":[111],"middleboxes":[112],"present":[113],"significant":[114,168],"drawbacks":[115,142],"high":[118],"costs,":[119],"management":[120],"complexity,":[121],"slow":[122],"time":[123],"market,":[125],"unscalability.":[127],"Function":[129],"Virtualization":[130],"(NFV)":[131],"was":[132],"proposed":[133],"another":[135],"new":[136],"address":[140],"those":[141],"replacing":[144],"functions":[147],"virtualized":[149],"software":[150],"systems":[151],"running":[152],"on":[153],"generic":[154],"inexpensive":[156],"commodity":[157],"hardware.":[158],"Given":[159],"their":[160],"benefits,":[161],"NFV":[164],"have":[165],"recently":[166],"attracted":[167],"attention":[169],"both":[171],"academia":[172],"industry.":[174]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
