{"id":"https://openalex.org/W4205605218","doi":"https://doi.org/10.1109/tifs.2022.3142995","title":"Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling","display_name":"Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4205605218","doi":"https://doi.org/10.1109/tifs.2022.3142995"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3142995","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3142995","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100350165","display_name":"Qi Li","orcid":"https://orcid.org/0000-0001-8776-8730"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qi Li","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace and the Beijing National Research Centre for Information Science and Technology (BNRist), Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace and the Beijing National Research Centre for Information Science and Technology (BNRist), Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068492222","display_name":"Xinhao Deng","orcid":"https://orcid.org/0000-0002-4366-4777"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinhao Deng","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace and the Beijing National Research Centre for Information Science and Technology (BNRist), Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace and the Beijing National Research Centre for Information Science and Technology (BNRist), Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045206037","display_name":"Zhuotao Liu","orcid":"https://orcid.org/0000-0002-7532-0434"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhuotao Liu","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace and the Beijing National Research Centre for Information Science and Technology (BNRist), Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace and the Beijing National Research Centre for Information Science and Technology (BNRist), Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101579014","display_name":"Yuan Yang","orcid":"https://orcid.org/0000-0002-3481-8447"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Yang","raw_affiliation_strings":["Department of Computer Science, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078020800","display_name":"Xiaoyue Zou","orcid":"https://orcid.org/0000-0003-1954-828X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyue Zou","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace and the Beijing National Research Centre for Information Science and Technology (BNRist), Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace and the Beijing National Research Centre for Information Science and Technology (BNRist), Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100391116","display_name":"Qian Wang","orcid":"https://orcid.org/0000-0002-8967-8525"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Wang","raw_affiliation_strings":["School of Computer Science, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100771111","display_name":"Mingwei Xu","orcid":"https://orcid.org/0000-0002-4847-4585"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingwei Xu","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace and the Beijing National Research Centre for Information Science and Technology (BNRist), Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace and the Beijing National Research Centre for Information Science and Technology (BNRist), Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001949272","display_name":"Jianping Wu","orcid":"https://orcid.org/0000-0002-8887-8031"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianping Wu","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace and the Beijing National Research Centre for Information Science and Technology (BNRist), Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace and the Beijing National Research Centre for Information Science and Technology (BNRist), Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5100350165"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":2.8535,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.90659905,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"17","issue":null,"first_page":"486","last_page":"499"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6021484136581421},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.546557605266571},{"id":"https://openalex.org/keywords/flow-network","display_name":"Flow network","score":0.4789862632751465},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.47461047768592834},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.45858925580978394},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4181118607521057},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.34830889105796814},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33537018299102783},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2750641405582428},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.14340686798095703}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6021484136581421},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.546557605266571},{"id":"https://openalex.org/C114809511","wikidata":"https://www.wikidata.org/wiki/Q1412924","display_name":"Flow network","level":2,"score":0.4789862632751465},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.47461047768592834},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.45858925580978394},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4181118607521057},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.34830889105796814},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33537018299102783},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2750641405582428},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.14340686798095703},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2022.3142995","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3142995","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2404993877","display_name":null,"funder_award_id":"U20B2049","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5792046107","display_name":null,"funder_award_id":"BNR2020RC01013","funder_id":"https://openalex.org/F4320329777","funder_display_name":"Beijing National Research Center For Information Science And Technology"},{"id":"https://openalex.org/G7155321176","display_name":null,"funder_award_id":"62132011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7711705859","display_name":null,"funder_award_id":"61822207","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7984456499","display_name":null,"funder_award_id":"61872209","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8611733963","display_name":null,"funder_award_id":"2042021gf0006","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329777","display_name":"Beijing National Research Center For Information Science And Technology","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W1561369259","https://openalex.org/W1994926493","https://openalex.org/W2043255416","https://openalex.org/W2043352445","https://openalex.org/W2054820097","https://openalex.org/W2061827158","https://openalex.org/W2084915558","https://openalex.org/W2121511513","https://openalex.org/W2123372830","https://openalex.org/W2136930733","https://openalex.org/W2138743329","https://openalex.org/W2168936382","https://openalex.org/W2210790443","https://openalex.org/W2260783129","https://openalex.org/W2401610261","https://openalex.org/W2430218455","https://openalex.org/W2460461231","https://openalex.org/W2469760695","https://openalex.org/W2498885363","https://openalex.org/W2500898769","https://openalex.org/W2559018133","https://openalex.org/W2561486434","https://openalex.org/W2586118222","https://openalex.org/W2612238903","https://openalex.org/W2620704227","https://openalex.org/W2731182695","https://openalex.org/W2734629956","https://openalex.org/W2762629425","https://openalex.org/W2789780249","https://openalex.org/W2789994870","https://openalex.org/W2790712558","https://openalex.org/W2792866491","https://openalex.org/W2809461016","https://openalex.org/W2811280985","https://openalex.org/W2886902868","https://openalex.org/W2901980690","https://openalex.org/W2912731102","https://openalex.org/W2932177597","https://openalex.org/W2962948535","https://openalex.org/W2963905123","https://openalex.org/W2997947960","https://openalex.org/W3008207353","https://openalex.org/W3014210387","https://openalex.org/W3047037323","https://openalex.org/W3047618457","https://openalex.org/W3105520655","https://openalex.org/W3111506026","https://openalex.org/W4236202168","https://openalex.org/W6628906117","https://openalex.org/W6630085363","https://openalex.org/W6636118494","https://openalex.org/W6687889994"],"related_works":["https://openalex.org/W2770234245","https://openalex.org/W96612179","https://openalex.org/W4229499248","https://openalex.org/W2566006169","https://openalex.org/W1567818861","https://openalex.org/W2280422768","https://openalex.org/W3143197806","https://openalex.org/W2987774938","https://openalex.org/W4252555497","https://openalex.org/W4256492088"],"abstract_inverted_index":{"Network":[0],"Function":[1],"Virtualization":[2],"(NFV)":[3],"is":[4,45,135],"a":[5],"new":[6],"networking":[7],"paradigm":[8],"to":[9,86,104,147,159,206],"enable":[10],"dynamic":[11,116],"network":[12,50,74,187],"function":[13,22,40,57,64,71,110,119,188,235],"deployment":[14,23,65],"in":[15,26,42,90],"networks.":[16],"Existing":[17],"studies":[18,30],"focused":[19],"on":[20,59,73],"optimized":[21],"and":[24,118,131,144],"management":[25],"NFV.":[27],"Unfortunately,":[28],"these":[29],"did":[31],"not":[32,67],"well":[33],"address":[34,87],"the":[35,46,60,106,123,139,161,164,198,200,207,218,231],"problem":[36,112,124,130,140],"of":[37,48,163,221,234],"efficient":[38,69,107],"security":[39,56,70,109],"enforcement":[41,58,72,82,111],"networks,":[43],"which":[44,190],"goal":[47],"deploying":[49],"functions":[51],"(NFs),":[52],"i.e.,":[53],"for":[54],"real-time":[55,108],"traffic,":[61],"since":[62],"optimal":[63,201],"does":[66],"mean":[68],"traffic.":[75],"In":[76,84,203],"particular,":[77,204],"they":[78],"incurred":[79],"significant":[80],"NF":[81],"cost.":[83],"order":[85],"this":[88,91],"issue,":[89],"paper,":[92],"we":[93],"propose":[94],"<inline-formula":[95,165,178,210],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[96,166,179,211],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[97,167,180,212],"<tex-math":[98,168,181,213],"notation=\"LaTeX\">${\\textsf":[99,169,182,214],"{FuncE}}$":[100,170,183,215],"</tex-math></inline-formula>":[101,171,184,216],"that":[102,133,177],"aims":[103],"solve":[105],"by":[113,141,155],"developing":[114,145],"unified":[115],"flow":[117],"scheduling.":[120],"We":[121,137,151],"formulate":[122],"as":[125],"an":[126],"integer":[127],"linear":[128],"programming":[129],"prove":[132],"it":[134,143],"NP-hard.":[136],"tackle":[138],"decomposing":[142],"heuristics":[146],"achieve":[148],"near-optimal":[149,186],"solutions.":[150],"conduct":[152],"comprehensive":[153],"experiments":[154],"using":[156,224],"real":[157],"topologies":[158],"demonstrate":[160,176],"effectiveness":[162],"design.":[172],"The":[173],"experimental":[174],"results":[175],"achieves":[185],"enforcement,":[189],"incurs":[191],"over":[192,225],"100":[193],"times":[194],"less":[195,227],"latency":[196],"than":[197],"existing":[199],"solver.":[202],"compared":[205],"state-of-art":[208],"defenses,":[209],"processes":[217],"same":[219,232],"number":[220],"candidate":[222],"flows":[223],"50%":[226],"VNFs,":[228],"while":[229],"ensuring":[230],"level":[233],"enforcement.":[236]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2025-10-10T00:00:00"}
