{"id":"https://openalex.org/W4406657363","doi":"https://doi.org/10.1109/tmc.2025.3532210","title":"Service Function Chain Deployment With Intrinsic Dynamic Defense Capability","display_name":"Service Function Chain Deployment With Intrinsic Dynamic Defense Capability","publication_year":2025,"publication_date":"2025-01-21","ids":{"openalex":"https://openalex.org/W4406657363","doi":"https://doi.org/10.1109/tmc.2025.3532210"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2025.3532210","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2025.3532210","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100447486","display_name":"Ran Wang","orcid":"https://orcid.org/0000-0001-5601-0513"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ran Wang","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061150224","display_name":"Lin Cai","orcid":"https://orcid.org/0000-0002-1093-4865"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lundan Cai","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100755664","display_name":"Qiang Wu","orcid":"https://orcid.org/0000-0002-9467-1491"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiang Wu","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091266202","display_name":"Dusit Niyato","orcid":"https://orcid.org/0000-0002-7442-7416"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Dusit Niyato","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100447486"],"corresponding_institution_ids":["https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":7.7289,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.96630697,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"24","issue":"6","first_page":"5418","last_page":"5432"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7032718658447266},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5485672354698181},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4737164378166199},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4711381793022156},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44701117277145386},{"id":"https://openalex.org/keywords/chain","display_name":"Chain (unit)","score":0.4414028227329254},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36016130447387695},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3388311266899109},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.12190422415733337},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.11032435297966003},{"id":"https://openalex.org/keywords/cell-biology","display_name":"Cell biology","score":0.08204430341720581}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7032718658447266},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5485672354698181},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4737164378166199},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4711381793022156},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44701117277145386},{"id":"https://openalex.org/C199185054","wikidata":"https://www.wikidata.org/wiki/Q552299","display_name":"Chain (unit)","level":2,"score":0.4414028227329254},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36016130447387695},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3388311266899109},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.12190422415733337},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.11032435297966003},{"id":"https://openalex.org/C95444343","wikidata":"https://www.wikidata.org/wiki/Q7141","display_name":"Cell biology","level":1,"score":0.08204430341720581},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2025.3532210","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2025.3532210","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2190173036","display_name":null,"funder_award_id":"62171218","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1490597296","https://openalex.org/W2021962600","https://openalex.org/W2026317040","https://openalex.org/W2168595508","https://openalex.org/W2433461165","https://openalex.org/W2466998217","https://openalex.org/W2505209768","https://openalex.org/W2536380892","https://openalex.org/W2626071381","https://openalex.org/W2758912691","https://openalex.org/W2771998720","https://openalex.org/W2809351928","https://openalex.org/W2883263864","https://openalex.org/W2890719226","https://openalex.org/W2901980690","https://openalex.org/W2944715069","https://openalex.org/W2949913798","https://openalex.org/W2977950770","https://openalex.org/W2994816468","https://openalex.org/W3013219028","https://openalex.org/W3043610783","https://openalex.org/W3130797412","https://openalex.org/W3138979139","https://openalex.org/W3155199404","https://openalex.org/W3168997536","https://openalex.org/W3172398217","https://openalex.org/W4206324092","https://openalex.org/W4210802542","https://openalex.org/W4214814950","https://openalex.org/W4225146554","https://openalex.org/W4309880845","https://openalex.org/W4310055702","https://openalex.org/W4384158477","https://openalex.org/W4391216112","https://openalex.org/W4395047770","https://openalex.org/W4396712690","https://openalex.org/W4396790588"],"related_works":["https://openalex.org/W2770234245","https://openalex.org/W96612179","https://openalex.org/W4229499248","https://openalex.org/W2566006169","https://openalex.org/W1567818861","https://openalex.org/W2987774938","https://openalex.org/W4256492088","https://openalex.org/W632915154","https://openalex.org/W2055733372","https://openalex.org/W3022067003"],"abstract_inverted_index":{"The":[0,131],"Service":[1,165],"Function":[2,7],"Chain":[3],"(SFC)":[4],"leverages":[5],"Network":[6],"Virtualization":[8],"(NFV)":[9],"and":[10,27,71,80,97,136,171,184,208,213,240],"Software-Defined":[11],"Networking":[12],"(SDN)":[13],"for":[14],"flexible":[15],"deployment,":[16],"creating":[17],"customized":[18],"service":[19],"chains":[20],"tailored":[21],"to":[22,51,57,86,108,124],"specific":[23],"applications.":[24],"As":[25],"NFV":[26],"SDN":[28],"technologies":[29],"play":[30],"crucial":[31],"roles":[32],"in":[33,42],"the":[34,151,235],"SFC":[35,54,110,212],"implementation,":[36],"any":[37],"security":[38,59,65,90,215],"risk":[39],"that":[40,144,222,230],"arises":[41],"an":[43,103,125],"NFV/SDN":[44],"network":[45,58,227],"can":[46],"potentially":[47],"pose":[48],"a":[49,140,175,192],"threat":[50],"SFC.":[52],"Thus,":[53],"becomes":[55],"vulnerable":[56],"attacks.":[60,130,218],"To":[61,161],"address":[62],"this,":[63],"intrinsic":[64,104],"technologies,":[66],"including":[67,139],"moving":[68],"target":[69],"defense":[70,106,113,127,185],"mimic":[72],"defense,":[73],"offer":[74],"proactive":[75],"protection":[76,91],"against":[77,128,216],"both":[78],"known":[79],"unknown":[81],"threats.":[82],"It":[83],"is":[84],"expected":[85],"break":[87],"through":[88],"traditional":[89],"mechanisms":[92],"such":[93],"as":[94],"\u201cenhanced\u201d,":[95],"\u201cplug-in\u201d":[96],"\u201cpassive\u201d":[98],"defense.":[99],"This":[100,200],"paper":[101],"proposes":[102],"dynamic":[105,193],"architecture":[107,132,224],"equip":[109],"with":[111,179],"active":[112,126],"capabilities,":[114],"shifting":[115],"from":[116],"passive":[117],"reactive":[118],"mechanism":[119],"based":[120,205],"on":[121,206],"prior":[122],"knowledge":[123],"various":[129],"comprises":[133],"two":[134],"models":[135],"five":[137],"modules,":[138],"sub-pool":[141],"partitioning":[142],"algorithm":[143,201],"enhances":[145,226],"heterogeneity":[146,207],"across":[147],"sub-pools":[148,157],"by":[149],"splitting":[150],"heterogeneous":[152],"replica":[153,159],"pool":[154],"into":[155],"several":[156],"among":[158],"VNFs.":[160],"meet":[162],"Quality":[163],"of":[164,237],"(QoS)":[166],"requirements":[167],"like":[168],"latency,":[169,182],"cost,":[170,183],"security,":[172,228],"we":[173,190],"formulate":[174],"multi-objective":[176],"optimization":[177],"problem":[178],"three":[180],"objectives:":[181],"success":[186],"rate.":[187],"Following":[188],"that,":[189],"propose":[191],"Deep":[194],"Reinforcement":[195],"Learning":[196],"(DRL)-based":[197],"deployment":[198],"algorithm.":[199],"selects":[202],"appropriate":[203],"VNFs":[204],"historical":[209],"information,":[210],"improving":[211],"VNF":[214],"external":[217],"Extensive":[219],"experiments":[220],"validate":[221],"our":[223],"significantly":[225],"provided":[229],"this":[231],"improvement":[232],"comes":[233],"at":[234],"expense":[236],"limited":[238],"cost":[239],"latency.":[241]},"counts_by_year":[{"year":2025,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
