{"id":"https://openalex.org/W3037178128","doi":"https://doi.org/10.1109/wcncw48565.2020.9124795","title":"NoViSec: Novel Virtual Network Mapping Framework for Secure Software-Defined Networking","display_name":"NoViSec: Novel Virtual Network Mapping Framework for Secure Software-Defined Networking","publication_year":2020,"publication_date":"2020-04-01","ids":{"openalex":"https://openalex.org/W3037178128","doi":"https://doi.org/10.1109/wcncw48565.2020.9124795","mag":"3037178128"},"language":"en","primary_location":{"id":"doi:10.1109/wcncw48565.2020.9124795","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcncw48565.2020.9124795","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://durham-repository.worktribe.com/output/1141009","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037879539","display_name":"Haotong Cao","orcid":"https://orcid.org/0000-0001-8916-8093"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haotong Cao","raw_affiliation_strings":["College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082219172","display_name":"Yue Hu","orcid":"https://orcid.org/0000-0002-0566-811X"},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Hu","raw_affiliation_strings":["Department of Key Accounts, China Mobile Group Jiangsu Co., Ltd., Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Department of Key Accounts, China Mobile Group Jiangsu Co., Ltd., Nanjing, China","institution_ids":["https://openalex.org/I180662265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006385807","display_name":"Shengchen Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengchen Wu","raw_affiliation_strings":["College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030092282","display_name":"Jianbo Du","orcid":"https://orcid.org/0000-0002-0845-4942"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianbo Du","raw_affiliation_strings":["Shanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Shanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101634633","display_name":"Feng Tian","orcid":"https://orcid.org/0000-0001-8116-9681"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Tian","raw_affiliation_strings":["College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036704324","display_name":"Gagangeet Singh Aujla","orcid":"https://orcid.org/0000-0002-2870-8938"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Gagangeet Singh Aujla","raw_affiliation_strings":["School of Computing, Newcastle University, Newcastle upon Tyne, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University, Newcastle upon Tyne, U.K","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059710405","display_name":"Longxiang Yang","orcid":"https://orcid.org/0000-0003-1927-0177"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longxiang Yang","raw_affiliation_strings":["College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5037879539"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":0.4625,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.66052905,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9803000092506409,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-virtualization","display_name":"Network virtualization","score":0.8388870358467102},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8367160558700562},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.7455431222915649},{"id":"https://openalex.org/keywords/virtual-network","display_name":"Virtual network","score":0.7219634056091309},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.7073681354522705},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6299471259117126},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.5221031904220581},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4559742212295532},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43592262268066406},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.42975980043411255},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42603474855422974},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.37185922265052795},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1633078157901764}],"concepts":[{"id":"https://openalex.org/C2779898492","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Network virtualization","level":4,"score":0.8388870358467102},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8367160558700562},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.7455431222915649},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.7219634056091309},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.7073681354522705},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6299471259117126},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.5221031904220581},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4559742212295532},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43592262268066406},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.42975980043411255},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42603474855422974},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.37185922265052795},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1633078157901764},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/wcncw48565.2020.9124795","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcncw48565.2020.9124795","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","raw_type":"proceedings-article"},{"id":"pmh:oai:durham-repository.worktribe.com:1141009","is_oa":true,"landing_page_url":"https://durham-repository.worktribe.com/output/1141009","pdf_url":null,"source":{"id":"https://openalex.org/S4306400188","display_name":"Durham Research Online (Durham University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I190082696","host_organization_name":"Durham University","host_organization_lineage":["https://openalex.org/I190082696"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Presentation / Conference Contribution"}],"best_oa_location":{"id":"pmh:oai:durham-repository.worktribe.com:1141009","is_oa":true,"landing_page_url":"https://durham-repository.worktribe.com/output/1141009","pdf_url":null,"source":{"id":"https://openalex.org/S4306400188","display_name":"Durham Research Online (Durham University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I190082696","host_organization_name":"Durham University","host_organization_lineage":["https://openalex.org/I190082696"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Presentation / Conference Contribution"},"sustainable_development_goals":[{"score":0.4099999964237213,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1275676768","https://openalex.org/W1646471391","https://openalex.org/W2132238781","https://openalex.org/W2518406486","https://openalex.org/W2594997153","https://openalex.org/W2605374392","https://openalex.org/W2736669519","https://openalex.org/W2742631220","https://openalex.org/W2762746515","https://openalex.org/W2768223108","https://openalex.org/W2796034768","https://openalex.org/W2796144940","https://openalex.org/W2888299293","https://openalex.org/W2975462639","https://openalex.org/W2983597624","https://openalex.org/W2989412424","https://openalex.org/W3004059753","https://openalex.org/W6636928571","https://openalex.org/W6726310460","https://openalex.org/W6770624348"],"related_works":["https://openalex.org/W2128291817","https://openalex.org/W2606336747","https://openalex.org/W2766546449","https://openalex.org/W1971175048","https://openalex.org/W2963506123","https://openalex.org/W1639136369","https://openalex.org/W3124910860","https://openalex.org/W2602555740","https://openalex.org/W76894281","https://openalex.org/W3116863388"],"abstract_inverted_index":{"Network":[0],"softwarization":[1,27,51],"technologies,":[2],"such":[3],"as":[4,79,149,163],"software":[5],"defined":[6],"networking":[7],"(SDN),":[8],"network":[9,13,32,41,76,81,110,145],"virtualization":[10,15,119],"(NV),":[11],"and":[12,18,37,47,63,67,95,142,160],"function":[14],"(NFV),":[16],"emerge":[17],"have":[19],"been":[20],"greatly":[21],"promoted":[22],"by":[23,56],"their":[24],"supporters.":[25],"This":[26],"scheme":[28],"contributes":[29],"to":[30,85,164],"isolating":[31],"control":[33],"from":[34],"data":[35],"panel,":[36],"allocating":[38],"virtualized":[39,68],"physical":[40,45],"resources":[42],"flexibly.":[43],"However,":[44],"switches":[46,62],"links,":[48],"supporting":[49,152],"the":[50,70,98,108,128,140,166],"scheme,":[52],"may":[53],"be":[54,93],"attacked":[55],"malicious":[57,133],"attackers.":[58],"Even":[59],"if":[60],"these":[61,104],"links":[64],"are":[65,158],"softwarized":[66],"successfully,":[69],"problem":[71],"of":[72,168],"mapping":[73,111,146],"various":[74],"virtual":[75,80,109,144],"requests,":[77],"known":[78],"embedding,":[82],"is":[83,125,135],"difficult":[84],"solve":[86],"directly.":[87],"Each":[88],"customized":[89],"VN":[90],"request":[91],"must":[92],"allocated":[94],"implemented":[96],"in":[97],"appropriate":[99],"manner.":[100],"To":[101],"deal":[102],"with":[103],"issues,":[105],"we":[106,138],"research":[107],"for":[112,121,131,151],"secure":[113,143,170],"SDN-enabled":[114,153],"networks.":[115,154],"Firstly,":[116],"a":[117],"hierarchical":[118],"architecture":[120],"SDN-":[122],"enabled":[123],"networks":[124],"presented.":[126,136],"Then,":[127],"security":[129],"model":[130],"different":[132],"attacks":[134],"Thirdly,":[137],"propose":[139],"novel":[141],"framework,":[147],"labeled":[148],"\\textit{NoViSec},":[150],"Preliminary":[155],"experiment":[156],"results":[157],"plotted":[159],"discussed":[161],"so":[162],"validate":[165],"effectiveness":[167],"our":[169],"\\textit{NoViSec}":[171],"framework.":[172]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
