{"id":"https://openalex.org/W2910188873","doi":"https://doi.org/10.1109/atnac.2018.8615186","title":"Security network policy enforcement through a SDN framework","display_name":"Security network policy enforcement through a SDN framework","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2910188873","doi":"https://doi.org/10.1109/atnac.2018.8615186","mag":"2910188873"},"language":"en","primary_location":{"id":"doi:10.1109/atnac.2018.8615186","is_oa":false,"landing_page_url":"https://doi.org/10.1109/atnac.2018.8615186","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 28th International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070722534","display_name":"Davide Berardi","orcid":"https://orcid.org/0000-0002-2473-2439"},"institutions":[{"id":"https://openalex.org/I9360294","display_name":"University of Bologna","ror":"https://ror.org/01111rn36","country_code":"IT","type":"education","lineage":["https://openalex.org/I9360294"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Davide Berardi","raw_affiliation_strings":["University of Bologna"],"affiliations":[{"raw_affiliation_string":"University of Bologna","institution_ids":["https://openalex.org/I9360294"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007495380","display_name":"Franco Callegati","orcid":"https://orcid.org/0000-0002-6669-8072"},"institutions":[{"id":"https://openalex.org/I9360294","display_name":"University of Bologna","ror":"https://ror.org/01111rn36","country_code":"IT","type":"education","lineage":["https://openalex.org/I9360294"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Franco Callegati","raw_affiliation_strings":["University of Bologna"],"affiliations":[{"raw_affiliation_string":"University of Bologna","institution_ids":["https://openalex.org/I9360294"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021506369","display_name":"Andrea Melis","orcid":"https://orcid.org/0000-0002-0101-2551"},"institutions":[{"id":"https://openalex.org/I9360294","display_name":"University of Bologna","ror":"https://ror.org/01111rn36","country_code":"IT","type":"education","lineage":["https://openalex.org/I9360294"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Andrea Melis","raw_affiliation_strings":["University of Bologna"],"affiliations":[{"raw_affiliation_string":"University of Bologna","institution_ids":["https://openalex.org/I9360294"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010183853","display_name":"Marco Prandini","orcid":"https://orcid.org/0000-0002-3962-5513"},"institutions":[{"id":"https://openalex.org/I9360294","display_name":"University of Bologna","ror":"https://ror.org/01111rn36","country_code":"IT","type":"education","lineage":["https://openalex.org/I9360294"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Marco Prandini","raw_affiliation_strings":["University of Bologna"],"affiliations":[{"raw_affiliation_string":"University of Bologna","institution_ids":["https://openalex.org/I9360294"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5070722534"],"corresponding_institution_ids":["https://openalex.org/I9360294"],"apc_list":null,"apc_paid":null,"fwci":0.3691,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.66598905,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7785309553146362},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.74001145362854},{"id":"https://openalex.org/keywords/network-administrator","display_name":"Network administrator","score":0.7298709750175476},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.6147735118865967},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5068221688270569},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.4787158966064453},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.4772741198539734},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4722682237625122},{"id":"https://openalex.org/keywords/system-administrator","display_name":"System administrator","score":0.4458424150943756},{"id":"https://openalex.org/keywords/network-management","display_name":"Network management","score":0.4391894042491913},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42614829540252686},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3039299249649048},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.22912782430648804},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.1815335750579834},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10393807291984558}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7785309553146362},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.74001145362854},{"id":"https://openalex.org/C2779173999","wikidata":"https://www.wikidata.org/wiki/Q680296","display_name":"Network administrator","level":2,"score":0.7298709750175476},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.6147735118865967},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5068221688270569},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.4787158966064453},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.4772741198539734},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4722682237625122},{"id":"https://openalex.org/C2780814629","wikidata":"https://www.wikidata.org/wiki/Q327353","display_name":"System administrator","level":2,"score":0.4458424150943756},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.4391894042491913},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42614829540252686},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3039299249649048},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.22912782430648804},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.1815335750579834},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10393807291984558},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/atnac.2018.8615186","is_oa":false,"landing_page_url":"https://doi.org/10.1109/atnac.2018.8615186","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 28th International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"},{"id":"pmh:oai:cris.unibo.it:11585/675822","is_oa":false,"landing_page_url":"https://ieeexplore.ieee.org/abstract/document/8615186/","pdf_url":null,"source":{"id":"https://openalex.org/S4306402579","display_name":"Archivio istituzionale della ricerca (Alma Mater Studiorum Universit\u00e0 di Bologna)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210117483","host_organization_name":"Istituto di Ematologia di Bologna","host_organization_lineage":["https://openalex.org/I4210117483"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.7300000190734863,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W158224344","https://openalex.org/W983828475","https://openalex.org/W1604559667","https://openalex.org/W2183926967","https://openalex.org/W2566242153","https://openalex.org/W2594119292","https://openalex.org/W2599515429","https://openalex.org/W2742515467","https://openalex.org/W2767490216","https://openalex.org/W2910794840","https://openalex.org/W4294339610","https://openalex.org/W6606536520","https://openalex.org/W6734470941"],"related_works":["https://openalex.org/W1975326709","https://openalex.org/W2398434059","https://openalex.org/W2186689279","https://openalex.org/W2468386885","https://openalex.org/W1668440855","https://openalex.org/W577721519","https://openalex.org/W2349655502","https://openalex.org/W1593038436","https://openalex.org/W2397814493","https://openalex.org/W2047270239"],"abstract_inverted_index":{"In":[0,78],"this":[1,52],"work":[2],"we":[3,85],"present":[4],"an":[5,15,88],"exploitation":[6],"of":[7,67],"the":[8,40,44,59,65,71,75,82],"Software":[9],"Defined":[10],"Networking":[11],"paradigm":[12],"to":[13,22,62,80],"implement":[14,23],"architecture":[16,84],"allowing":[17],"a":[18,27,36],"system":[19],"network":[20,41,90],"administrator":[21,42],"and":[24,95],"verify":[25],"in":[26,43,74],"formal":[28],"way":[29],"security":[30,45],"policies.":[31],"The":[32],"main":[33,72],"result":[34],"is":[35],"framework":[37],"that":[38],"support":[39],"management":[46],"process":[47],"providing":[48],"services":[49],"during":[50,58],"all":[51],"phase,":[53],"from":[54,70],"automated":[55],"traffic":[56,69],"analysis":[57],"prevention":[60],"phase":[61],"tools":[63],"for":[64],"exclusion":[66],"malicious":[68],"flow":[73],"reaction":[76],"phase.":[77],"order":[79],"validate":[81],"proposed":[83],"will":[86],"showcase":[87],"industrial":[89],"applied":[91],"scenario,":[92],"simulating":[93],"attacks":[94],"countermeasures":[96],"techniques.":[97]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
