{"id":"https://openalex.org/W4312882463","doi":"https://doi.org/10.1109/dsc55868.2022.00063","title":"Cross-Security Domain Dynamic Orchestration Algorithm of Network Security Functions","display_name":"Cross-Security Domain Dynamic Orchestration Algorithm of Network Security Functions","publication_year":2022,"publication_date":"2022-07-01","ids":{"openalex":"https://openalex.org/W4312882463","doi":"https://doi.org/10.1109/dsc55868.2022.00063"},"language":"en","primary_location":{"id":"doi:10.1109/dsc55868.2022.00063","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc55868.2022.00063","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 7th IEEE International Conference on Data Science in Cyberspace (DSC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062869999","display_name":"Weidong Xiao","orcid":"https://orcid.org/0000-0003-2515-5108"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Weidong Xiao","raw_affiliation_strings":["Beijing University of Post and Telecommunications,Beijing,China","Beijing University of Post and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Post and Telecommunications,Beijing,China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Beijing University of Post and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100437188","display_name":"Xu Zhang","orcid":"https://orcid.org/0000-0001-9080-8027"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu Zhang","raw_affiliation_strings":["Beijing University of Post and Telecommunications,Beijing,China","School of Cyber Security, Beijing, China","Beijing University of Post and Telecommunications, Beijing, China","Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Post and Telecommunications,Beijing,China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"School of Cyber Security, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"Beijing University of Post and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, Beijing, China","institution_ids":["https://openalex.org/I4210139618"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101880222","display_name":"Dongbin Wang","orcid":"https://orcid.org/0000-0002-8290-1376"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongbin Wang","raw_affiliation_strings":["Beijing University of Post and Telecommunications,Beijing,China","National Engineering Laboratory for Mobile Network Security, Beijing, China","School of Cyber Security, Beijing, China","Beijing University of Post and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Post and Telecommunications,Beijing,China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"National Engineering Laboratory for Mobile Network Security, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Security, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"Beijing University of Post and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5062869999"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.1381,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.50049076,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"413","last_page":"419"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8383927345275879},{"id":"https://openalex.org/keywords/orchestration","display_name":"Orchestration","score":0.6790251135826111},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.557191014289856},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5116170048713684},{"id":"https://openalex.org/keywords/ant-colony-optimization-algorithms","display_name":"Ant colony optimization algorithms","score":0.5096738338470459},{"id":"https://openalex.org/keywords/security-domain","display_name":"Security domain","score":0.4222191572189331},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.421572744846344},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4055069088935852},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.373239129781723},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.06372207403182983}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8383927345275879},{"id":"https://openalex.org/C199168358","wikidata":"https://www.wikidata.org/wiki/Q3367000","display_name":"Orchestration","level":3,"score":0.6790251135826111},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.557191014289856},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5116170048713684},{"id":"https://openalex.org/C40128228","wikidata":"https://www.wikidata.org/wiki/Q460851","display_name":"Ant colony optimization algorithms","level":2,"score":0.5096738338470459},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.4222191572189331},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.421572744846344},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4055069088935852},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.373239129781723},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.06372207403182983},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C558565934","wikidata":"https://www.wikidata.org/wiki/Q2743","display_name":"Musical","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dsc55868.2022.00063","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc55868.2022.00063","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 7th IEEE International Conference on Data Science in Cyberspace (DSC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1990085146","https://openalex.org/W2107941094","https://openalex.org/W2421957586","https://openalex.org/W2595043185","https://openalex.org/W2900858862","https://openalex.org/W3045774315","https://openalex.org/W3184668263"],"related_works":["https://openalex.org/W79913212","https://openalex.org/W2094884983","https://openalex.org/W2378898096","https://openalex.org/W560952460","https://openalex.org/W2290927522","https://openalex.org/W4283579741","https://openalex.org/W3066706303","https://openalex.org/W876159576","https://openalex.org/W2943612818","https://openalex.org/W2382367871"],"abstract_inverted_index":{"To":[0],"prevent":[1],"all":[2],"sorts":[3],"of":[4,8,36,128,142],"attacks,":[5],"the":[6,33,54,113,120,125,129,140],"technology":[7],"security":[9,38,62,67,86,109,146],"service":[10,154],"function":[11,155],"chains":[12,156],"(SFC)":[13],"is":[14,117],"proposed":[15,114],"in":[16,52,152],"recent":[17],"years,":[18],"it":[19],"becomes":[20],"an":[21],"attractive":[22],"research":[23,42],"highlights.":[24],"Dynamic":[25],"orchestration":[26,79,131],"algorithm":[27,80,138],"can":[28],"create":[29,82],"SFC":[30,45,83,144],"according":[31,64],"to":[32,65,81,157],"resource":[34],"usage":[35],"network":[37,85,108],"functions.":[39],"The":[40],"current":[41],"on":[43,47,89,112],"creating":[44,143,153],"focuses":[46],"a":[48,75,107],"single":[49],"domain.":[50],"However":[51],"reality":[53],"large":[55],"and":[56,69,93,99,148],"complex":[57],"networks":[58],"are":[59],"divided":[60],"into":[61],"domains":[63,147],"different":[66],"levels":[68],"managed":[70],"separately.":[71],"Therefore,":[72],"we":[73],"propose":[74],"cross-security":[76],"domain":[77],"dynamic":[78,130],"for":[84,119],"functions":[87],"based":[88,111],"ant":[90],"colony":[91],"algorithm(ACO)":[92],"consider":[94],"load":[95],"balancing,":[96],"shortest":[97],"path":[98],"minimum":[100],"delay":[101],"as":[102],"optimization":[103],"objectives.":[104],"We":[105],"establish":[106],"architecture":[110],"algorithm,":[115],"which":[116],"suitable":[118],"industrial":[121],"vertical":[122],"scenarios,":[123],"solves":[124],"deployment":[126],"problem":[127],"algorithm.":[132],"Simulation":[133],"results":[134],"verify":[135],"that":[136],"our":[137],"achieves":[139],"goal":[141],"across":[145],"demonstrate":[149],"its":[150],"performance":[151],"resolve":[158],"abnormal":[159],"traffic":[160],"flows.":[161]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
