{"id":"https://openalex.org/W4308085993","doi":"https://doi.org/10.23919/apnoms56106.2022.9919928","title":"Security Service-aware Reinforcement Learning for Efficient Network Service Provisioning","display_name":"Security Service-aware Reinforcement Learning for Efficient Network Service Provisioning","publication_year":2022,"publication_date":"2022-09-28","ids":{"openalex":"https://openalex.org/W4308085993","doi":"https://doi.org/10.23919/apnoms56106.2022.9919928"},"language":"en","primary_location":{"id":"doi:10.23919/apnoms56106.2022.9919928","is_oa":false,"landing_page_url":"https://doi.org/10.23919/apnoms56106.2022.9919928","pdf_url":null,"source":{"id":"https://openalex.org/S4363607423","display_name":"2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066165201","display_name":"Hyeonjun Jo","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hyeonjun Jo","raw_affiliation_strings":["Interdisciplinary program of Information Security,Gwangju,South Korea","Interdisciplinary program of Information Security, Gwangju, South Korea"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary program of Information Security,Gwangju,South Korea","institution_ids":[]},{"raw_affiliation_string":"Interdisciplinary program of Information Security, Gwangju, South Korea","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015500546","display_name":"Kyungbaek Kim","orcid":"https://orcid.org/0000-0001-9985-3051"},"institutions":[{"id":"https://openalex.org/I111277659","display_name":"Chonnam National University","ror":"https://ror.org/05kzjxq56","country_code":"KR","type":"education","lineage":["https://openalex.org/I111277659"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Kyungbaek Kim","raw_affiliation_strings":["Chonnam National University,Department of Artificial Intelligence Convergence,Gwangju,South Korea","Department of Artificial Intelligence Convergence, Chonnam National University, Gwangju, South Korea"],"affiliations":[{"raw_affiliation_string":"Chonnam National University,Department of Artificial Intelligence Convergence,Gwangju,South Korea","institution_ids":["https://openalex.org/I111277659"]},{"raw_affiliation_string":"Department of Artificial Intelligence Convergence, Chonnam National University, Gwangju, South Korea","institution_ids":["https://openalex.org/I111277659"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5066165201"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.8648,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.6807564,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.876800000667572,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.876800000667572,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.833899974822998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.7775999903678894,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7817069292068481},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.777374267578125},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.6942209005355835},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5650336742401123},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.5109978914260864},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.4665731191635132},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.43313854932785034},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40262284874916077},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3453751802444458},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15253859758377075},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.1176278293132782}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7817069292068481},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.777374267578125},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.6942209005355835},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5650336742401123},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.5109978914260864},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.4665731191635132},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.43313854932785034},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40262284874916077},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3453751802444458},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15253859758377075},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.1176278293132782}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/apnoms56106.2022.9919928","is_oa":false,"landing_page_url":"https://doi.org/10.23919/apnoms56106.2022.9919928","pdf_url":null,"source":{"id":"https://openalex.org/S4363607423","display_name":"2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7300000190734863,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2901569595","https://openalex.org/W2776387983","https://openalex.org/W2093477862","https://openalex.org/W2535265275","https://openalex.org/W2373080253","https://openalex.org/W2081253120","https://openalex.org/W2355938062","https://openalex.org/W28967608","https://openalex.org/W103469691","https://openalex.org/W2326753133"],"abstract_inverted_index":{"In":[0,52,95],"case":[1],"of":[2,21,24,89],"deploying":[3],"additional":[4],"network":[5,12,25,30,43,49,91],"security":[6,26,50,81,100,115],"equipment":[7,27],"in":[8],"a":[9,36,39,76,87],"new":[10],"location,":[11],"service":[13,44,92],"providers":[14],"face":[15],"difficulties":[16],"such":[17],"as":[18],"precise":[19],"management":[20],"large":[22],"number":[23],"and":[28],"expensive":[29],"operation":[31],"costs.":[32],"Accordingly,":[33],"there":[34,58],"is":[35,59,83],"need":[37],"for":[38,41,68],"method":[40,66,72],"security-aware":[42],"provisioning":[45,93],"using":[46],"the":[47,124],"existing":[48,61],"equipment.":[51],"order":[53],"to":[54,123],"solve":[55],"this":[56,96],"problem,":[57],"an":[60],"reinforcement":[62,102,130],"learning-based":[63],"routing":[64,77,105,110],"decision":[65,78],"fixed":[67],"each":[69],"node.":[70],"This":[71,85],"performs":[73],"repeatedly":[74],"until":[75],"satisfying":[79],"end-to-end":[80,114],"constraints":[82,101,116],"achieved.":[84],"generates":[86,109],"disadvantage":[88],"longer":[90],"time.":[94],"paper,":[97],"we":[98],"propose":[99],"learning":[103],"based":[104],"(SCRR)":[106],"algorithm":[107],"that":[108],"decisions,":[111],"which":[112],"satisfies":[113],"by":[117],"giving":[118],"conditional":[119],"reward":[120],"values":[121],"according":[122],"agent":[125],"state-action":[126],"pairs":[127],"when":[128],"performing":[129],"learning.":[131]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
