Design and Implementation of a Security Control Architecture for Software-Defined NetworkingDesign and Implementation of a Security Control Architecture for Software-Defined Networking Article Swipe
YOU?
·
· 2017
· Open Access
·
· DOI: https://doi.org/10.2991/cnct-16.2017.108
Compared with traditional networking, Software-Defined Networking (SDN) enables to solve the scalability, flexibility and other aspects of the problems.However, there still have some questions about previous relevant works for security control.Thus, in this paper, we analyze the new challenges and then propose a SDN security control architecture to strengthen security control.In such a structure, security control is separated from SDN controller as a separate security controller.The security controller is used to actualize security control through both flow-based protection and agency-based protection.The method of flow monitoring in SDN networks as well as the agency deployed in nodes helps the developers to implement the security functions.We then implement this architecture and verify its scalability and robustness.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.2991/cnct-16.2017.108
- https://download.atlantis-press.com/article/25870894.pdf
- OA Status
- gold
- References
- 4
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2589967449
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2589967449Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.2991/cnct-16.2017.108Digital Object Identifier
- Title
-
Design and Implementation of a Security Control Architecture for Software-Defined NetworkingDesign and Implementation of a Security Control Architecture for Software-Defined NetworkingWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2017Year of publication
- Publication date
-
2017-01-01Full publication date if available
- Authors
-
Tiejun Liu, Zhaowen Lin, Jie XuList of authors in order
- Landing page
-
https://doi.org/10.2991/cnct-16.2017.108Publisher landing page
- PDF URL
-
https://download.atlantis-press.com/article/25870894.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://download.atlantis-press.com/article/25870894.pdfDirect OA link when available
- Concepts
-
Computer science, Software security assurance, Architecture, Resource-oriented architecture, Software architecture, Reference architecture, Software, Software engineering, Control (management), Distributed System Security Architecture, Computer architecture, Computer security, Embedded system, Operating system, Software construction, Software system, Information security, Cloud computing security, Security service, Security information and event management, Cloud computing, Artificial intelligence, Visual arts, ArtTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
4Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2589967449 |
|---|---|
| doi | https://doi.org/10.2991/cnct-16.2017.108 |
| ids.doi | https://doi.org/10.2991/cnct-16.2017.108 |
| ids.mag | 2589967449 |
| ids.openalex | https://openalex.org/W2589967449 |
| fwci | 0.0 |
| type | article |
| title | Design and Implementation of a Security Control Architecture for Software-Defined NetworkingDesign and Implementation of a Security Control Architecture for Software-Defined Networking |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10714 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9926999807357788 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Software-Defined Networks and 5G |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.7401958107948303 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C62913178 |
| concepts[1].level | 4 |
| concepts[1].score | 0.6485126614570618 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q7554361 |
| concepts[1].display_name | Software security assurance |
| concepts[2].id | https://openalex.org/C123657996 |
| concepts[2].level | 2 |
| concepts[2].score | 0.590115487575531 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q12271 |
| concepts[2].display_name | Architecture |
| concepts[3].id | https://openalex.org/C97382630 |
| concepts[3].level | 5 |
| concepts[3].score | 0.5454074740409851 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q13501132 |
| concepts[3].display_name | Resource-oriented architecture |
| concepts[4].id | https://openalex.org/C35869016 |
| concepts[4].level | 3 |
| concepts[4].score | 0.521697461605072 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q846636 |
| concepts[4].display_name | Software architecture |
| concepts[5].id | https://openalex.org/C55356503 |
| concepts[5].level | 4 |
| concepts[5].score | 0.47966957092285156 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q2136675 |
| concepts[5].display_name | Reference architecture |
| concepts[6].id | https://openalex.org/C2777904410 |
| concepts[6].level | 2 |
| concepts[6].score | 0.4746687412261963 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q7397 |
| concepts[6].display_name | Software |
| concepts[7].id | https://openalex.org/C115903868 |
| concepts[7].level | 1 |
| concepts[7].score | 0.4369293749332428 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q80993 |
| concepts[7].display_name | Software engineering |
| concepts[8].id | https://openalex.org/C2775924081 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4181267321109772 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q55608371 |
| concepts[8].display_name | Control (management) |
| concepts[9].id | https://openalex.org/C77290126 |
| concepts[9].level | 5 |
| concepts[9].score | 0.4146794080734253 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q5283128 |
| concepts[9].display_name | Distributed System Security Architecture |
| concepts[10].id | https://openalex.org/C118524514 |
| concepts[10].level | 1 |
| concepts[10].score | 0.4085387587547302 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q173212 |
| concepts[10].display_name | Computer architecture |
| concepts[11].id | https://openalex.org/C38652104 |
| concepts[11].level | 1 |
| concepts[11].score | 0.3546465337276459 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[11].display_name | Computer security |
| concepts[12].id | https://openalex.org/C149635348 |
| concepts[12].level | 1 |
| concepts[12].score | 0.32333672046661377 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q193040 |
| concepts[12].display_name | Embedded system |
| concepts[13].id | https://openalex.org/C111919701 |
| concepts[13].level | 1 |
| concepts[13].score | 0.30299896001815796 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[13].display_name | Operating system |
| concepts[14].id | https://openalex.org/C186846655 |
| concepts[14].level | 4 |
| concepts[14].score | 0.24622419476509094 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q3398377 |
| concepts[14].display_name | Software construction |
| concepts[15].id | https://openalex.org/C149091818 |
| concepts[15].level | 3 |
| concepts[15].score | 0.22932565212249756 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q2429814 |
| concepts[15].display_name | Software system |
| concepts[16].id | https://openalex.org/C527648132 |
| concepts[16].level | 2 |
| concepts[16].score | 0.1900274157524109 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q189900 |
| concepts[16].display_name | Information security |
| concepts[17].id | https://openalex.org/C184842701 |
| concepts[17].level | 3 |
| concepts[17].score | 0.17711606621742249 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q370563 |
| concepts[17].display_name | Cloud computing security |
| concepts[18].id | https://openalex.org/C29983905 |
| concepts[18].level | 3 |
| concepts[18].score | 0.14416944980621338 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q7445066 |
| concepts[18].display_name | Security service |
| concepts[19].id | https://openalex.org/C103377522 |
| concepts[19].level | 4 |
| concepts[19].score | 0.11900237202644348 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q3493999 |
| concepts[19].display_name | Security information and event management |
| concepts[20].id | https://openalex.org/C79974875 |
| concepts[20].level | 2 |
| concepts[20].score | 0.060952216386795044 |
| concepts[20].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[20].display_name | Cloud computing |
| concepts[21].id | https://openalex.org/C154945302 |
| concepts[21].level | 1 |
| concepts[21].score | 0.0 |
| concepts[21].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[21].display_name | Artificial intelligence |
| concepts[22].id | https://openalex.org/C153349607 |
| concepts[22].level | 1 |
| concepts[22].score | 0.0 |
| concepts[22].wikidata | https://www.wikidata.org/wiki/Q36649 |
| concepts[22].display_name | Visual arts |
| concepts[23].id | https://openalex.org/C142362112 |
| concepts[23].level | 0 |
| concepts[23].score | 0.0 |
| concepts[23].wikidata | https://www.wikidata.org/wiki/Q735 |
| concepts[23].display_name | Art |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.7401958107948303 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/software-security-assurance |
| keywords[1].score | 0.6485126614570618 |
| keywords[1].display_name | Software security assurance |
| keywords[2].id | https://openalex.org/keywords/architecture |
| keywords[2].score | 0.590115487575531 |
| keywords[2].display_name | Architecture |
| keywords[3].id | https://openalex.org/keywords/resource-oriented-architecture |
| keywords[3].score | 0.5454074740409851 |
| keywords[3].display_name | Resource-oriented architecture |
| keywords[4].id | https://openalex.org/keywords/software-architecture |
| keywords[4].score | 0.521697461605072 |
| keywords[4].display_name | Software architecture |
| keywords[5].id | https://openalex.org/keywords/reference-architecture |
| keywords[5].score | 0.47966957092285156 |
| keywords[5].display_name | Reference architecture |
| keywords[6].id | https://openalex.org/keywords/software |
| keywords[6].score | 0.4746687412261963 |
| keywords[6].display_name | Software |
| keywords[7].id | https://openalex.org/keywords/software-engineering |
| keywords[7].score | 0.4369293749332428 |
| keywords[7].display_name | Software engineering |
| keywords[8].id | https://openalex.org/keywords/control |
| keywords[8].score | 0.4181267321109772 |
| keywords[8].display_name | Control (management) |
| keywords[9].id | https://openalex.org/keywords/distributed-system-security-architecture |
| keywords[9].score | 0.4146794080734253 |
| keywords[9].display_name | Distributed System Security Architecture |
| keywords[10].id | https://openalex.org/keywords/computer-architecture |
| keywords[10].score | 0.4085387587547302 |
| keywords[10].display_name | Computer architecture |
| keywords[11].id | https://openalex.org/keywords/computer-security |
| keywords[11].score | 0.3546465337276459 |
| keywords[11].display_name | Computer security |
| keywords[12].id | https://openalex.org/keywords/embedded-system |
| keywords[12].score | 0.32333672046661377 |
| keywords[12].display_name | Embedded system |
| keywords[13].id | https://openalex.org/keywords/operating-system |
| keywords[13].score | 0.30299896001815796 |
| keywords[13].display_name | Operating system |
| keywords[14].id | https://openalex.org/keywords/software-construction |
| keywords[14].score | 0.24622419476509094 |
| keywords[14].display_name | Software construction |
| keywords[15].id | https://openalex.org/keywords/software-system |
| keywords[15].score | 0.22932565212249756 |
| keywords[15].display_name | Software system |
| keywords[16].id | https://openalex.org/keywords/information-security |
| keywords[16].score | 0.1900274157524109 |
| keywords[16].display_name | Information security |
| keywords[17].id | https://openalex.org/keywords/cloud-computing-security |
| keywords[17].score | 0.17711606621742249 |
| keywords[17].display_name | Cloud computing security |
| keywords[18].id | https://openalex.org/keywords/security-service |
| keywords[18].score | 0.14416944980621338 |
| keywords[18].display_name | Security service |
| keywords[19].id | https://openalex.org/keywords/security-information-and-event-management |
| keywords[19].score | 0.11900237202644348 |
| keywords[19].display_name | Security information and event management |
| keywords[20].id | https://openalex.org/keywords/cloud-computing |
| keywords[20].score | 0.060952216386795044 |
| keywords[20].display_name | Cloud computing |
| language | en |
| locations[0].id | doi:10.2991/cnct-16.2017.108 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | cc-by-nc |
| locations[0].pdf_url | https://download.atlantis-press.com/article/25870894.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Proceedings of the International Conference on Computer Networks and Communication Technology (CNCT 2016) |
| locations[0].landing_page_url | https://doi.org/10.2991/cnct-16.2017.108 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5101962497 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-1630-0847 |
| authorships[0].author.display_name | Tiejun Liu |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I4210161752 |
| authorships[0].affiliations[0].raw_affiliation_string | 10 Xitucheng RD, Haidian DIST,100876 Beijing, P.R. CHINA |
| authorships[0].institutions[0].id | https://openalex.org/I4210161752 |
| authorships[0].institutions[0].ror | https://ror.org/058x5eq06 |
| authorships[0].institutions[0].type | healthcare |
| authorships[0].institutions[0].lineage | https://openalex.org/I4210161752 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Beijing Haidian Hospital |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Tie-jun LIU |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | 10 Xitucheng RD, Haidian DIST,100876 Beijing, P.R. CHINA |
| authorships[1].author.id | https://openalex.org/A5101509643 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-1317-4224 |
| authorships[1].author.display_name | Zhaowen Lin |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I4210161752 |
| authorships[1].affiliations[0].raw_affiliation_string | 10 Xitucheng RD, Haidian DIST,100876 Beijing, P.R. CHINA |
| authorships[1].institutions[0].id | https://openalex.org/I4210161752 |
| authorships[1].institutions[0].ror | https://ror.org/058x5eq06 |
| authorships[1].institutions[0].type | healthcare |
| authorships[1].institutions[0].lineage | https://openalex.org/I4210161752 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Beijing Haidian Hospital |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Zhao-wen LIN |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | 10 Xitucheng RD, Haidian DIST,100876 Beijing, P.R. CHINA |
| authorships[2].author.id | https://openalex.org/A5101725612 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-9199-2225 |
| authorships[2].author.display_name | Jie Xu |
| authorships[2].countries | CN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I4210161752 |
| authorships[2].affiliations[0].raw_affiliation_string | 10 Xitucheng RD, Haidian DIST,100876 Beijing, P.R. CHINA |
| authorships[2].institutions[0].id | https://openalex.org/I4210161752 |
| authorships[2].institutions[0].ror | https://ror.org/058x5eq06 |
| authorships[2].institutions[0].type | healthcare |
| authorships[2].institutions[0].lineage | https://openalex.org/I4210161752 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | Beijing Haidian Hospital |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Jie XU |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | 10 Xitucheng RD, Haidian DIST,100876 Beijing, P.R. CHINA |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://download.atlantis-press.com/article/25870894.pdf |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Design and Implementation of a Security Control Architecture for Software-Defined NetworkingDesign and Implementation of a Security Control Architecture for Software-Defined Networking |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10714 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9926999807357788 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Software-Defined Networks and 5G |
| related_works | https://openalex.org/W2053107757, https://openalex.org/W2157374570, https://openalex.org/W1152672851, https://openalex.org/W2163512324, https://openalex.org/W1503604944, https://openalex.org/W2359311851, https://openalex.org/W2017266164, https://openalex.org/W2136317684, https://openalex.org/W1552148294, https://openalex.org/W2352245193 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.2991/cnct-16.2017.108 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | cc-by-nc |
| best_oa_location.pdf_url | https://download.atlantis-press.com/article/25870894.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | proceedings-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Proceedings of the International Conference on Computer Networks and Communication Technology (CNCT 2016) |
| best_oa_location.landing_page_url | https://doi.org/10.2991/cnct-16.2017.108 |
| primary_location.id | doi:10.2991/cnct-16.2017.108 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | cc-by-nc |
| primary_location.pdf_url | https://download.atlantis-press.com/article/25870894.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Proceedings of the International Conference on Computer Networks and Communication Technology (CNCT 2016) |
| primary_location.landing_page_url | https://doi.org/10.2991/cnct-16.2017.108 |
| publication_date | 2017-01-01 |
| publication_year | 2017 |
| referenced_works | https://openalex.org/W2125560635, https://openalex.org/W2155624544, https://openalex.org/W2291150993, https://openalex.org/W2111001247 |
| referenced_works_count | 4 |
| abstract_inverted_index.a | 42, 52, 62 |
| abstract_inverted_index.as | 61, 88, 90 |
| abstract_inverted_index.in | 31, 85, 94 |
| abstract_inverted_index.is | 56, 68 |
| abstract_inverted_index.of | 16, 82 |
| abstract_inverted_index.to | 8, 47, 70, 99 |
| abstract_inverted_index.we | 34 |
| abstract_inverted_index.SDN | 43, 59, 86 |
| abstract_inverted_index.and | 13, 39, 78, 108, 112 |
| abstract_inverted_index.for | 28 |
| abstract_inverted_index.its | 110 |
| abstract_inverted_index.new | 37 |
| abstract_inverted_index.the | 10, 17, 36, 91, 97, 101 |
| abstract_inverted_index.both | 75 |
| abstract_inverted_index.flow | 83 |
| abstract_inverted_index.from | 58 |
| abstract_inverted_index.have | 21 |
| abstract_inverted_index.some | 22 |
| abstract_inverted_index.such | 51 |
| abstract_inverted_index.then | 40, 104 |
| abstract_inverted_index.this | 32, 106 |
| abstract_inverted_index.used | 69 |
| abstract_inverted_index.well | 89 |
| abstract_inverted_index.with | 1 |
| abstract_inverted_index.(SDN) | 6 |
| abstract_inverted_index.about | 24 |
| abstract_inverted_index.helps | 96 |
| abstract_inverted_index.nodes | 95 |
| abstract_inverted_index.other | 14 |
| abstract_inverted_index.solve | 9 |
| abstract_inverted_index.still | 20 |
| abstract_inverted_index.there | 19 |
| abstract_inverted_index.works | 27 |
| abstract_inverted_index.agency | 92 |
| abstract_inverted_index.method | 81 |
| abstract_inverted_index.paper, | 33 |
| abstract_inverted_index.verify | 109 |
| abstract_inverted_index.analyze | 35 |
| abstract_inverted_index.aspects | 15 |
| abstract_inverted_index.control | 45, 55, 73 |
| abstract_inverted_index.enables | 7 |
| abstract_inverted_index.propose | 41 |
| abstract_inverted_index.through | 74 |
| abstract_inverted_index.Compared | 0 |
| abstract_inverted_index.deployed | 93 |
| abstract_inverted_index.networks | 87 |
| abstract_inverted_index.previous | 25 |
| abstract_inverted_index.relevant | 26 |
| abstract_inverted_index.security | 29, 44, 49, 54, 64, 66, 72, 102 |
| abstract_inverted_index.separate | 63 |
| abstract_inverted_index.actualize | 71 |
| abstract_inverted_index.implement | 100, 105 |
| abstract_inverted_index.questions | 23 |
| abstract_inverted_index.separated | 57 |
| abstract_inverted_index.Networking | 5 |
| abstract_inverted_index.challenges | 38 |
| abstract_inverted_index.control.In | 50 |
| abstract_inverted_index.controller | 60, 67 |
| abstract_inverted_index.developers | 98 |
| abstract_inverted_index.flow-based | 76 |
| abstract_inverted_index.monitoring | 84 |
| abstract_inverted_index.protection | 77 |
| abstract_inverted_index.strengthen | 48 |
| abstract_inverted_index.structure, | 53 |
| abstract_inverted_index.flexibility | 12 |
| abstract_inverted_index.networking, | 3 |
| abstract_inverted_index.robustness. | 113 |
| abstract_inverted_index.scalability | 111 |
| abstract_inverted_index.traditional | 2 |
| abstract_inverted_index.agency-based | 79 |
| abstract_inverted_index.architecture | 46, 107 |
| abstract_inverted_index.functions.We | 103 |
| abstract_inverted_index.scalability, | 11 |
| abstract_inverted_index.control.Thus, | 30 |
| abstract_inverted_index.controller.The | 65 |
| abstract_inverted_index.protection.The | 80 |
| abstract_inverted_index.Software-Defined | 4 |
| abstract_inverted_index.problems.However, | 18 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 3 |
| citation_normalized_percentile.value | 0.01972043 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |