Towards Adaptive Rule Replacement for Mitigating Inference Attacks in Serverless SDN Framework Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1109/noms57970.2025.11073645
In the rapidly evolving landscape of Software-Defined Networking (SDN), the enhancement of security measures against sophisticated cyber threats is paramount. Among these threats, inference attacks pose a significant risk by allowing adversaries to deduce the configurations and policies of SDN switches, thereby undermining the integrity and confidentiality of the network infrastructure. To address this critical issue, we introduce a novel dynamic rule replacement policy for SDN switches, leveraging the capabilities of a Support Vector Machine (SVM) for its implementation. Our approach utilizes a comprehensive set of statistical features, including duration analysis of flow rules, dispersion of packet match fields, and frequency of packet arrivals to identify patterns indicative of potential inference attacks. By dynamically adjusting the rules within SDN switches based on the analysis of these features, our policy significantly enhances the resilience of the network against such attacks. To accelerate the innovation and development of network services, this study proposes an integrated SDN architecture deployed over a serverless framework. This work serves as a starting point to enable researchers to realize the concept of modular serverless functions over traditional SDN environments. We show during inference attacks how a serverless framework improves the latency and resource utilization of the network compared to a traditional SDN framework. This study demonstrates an improvement in preventing inference attacks without compromising the performance and efficiency of the SDN infrastructure.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1109/noms57970.2025.11073645
- OA Status
- green
- References
- 31
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4412445774
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4412445774Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1109/noms57970.2025.11073645Digital Object Identifier
- Title
-
Towards Adaptive Rule Replacement for Mitigating Inference Attacks in Serverless SDN FrameworkWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-05-12Full publication date if available
- Authors
-
Ankur Mudgal, Munesh Singh, Abhishek Verma, Kshira Sagar Sahoo, Paul Townend, Monowar BhuyanList of authors in order
- Landing page
-
https://doi.org/10.1109/noms57970.2025.11073645Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-242805Direct OA link when available
- Concepts
-
Computer science, Inference, Distributed computing, Computer security, Computer network, Artificial intelligenceTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
31Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4412445774 |
|---|---|
| doi | https://doi.org/10.1109/noms57970.2025.11073645 |
| ids.doi | https://doi.org/10.1109/noms57970.2025.11073645 |
| ids.openalex | https://openalex.org/W4412445774 |
| fwci | 0.0 |
| type | article |
| title | Towards Adaptive Rule Replacement for Mitigating Inference Attacks in Serverless SDN Framework |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 7 |
| biblio.first_page | 1 |
| topics[0].id | https://openalex.org/T10714 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Software-Defined Networks and 5G |
| topics[1].id | https://openalex.org/T10400 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9997000098228455 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Network Security and Intrusion Detection |
| topics[2].id | https://openalex.org/T11598 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9972000122070312 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Internet Traffic Analysis and Secure E-voting |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.7239757776260376 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C2776214188 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6570462584495544 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q408386 |
| concepts[1].display_name | Inference |
| concepts[2].id | https://openalex.org/C120314980 |
| concepts[2].level | 1 |
| concepts[2].score | 0.3822188973426819 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q180634 |
| concepts[2].display_name | Distributed computing |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.3735334277153015 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C31258907 |
| concepts[4].level | 1 |
| concepts[4].score | 0.3649740219116211 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[4].display_name | Computer network |
| concepts[5].id | https://openalex.org/C154945302 |
| concepts[5].level | 1 |
| concepts[5].score | 0.26424431800842285 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[5].display_name | Artificial intelligence |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.7239757776260376 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/inference |
| keywords[1].score | 0.6570462584495544 |
| keywords[1].display_name | Inference |
| keywords[2].id | https://openalex.org/keywords/distributed-computing |
| keywords[2].score | 0.3822188973426819 |
| keywords[2].display_name | Distributed computing |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.3735334277153015 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/computer-network |
| keywords[4].score | 0.3649740219116211 |
| keywords[4].display_name | Computer network |
| keywords[5].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[5].score | 0.26424431800842285 |
| keywords[5].display_name | Artificial intelligence |
| language | en |
| locations[0].id | doi:10.1109/noms57970.2025.11073645 |
| locations[0].is_oa | False |
| locations[0].source | |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | NOMS 2025-2025 IEEE Network Operations and Management Symposium |
| locations[0].landing_page_url | https://doi.org/10.1109/noms57970.2025.11073645 |
| locations[1].id | pmh:oai:DiVA.org:umu-242805 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400013 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | Publications (Konstfack University of Arts, Crafts, and Design) |
| locations[1].source.host_organization | https://openalex.org/I218177685 |
| locations[1].source.host_organization_name | University College of Arts Crafts and Design |
| locations[1].source.host_organization_lineage | https://openalex.org/I218177685 |
| locations[1].license | other-oa |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | text |
| locations[1].license_id | https://openalex.org/licenses/other-oa |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-242805 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5050608771 |
| authorships[0].author.orcid | https://orcid.org/0009-0000-6241-2332 |
| authorships[0].author.display_name | Ankur Mudgal |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I207223250 |
| authorships[0].affiliations[0].raw_affiliation_string | PDPM IIITDM,Department of Data Science & Artificial Intelligence,Jabalpur,MP,India |
| authorships[0].institutions[0].id | https://openalex.org/I207223250 |
| authorships[0].institutions[0].ror | https://ror.org/00gmd7q80 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I207223250 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Indian Institute of Information Technology Design and Manufacturing Jabalpur |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Ankur Mudgal |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | PDPM IIITDM,Department of Data Science & Artificial Intelligence,Jabalpur,MP,India |
| authorships[1].author.id | https://openalex.org/A5084225906 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-0699-7273 |
| authorships[1].author.display_name | Munesh Singh |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I207223250 |
| authorships[1].affiliations[0].raw_affiliation_string | PDPM IIITDM,Department of Data Science & Artificial Intelligence,Jabalpur,MP,India |
| authorships[1].institutions[0].id | https://openalex.org/I207223250 |
| authorships[1].institutions[0].ror | https://ror.org/00gmd7q80 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I207223250 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Indian Institute of Information Technology Design and Manufacturing Jabalpur |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Munesh Singh |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | PDPM IIITDM,Department of Data Science & Artificial Intelligence,Jabalpur,MP,India |
| authorships[2].author.id | https://openalex.org/A5086227422 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-6687-4809 |
| authorships[2].author.display_name | Abhishek Verma |
| authorships[2].affiliations[0].raw_affiliation_string | BBA University,Department of Information Technology,Uttar Pradesh,India |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Abhishek Verma |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | BBA University,Department of Information Technology,Uttar Pradesh,India |
| authorships[3].author.id | https://openalex.org/A5049724493 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-6435-5738 |
| authorships[3].author.display_name | Kshira Sagar Sahoo |
| authorships[3].countries | IN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I4210131147 |
| authorships[3].affiliations[0].raw_affiliation_string | SRM University,Department of Computer Sc. & Engg.,AP,India,522240 |
| authorships[3].institutions[0].id | https://openalex.org/I4210131147 |
| authorships[3].institutions[0].ror | https://ror.org/037skf023 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I145286018, https://openalex.org/I4210131147 |
| authorships[3].institutions[0].country_code | IN |
| authorships[3].institutions[0].display_name | SRM University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Kshira Sagar Sahoo |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | SRM University,Department of Computer Sc. & Engg.,AP,India,522240 |
| authorships[4].author.id | https://openalex.org/A5078832812 |
| authorships[4].author.orcid | |
| authorships[4].author.display_name | Paul Townend |
| authorships[4].countries | SE |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I90267481 |
| authorships[4].affiliations[0].raw_affiliation_string | Umeå University,Department of Computing Science,Sweden,SE-901 87 |
| authorships[4].institutions[0].id | https://openalex.org/I90267481 |
| authorships[4].institutions[0].ror | https://ror.org/05kb8h459 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I90267481 |
| authorships[4].institutions[0].country_code | SE |
| authorships[4].institutions[0].display_name | Umeå University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Paul Townend |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Umeå University,Department of Computing Science,Sweden,SE-901 87 |
| authorships[5].author.id | https://openalex.org/A5044933320 |
| authorships[5].author.orcid | https://orcid.org/0000-0002-9842-7840 |
| authorships[5].author.display_name | Monowar Bhuyan |
| authorships[5].countries | SE |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I90267481 |
| authorships[5].affiliations[0].raw_affiliation_string | Umeå University,Department of Computing Science,Sweden,SE-901 87 |
| authorships[5].institutions[0].id | https://openalex.org/I90267481 |
| authorships[5].institutions[0].ror | https://ror.org/05kb8h459 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I90267481 |
| authorships[5].institutions[0].country_code | SE |
| authorships[5].institutions[0].display_name | Umeå University |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Monowar Bhuyan |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Umeå University,Department of Computing Science,Sweden,SE-901 87 |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-242805 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Towards Adaptive Rule Replacement for Mitigating Inference Attacks in Serverless SDN Framework |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10714 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Software-Defined Networks and 5G |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W2390279801, https://openalex.org/W4391913857, https://openalex.org/W2358668433, https://openalex.org/W4396701345, https://openalex.org/W2376932109, https://openalex.org/W2001405890, https://openalex.org/W4396696052 |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:DiVA.org:umu-242805 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400013 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Publications (Konstfack University of Arts, Crafts, and Design) |
| best_oa_location.source.host_organization | https://openalex.org/I218177685 |
| best_oa_location.source.host_organization_name | University College of Arts Crafts and Design |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I218177685 |
| best_oa_location.license | other-oa |
| best_oa_location.pdf_url | |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | https://openalex.org/licenses/other-oa |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-242805 |
| primary_location.id | doi:10.1109/noms57970.2025.11073645 |
| primary_location.is_oa | False |
| primary_location.source | |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | NOMS 2025-2025 IEEE Network Operations and Management Symposium |
| primary_location.landing_page_url | https://doi.org/10.1109/noms57970.2025.11073645 |
| publication_date | 2025-05-12 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W4313148063, https://openalex.org/W2909514410, https://openalex.org/W4362663695, https://openalex.org/W4399119679, https://openalex.org/W4405782542, https://openalex.org/W4403680921, https://openalex.org/W4381734303, https://openalex.org/W3041089020, https://openalex.org/W4402159133, https://openalex.org/W4367016220, https://openalex.org/W2905202881, https://openalex.org/W3153623691, https://openalex.org/W4318678664, https://openalex.org/W2967445732, https://openalex.org/W4400233896, https://openalex.org/W2783534159, https://openalex.org/W2521026711, https://openalex.org/W2586470208, https://openalex.org/W2295401176, https://openalex.org/W2770283347, https://openalex.org/W2099498471, https://openalex.org/W3086488190, https://openalex.org/W3092072581, https://openalex.org/W2931168649, https://openalex.org/W1481980731, https://openalex.org/W2911430275, https://openalex.org/W2999113954, https://openalex.org/W4301111951, https://openalex.org/W2763095368, https://openalex.org/W3199040413, https://openalex.org/W2930508541 |
| referenced_works_count | 31 |
| abstract_inverted_index.a | 26, 58, 71, 82, 157, 164, 188, 202 |
| abstract_inverted_index.By | 112 |
| abstract_inverted_index.In | 0 |
| abstract_inverted_index.To | 51, 139 |
| abstract_inverted_index.We | 182 |
| abstract_inverted_index.an | 151, 209 |
| abstract_inverted_index.as | 163 |
| abstract_inverted_index.by | 29 |
| abstract_inverted_index.in | 211 |
| abstract_inverted_index.is | 18 |
| abstract_inverted_index.of | 5, 11, 38, 47, 70, 85, 91, 95, 101, 108, 124, 133, 145, 174, 197, 221 |
| abstract_inverted_index.on | 121 |
| abstract_inverted_index.to | 32, 104, 167, 170, 201 |
| abstract_inverted_index.we | 56 |
| abstract_inverted_index.Our | 79 |
| abstract_inverted_index.SDN | 39, 65, 118, 153, 180, 204, 223 |
| abstract_inverted_index.and | 36, 45, 99, 143, 194, 219 |
| abstract_inverted_index.for | 64, 76 |
| abstract_inverted_index.how | 187 |
| abstract_inverted_index.its | 77 |
| abstract_inverted_index.our | 127 |
| abstract_inverted_index.set | 84 |
| abstract_inverted_index.the | 1, 9, 34, 43, 48, 68, 115, 122, 131, 134, 141, 172, 192, 198, 217, 222 |
| abstract_inverted_index.This | 160, 206 |
| abstract_inverted_index.flow | 92 |
| abstract_inverted_index.over | 156, 178 |
| abstract_inverted_index.pose | 25 |
| abstract_inverted_index.risk | 28 |
| abstract_inverted_index.rule | 61 |
| abstract_inverted_index.show | 183 |
| abstract_inverted_index.such | 137 |
| abstract_inverted_index.this | 53, 148 |
| abstract_inverted_index.work | 161 |
| abstract_inverted_index.(SVM) | 75 |
| abstract_inverted_index.Among | 20 |
| abstract_inverted_index.based | 120 |
| abstract_inverted_index.cyber | 16 |
| abstract_inverted_index.match | 97 |
| abstract_inverted_index.novel | 59 |
| abstract_inverted_index.point | 166 |
| abstract_inverted_index.rules | 116 |
| abstract_inverted_index.study | 149, 207 |
| abstract_inverted_index.these | 21, 125 |
| abstract_inverted_index.(SDN), | 8 |
| abstract_inverted_index.Vector | 73 |
| abstract_inverted_index.deduce | 33 |
| abstract_inverted_index.during | 184 |
| abstract_inverted_index.enable | 168 |
| abstract_inverted_index.issue, | 55 |
| abstract_inverted_index.packet | 96, 102 |
| abstract_inverted_index.policy | 63, 128 |
| abstract_inverted_index.rules, | 93 |
| abstract_inverted_index.serves | 162 |
| abstract_inverted_index.within | 117 |
| abstract_inverted_index.Machine | 74 |
| abstract_inverted_index.Support | 72 |
| abstract_inverted_index.address | 52 |
| abstract_inverted_index.against | 14, 136 |
| abstract_inverted_index.attacks | 24, 186, 214 |
| abstract_inverted_index.concept | 173 |
| abstract_inverted_index.dynamic | 60 |
| abstract_inverted_index.fields, | 98 |
| abstract_inverted_index.latency | 193 |
| abstract_inverted_index.modular | 175 |
| abstract_inverted_index.network | 49, 135, 146, 199 |
| abstract_inverted_index.rapidly | 2 |
| abstract_inverted_index.realize | 171 |
| abstract_inverted_index.thereby | 41 |
| abstract_inverted_index.threats | 17 |
| abstract_inverted_index.without | 215 |
| abstract_inverted_index.allowing | 30 |
| abstract_inverted_index.analysis | 90, 123 |
| abstract_inverted_index.approach | 80 |
| abstract_inverted_index.arrivals | 103 |
| abstract_inverted_index.attacks. | 111, 138 |
| abstract_inverted_index.compared | 200 |
| abstract_inverted_index.critical | 54 |
| abstract_inverted_index.deployed | 155 |
| abstract_inverted_index.duration | 89 |
| abstract_inverted_index.enhances | 130 |
| abstract_inverted_index.evolving | 3 |
| abstract_inverted_index.identify | 105 |
| abstract_inverted_index.improves | 191 |
| abstract_inverted_index.measures | 13 |
| abstract_inverted_index.patterns | 106 |
| abstract_inverted_index.policies | 37 |
| abstract_inverted_index.proposes | 150 |
| abstract_inverted_index.resource | 195 |
| abstract_inverted_index.security | 12 |
| abstract_inverted_index.starting | 165 |
| abstract_inverted_index.switches | 119 |
| abstract_inverted_index.threats, | 22 |
| abstract_inverted_index.utilizes | 81 |
| abstract_inverted_index.adjusting | 114 |
| abstract_inverted_index.features, | 87, 126 |
| abstract_inverted_index.framework | 190 |
| abstract_inverted_index.frequency | 100 |
| abstract_inverted_index.functions | 177 |
| abstract_inverted_index.including | 88 |
| abstract_inverted_index.inference | 23, 110, 185, 213 |
| abstract_inverted_index.integrity | 44 |
| abstract_inverted_index.introduce | 57 |
| abstract_inverted_index.landscape | 4 |
| abstract_inverted_index.potential | 109 |
| abstract_inverted_index.services, | 147 |
| abstract_inverted_index.switches, | 40, 66 |
| abstract_inverted_index.Networking | 7 |
| abstract_inverted_index.accelerate | 140 |
| abstract_inverted_index.dispersion | 94 |
| abstract_inverted_index.efficiency | 220 |
| abstract_inverted_index.framework. | 159, 205 |
| abstract_inverted_index.indicative | 107 |
| abstract_inverted_index.innovation | 142 |
| abstract_inverted_index.integrated | 152 |
| abstract_inverted_index.leveraging | 67 |
| abstract_inverted_index.paramount. | 19 |
| abstract_inverted_index.preventing | 212 |
| abstract_inverted_index.resilience | 132 |
| abstract_inverted_index.serverless | 158, 176, 189 |
| abstract_inverted_index.adversaries | 31 |
| abstract_inverted_index.development | 144 |
| abstract_inverted_index.dynamically | 113 |
| abstract_inverted_index.enhancement | 10 |
| abstract_inverted_index.improvement | 210 |
| abstract_inverted_index.performance | 218 |
| abstract_inverted_index.replacement | 62 |
| abstract_inverted_index.researchers | 169 |
| abstract_inverted_index.significant | 27 |
| abstract_inverted_index.statistical | 86 |
| abstract_inverted_index.traditional | 179, 203 |
| abstract_inverted_index.undermining | 42 |
| abstract_inverted_index.utilization | 196 |
| abstract_inverted_index.architecture | 154 |
| abstract_inverted_index.capabilities | 69 |
| abstract_inverted_index.compromising | 216 |
| abstract_inverted_index.demonstrates | 208 |
| abstract_inverted_index.comprehensive | 83 |
| abstract_inverted_index.environments. | 181 |
| abstract_inverted_index.significantly | 129 |
| abstract_inverted_index.sophisticated | 15 |
| abstract_inverted_index.configurations | 35 |
| abstract_inverted_index.confidentiality | 46 |
| abstract_inverted_index.implementation. | 78 |
| abstract_inverted_index.infrastructure. | 50, 224 |
| abstract_inverted_index.Software-Defined | 6 |
| cited_by_percentile_year | |
| countries_distinct_count | 2 |
| institutions_distinct_count | 6 |
| citation_normalized_percentile.value | 0.33659039 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |