{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T17:53:26Z","timestamp":1755798806013,"version":"3.37.3"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T00:00:00Z","timestamp":1651536000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T00:00:00Z","timestamp":1651536000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2023,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In this paper, we present a multi-tiered network-based optimization model describing the provision of services by network slices of 5G-Service providers (e.g. through Unmanned Aerial Vehicles (UAVs) organized as Flying Ad hoc Networks (FANET)), taking into account the security levels of each provider. The three levels of the network consist of the infrastructure layers, which contain resources needed to execute a service, the slices layer, where services are served for the services layer, which represents the upper layer of the network and consists of services or applications required by users or devices. The objective of the proposed model is to establish the optimal flows between network layers and the optimal security levels in order to maximize the providers\u2019 profits, given by the difference between the revenues obtained by the sale of services and the rental of their resources and the costs. Numerical experiments are performed and solved with a new nature-inspired genetic algorithm adapted to the optimization 5G network problem.<\/jats:p>","DOI":"10.1007\/s00500-022-07117-5","type":"journal-article","created":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T11:21:42Z","timestamp":1651576902000},"page":"12979-12996","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A constrained optimization model for the provision of services in a 5G network with multi-level cybersecurity investments"],"prefix":"10.1007","volume":"27","author":[{"given":"Giorgia M.","family":"Cappello","sequence":"first","affiliation":[]},{"given":"Gabriella","family":"Colajanni","sequence":"additional","affiliation":[]},{"given":"Patrizia","family":"Daniele","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1594-9414","authenticated-orcid":false,"given":"Daniele","family":"Sciacca","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,3]]},"reference":[{"key":"7117_CR1","unstructured":"5G PPP Architecture Working Group (2016) 5G empowering vertical industries. https:\/\/5g-ppp.eu\/wpcontent\/uploads\/2016\/02\/BROCHURE_5PPP_BAT2_PL.pdf"},{"key":"7117_CR2","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/978-3-030-85428-7_7","volume-title":"Security and Privacy Preserving for IoT and 5G Networks","author":"EM Abounassar","year":"2022","unstructured":"Abounassar EM, El-Kafrawy P, El-Latif A, Ahmed A (2022) Security and Interoperability Issues with Internet of Things (IoT) in Healthcare Industry: A Survey. Security and Privacy Preserving for IoT and 5G Networks. Springer, Cham, pp 159\u2013189"},{"key":"7117_CR3","doi-asserted-by":"crossref","unstructured":"Addad R, Taleb A, Bagaa T, Dutra M, D.L.C, Flinck H (2018) Towards modeling cross-domain network slices for 5G. 2018 IEEE Global communications conference (GLOBECOM), 1-7","DOI":"10.1109\/GLOCOM.2018.8647504"},{"issue":"6","key":"7117_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42979-021-00841-z","volume":"2","author":"A Alharbi","year":"2021","unstructured":"Alharbi A, Rahman A (2021) Review of recent technologies for tackling COVID-19. SN Comput Sci 2(6):1\u201327","journal-title":"SN Comput Sci"},{"issue":"1","key":"7117_CR5","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MCOMSTD.2018.1700063","volume":"2","author":"I Ahmad","year":"2018","unstructured":"Ahmad I, Kumar T, Liyanage M, Okwuibe J, Ylianttila M, Gurtov A (2018) Overview of 5G security challenges and solutions. IEEE Commun Standards Magaz 2(1):36\u201343","journal-title":"IEEE Commun Standards Magaz"},{"issue":"4","key":"7117_CR6","doi-asserted-by":"crossref","first-page":"3682","DOI":"10.1109\/COMST.2019.2916180","volume":"21","author":"I Ahmad","year":"2019","unstructured":"Ahmad I, Shahabuddin S, Kumar T, Okwuibe J, Gurtov A, Ylianttila M (2019) Security for 5G and beyond. IEEE Commun Surv Tutorials 21(4):3682\u20133722","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"12","key":"7117_CR7","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MCOM.001.1900258","volume":"57","author":"A Banchs","year":"2019","unstructured":"Banchs A, Gutierrez-Estevez DM, Fuentes M, Boldi M, Provvedi S (2019) A 5G mobile network architecture to support vertical industries. IEEE Commun Mag 57(12):38\u201344","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"7117_CR8","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/PL00011391","volume":"89","author":"RH Byrd","year":"2000","unstructured":"Byrd RH, Gilbert JC, Nocedal J (2000) A trust region method based on interior point techniques for nonlinear programming. Math Program 89(1):149\u2013185","journal-title":"Math Program"},{"key":"7117_CR9","doi-asserted-by":"crossref","unstructured":"Colajanni G, Daniele P(2019). A mathematical network model and a solution algorithm for IaaS Cloud Computing. Netw Spatial Econom, 1-21","DOI":"10.1007\/s11067-019-09460-x"},{"key":"7117_CR10","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1111\/itor.12502","volume":"25","author":"G Colajanni","year":"2018","unstructured":"Colajanni G, Daniele P, Giuffr\u00e8 S, Nagurney A (2018) Cybersecurity investments with nonlinear budget constraints and conservation laws: variational equilibrium, marginal expected utilities, and Lagrange multipliers. Intl. Trans. Op. Res. 25:1443\u20131464","journal-title":"Intl. Trans. Op. Res."},{"issue":"1","key":"7117_CR11","first-page":"45","volume":"4","author":"G Colajanni","year":"2020","unstructured":"Colajanni G, Daniele P, Sciacca D (2020) A projected dynamic system associated with a cybersecurity investment model with budget constraints and fixed demands. J. Nonlinear Var. Anal. 4(1):45\u201361","journal-title":"J. Nonlinear Var. Anal."},{"key":"7117_CR12","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/s43069-022-00127-x","volume":"3","author":"G Colajanni","year":"2022","unstructured":"Colajanni G, Daniele P, Sciacca D (2022) On the provision of services with UAVs in disaster scenarios: a two-stage stochastic approach. Oper. Res. Forum 3:18. https:\/\/doi.org\/10.1007\/s43069-022-00127-x","journal-title":"Oper. Res. Forum"},{"key":"7117_CR13","doi-asserted-by":"publisher","unstructured":"Colajanni G, Sciacca D(2021). An Optimization model for service requests management in a 5G network architecture. In: Masone A., Dal Sasso V., Morandi V. (Eds) Optimization and data science: trends and applications. AIRO Springer Series, 6. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-86286-2_7","DOI":"10.1007\/978-3-030-86286-2_7"},{"key":"7117_CR14","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.maturitas.2018.04.008","volume":"113","author":"L Coventry","year":"2018","unstructured":"Coventry L, Branley D (2018) Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas 113:48\u201352","journal-title":"Maturitas"},{"key":"7117_CR15","volume-title":"Handbook of genetic algorithms","author":"L Davis","year":"1991","unstructured":"Davis L (1991) Handbook of genetic algorithms. Van Nostrand Reinhold, New York, NY"},{"issue":"1","key":"7117_CR16","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1287\/trsc.2019.0944","volume":"54","author":"I Dayarian","year":"2020","unstructured":"Dayarian I, Savelsbergh M, Clarke JP (2020) Same-day delivery with drone resupply. Transp Sci 54(1):229\u2013249","journal-title":"Transp Sci"},{"issue":"1","key":"7117_CR17","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s10957-021-01918-8","volume":"191","author":"L Di Puglia Pugliese","year":"2021","unstructured":"Di Puglia Pugliese L, Guerriero F, Scutell\u00e1 MG (2021) The last-mile delivery process with trucks and drones under uncertain energy consumption. J Optim Theory Appl 191(1):31\u201367","journal-title":"J Optim Theory Appl"},{"key":"7117_CR18","doi-asserted-by":"crossref","unstructured":"Dudorov D, Stupples D, Newby M (2013) Probability analysis of cyber attack paths against business and commercial enterprise systems. In: European intelligence and security informatics conference 2013:38\u201344","DOI":"10.1109\/EISIC.2013.13"},{"key":"7117_CR19","doi-asserted-by":"crossref","unstructured":"Fan, C., Han, S., Li, X., Zhang, T., Yuan, Y. (2021). A modified nature-inspired meta-heuristic methodology for heterogeneous unmanned aerial vehicle system task assignment problem. Soft Computing, 1-17","DOI":"10.1007\/s00500-021-06104-6"},{"key":"7117_CR20","doi-asserted-by":"crossref","unstructured":"Faraci, G., Grasso, C., Schembra, G. (2019). Reinforcement-Learning for Management of a 5G Network Slice Extension with UAVs. In: IEEE INFOCOM 2019 - IEEE Conference on computer communications workshops (INFOCOM WKSHPS), pp 732-737","DOI":"10.1109\/INFCOMW.2019.8845316"},{"key":"7117_CR21","unstructured":"Feldmann, A., Gasser, O., Lichtblau, F., Pujol, E., Poese, I., Dietzel, C., Wagner, D., Wichtlhuber, M., Tapiador, J., Vallina-Rodriguez, N., Hohlfeld, O., Smaragdakis, G. (2021). Implications of the COVID-19 Pandemic on the Internet Traffic. In Broadband Coverage in Germany; 15th ITG-Symposium, 1-5. VDE"},{"key":"7117_CR22","doi-asserted-by":"crossref","unstructured":"Fendt, A., Lohm\u00fcller, S., Schmelz, L., C., Bauer, B., (2018). A network slice resource allocation and optimization model for end-to-end mobile networks. 2018 IEEE 5G World Forum (5GWF), pp 262-267","DOI":"10.1109\/5GWF.2018.8517075"},{"issue":"10","key":"7117_CR23","doi-asserted-by":"crossref","first-page":"7155","DOI":"10.1007\/s00500-021-05675-8","volume":"25","author":"S Gao","year":"2021","unstructured":"Gao S, Wu J, Ai J (2021) Multi-UAV reconnaissance task allocation for heterogeneous targets using grouping ant colony optimization algorithm. Soft Comput 25(10):7155\u20137167","journal-title":"Soft Comput"},{"key":"7117_CR24","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/978-3-030-85428-7_11","volume-title":"Security and Privacy Preserving for IoT and 5G Networks","author":"A Gaurav","year":"2022","unstructured":"Gaurav A, Gupta BB, Pe\u00f1alvo FJG, Nedjah N, Psannis K (2022) DDoS attack detection in vehicular Ad-Hoc Network (VANET) for 5G networks. Security and Privacy Preserving for IoT and 5G Networks. Springer, Cham, pp 263\u2013278"},{"issue":"11","key":"7117_CR25","doi-asserted-by":"crossref","first-page":"2479","DOI":"10.1109\/JSAC.2017.2760178","volume":"35","author":"M Ghaznavi","year":"2017","unstructured":"Ghaznavi M, Shahriar N, Kamali S, Ahmed R, Boutaba R (2017) Distributed service function chaining. IEEE J Select Areas Commun 35(11):2479\u201389","journal-title":"IEEE J Select Areas Commun"},{"issue":"14","key":"7117_CR26","doi-asserted-by":"crossref","first-page":"9483","DOI":"10.1007\/s00500-021-05863-6","volume":"25","author":"A Giagkos","year":"2021","unstructured":"Giagkos A, Tuci E, Wilson MS, Charlesworth PB (2021) UAV flight coordination for communication networks: genetic algorithms versus game theory. Soft Comput 25(14):9483\u2013503","journal-title":"Soft Comput"},{"key":"7117_CR27","unstructured":"I-Scoop, 5G and IoT in 2018 and beyond: the mobile broadband futureof IoT, [Available on line 14 Jan 2018], https:\/\/www.i-scoop.eu\/internet-of-things-guide\/5g-iot\/"},{"key":"7117_CR28","doi-asserted-by":"crossref","unstructured":"Grasso C, Raftopoulos R, Schembra G (2021). Deep Q-learning for job offloading orchestration in a fleet of MEC UAVs in 5G environments. IEEE 7th International conference on network Softwarization (NetSoft). 186-190","DOI":"10.1109\/NetSoft51509.2021.9492638"},{"key":"7117_CR29","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3390\/jsan8010003","volume":"8","author":"C Grasso","year":"2019","unstructured":"Grasso C, Schembra G (2019) A fleet of MEC UAVs to Extend a 5G network slice for video monitoring with low-latency constraints. J Sens Actuator Netw 8:3","journal-title":"J Sens Actuator Netw"},{"key":"7117_CR30","doi-asserted-by":"crossref","first-page":"104239","DOI":"10.1016\/j.ijmedinf.2020.104239","volume":"143","author":"B Kaplan","year":"2020","unstructured":"Kaplan B (2020) Revisting health information technology ethical, legal, and social issues and evaluation: telehealth\/Telemedicine and COVID-19. Int J Med Inform 143:104239","journal-title":"Int J Med Inform"},{"key":"7117_CR31","doi-asserted-by":"crossref","unstructured":"Krishna CL, Murphy RR (2017) A review on cybersecurity vulnerabilities for unmanned aerial vehicles. IEEE International symposium on safety, security and rescue robotics (SSRR), pp 194\u2013199","DOI":"10.1109\/SSRR.2017.8088163"},{"key":"7117_CR32","first-page":"1","volume":"10","author":"S Li","year":"2018","unstructured":"Li S, Da Xu L, Zhao S (2018) 5G internet of things: a survey. J Ind Inf Integr 10:1\u20139","journal-title":"J Ind Inf Integr"},{"issue":"5","key":"7117_CR33","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MIC.2017.3481355","volume":"21","author":"X Li","year":"2017","unstructured":"Li X, Samaka M, Chan HA, Bhamare D, Gupta L, Guo C, Jain R (2017) Network slicing for 5G: challenges and opportunities. IEEE Internet Comput 21(5):20\u201327","journal-title":"IEEE Internet Comput"},{"issue":"2","key":"7117_CR34","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1080\/23742917.2020.1846307","volume":"5","author":"B Ly","year":"2021","unstructured":"Ly B, Ly R (2021) Cybersecurity in unmanned aerial vehicles (UAVs). J Cyber Secur Technol 5(2):120\u2013137","journal-title":"J Cyber Secur Technol"},{"key":"7117_CR35","doi-asserted-by":"crossref","first-page":"102762","DOI":"10.1016\/j.trc.2020.102762","volume":"120","author":"G Macrina","year":"2020","unstructured":"Macrina G, Pugliese LDP, Guerriero F, Laporte G (2020) Drone-aided routing: a literature review. Trans Res Part C: Emerg Technol 120:102762","journal-title":"Trans Res Part C: Emerg Technol"},{"issue":"4","key":"7117_CR36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42979-021-00719-0","volume":"2","author":"A Manimuthu","year":"2021","unstructured":"Manimuthu A, Dharshini V, Zografopoulos I, Priyan MK, Konstantinou C (2021) Contactless technologies for smart cities: big data, IoT, and cloud infrastructures. SN Comput Sci 2(4):1\u201324","journal-title":"SN Comput Sci"},{"key":"7117_CR37","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1016\/j.trc.2019.11.003","volume":"110","author":"CC Murray","year":"2020","unstructured":"Murray CC, Raj R (2020) The multiple flying sidekicks traveling salesman problem: parcel delivery with multiple drones. Trans Res Part C: Emerg Technol 110:368\u2013398","journal-title":"Trans Res Part C: Emerg Technol"},{"issue":"1","key":"7117_CR38","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/s10479-016-2209-1","volume":"248","author":"A Nagurney","year":"2017","unstructured":"Nagurney A, Daniele P, Shukla S (2017) A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints. Ann Oper Res 248(1):405\u2013427","journal-title":"Ann Oper Res"},{"issue":"2","key":"7117_CR39","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1016\/j.ejor.2016.12.034","volume":"269","author":"A Nagurney","year":"2017","unstructured":"Nagurney A, Shukla S (2017) Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability. Eur J Oper Res 269(2):588\u2013600","journal-title":"Eur J Oper Res"},{"key":"7117_CR40","doi-asserted-by":"publisher","first-page":"99999","DOI":"10.1109\/ACCESS.2020.2997702","volume":"8","author":"RF Olimid","year":"2020","unstructured":"Olimid RF, Nencioni G (2020) 5G network slicing: a security overview. IEEE Access 8:99999\u2013100009. https:\/\/doi.org\/10.1109\/ACCESS.2020.2997702","journal-title":"IEEE Access"},{"key":"7117_CR41","unstructured":"Organization for Economic Co-operation and Development, The territorial impact of COVID-19: Managing the crisis across levels of government, Updated 10 Nov 2020"},{"issue":"5","key":"7117_CR42","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MCOM.2014.6815890","volume":"52","author":"A Osseiran","year":"2014","unstructured":"Osseiran A, Boccardi F, Braun V, Kusume K, Marsch P, Maternia M, Fallgren M (2014) Scenarios for 5G mobile and wireless communications: the vision of the METIS project. IEEE Commun Magaz 52(5):26\u201335","journal-title":"IEEE Commun Magaz"},{"key":"7117_CR43","doi-asserted-by":"crossref","first-page":"102171","DOI":"10.1016\/j.ijinfomgt.2020.102171","volume":"55","author":"N Pandey","year":"2020","unstructured":"Pandey N, Pal A (2020) Impact of digital surge during Covid-19 pandemic: a viewpoint on research and practice. Int J Inform Manag 55:102171","journal-title":"Int J Inform Manag"},{"issue":"3","key":"7117_CR44","first-page":"22","volume":"11","author":"JH Park","year":"2021","unstructured":"Park JH, Rathore S, Singh SK, Salim MM, Azzaoui AE, Kim TW, Pan Y, Park JH (2021) A comprehensive survey on core technologies and services for 5G security: taxonomies, issues, and solutions. Human-centric Comput Inform Sci 11(3):22","journal-title":"Human-centric Comput Inform Sci"},{"issue":"17","key":"7117_CR45","doi-asserted-by":"crossref","first-page":"4883","DOI":"10.1007\/s00500-016-2376-7","volume":"21","author":"C Ramirez-Atencia","year":"2017","unstructured":"Ramirez-Atencia C, Bello-Orgaz G, Camacho D (2017) Solving complex multi-UAV mission planning problems using multi-objective genetic algorithms. Soft Comput 21(17):4883\u20134900","journal-title":"Soft Comput"},{"issue":"3","key":"7117_CR46","doi-asserted-by":"crossref","first-page":"70","DOI":"10.3390\/drones5030070","volume":"5","author":"E Skondras","year":"2021","unstructured":"Skondras E, Michailidis ET, Michalas A, Vergados DJ, Miridakis NI, Vergados DD (2021) A network slicing framework for UAV-Aided vehicular networks. Drones 5(3):70","journal-title":"Drones"},{"issue":"4","key":"7117_CR47","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1016\/j.dsx.2020.04.041","volume":"14","author":"RP Singh","year":"2020","unstructured":"Singh RP, Javaid M, Haleem A, Suman R (2020) Internet of things (IoT) applications to fight against COVID-19 pandemic. Diabetes Metabolic Syndrome: Clin Res Rev 14(4):521\u2013524","journal-title":"Diabetes Metabolic Syndrome: Clin Res Rev"},{"issue":"3","key":"7117_CR48","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/EMR.2020.3017451","volume":"48","author":"Y Siriwardhana","year":"2020","unstructured":"Siriwardhana Y, De Alwis C, G\u00fcr G, Ylianttila M, Liyanage M (2020) The fight against the COVID-19 pandemic with 5G technologies. IEEE Eng Manage Rev 48(3):72\u201384","journal-title":"IEEE Eng Manage Rev"},{"key":"7117_CR49","unstructured":"Tran, T. D. (2021). Cybersecurity risk assessment for Unmanned Aircraft Systems (Doctoral dissertation, Universit\u00e9 Grenoble Alpes)"},{"issue":"24","key":"7117_CR50","doi-asserted-by":"crossref","first-page":"18893","DOI":"10.1007\/s00500-020-05119-9","volume":"24","author":"VK Veerabathiran","year":"2020","unstructured":"Veerabathiran VK, Mani D, Kuppusamy S, Subramaniam B, Velayutham P, Sengan S, Krishnamoorthy S (2020) Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption. Soft Comput 24(24):18893\u201318908","journal-title":"Soft Comput"},{"issue":"3","key":"7117_CR51","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/s10107-004-0560-5","volume":"107","author":"RA Waltz","year":"2006","unstructured":"Waltz RA, Morales JL, Nocedal J, Orban D (2006) An interior algorithm for nonlinear optimization that combines line search and trust region steps. Math Program 107(3):391\u2013408","journal-title":"Math Program"},{"key":"7117_CR52","unstructured":"World Organization Health, WHO Coronavirus (COVID-19) Dashboard, https:\/\/covid19.who.int\/ (visited on 25 June 2021)"},{"issue":"3","key":"7117_CR53","doi-asserted-by":"crossref","first-page":"2109","DOI":"10.1109\/TWC.2017.2789293","volume":"17","author":"Q Wu","year":"2018","unstructured":"Wu Q, Zeng Y, Zhang R (2018) Joint trajectory and communication design for multi-UAV enabled wireless networks. IEEE Trans Wireless Commun 17(3):2109\u20132121","journal-title":"IEEE Trans Wireless Commun"},{"issue":"1","key":"7117_CR54","first-page":"56","volume":"4","author":"P Yermalovich","year":"2020","unstructured":"Yermalovich P (2020) Determining the probability of cyberattacks. Eur J Eng Formal Sci Articles 4(1):56\u201380","journal-title":"Eur J Eng Formal Sci Articles"},{"key":"7117_CR55","doi-asserted-by":"crossref","unstructured":"Zhang J, Wu W, Lui JC(2018). On the theory of function placement and chaining for network function virtualization. In Proceedings of the 8th ACM International symposium on mobile Ad Hoc networking and computing, pp 91-100","DOI":"10.1145\/3209582.3209592"},{"issue":"6","key":"7117_CR56","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MWC.2016.1600066WC","volume":"23","author":"H Zhang","year":"2016","unstructured":"Zhang H, Dong Y, Cheng J, Hossain MJ, Leung VC (2016) Fronthauling for 5G LTE-U ultra dense cloud small cell networks. IEEE Wirel Commun 23(6):48\u201353","journal-title":"IEEE Wirel Commun"},{"issue":"8","key":"7117_CR57","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/MCOM.2017.1600940","volume":"55","author":"H Zhang","year":"2017","unstructured":"Zhang H, Liu N, Chu X, Long K, Aghvami AH, Leung VC (2017) Network slicing based 5G and future mobile networks: mobility, resource management, and challenges. IEEE Commun Mag 55(8):138\u2013145","journal-title":"IEEE Commun Mag"},{"key":"7117_CR58","doi-asserted-by":"crossref","first-page":"106871","DOI":"10.1016\/j.comnet.2019.106871","volume":"162","author":"S Zhang","year":"2019","unstructured":"Zhang S, Wang Y, Zhou W (2019) Towards secure 5G networks: a Survey. Comput Netw 162:106871","journal-title":"Comput Netw"},{"key":"7117_CR59","doi-asserted-by":"crossref","DOI":"10.1016\/j.childyouth.2020.105694","volume":"119","author":"F Zheng","year":"2020","unstructured":"Zheng F, Khan NA, Hussain S (2020) The COVID 19 pandemic and digital higher education: Exploring the impact of proactive personality on social capital through internet self-efficacy and online interaction quality. Child Youth Serv Rev 119:105694","journal-title":"Child Youth Serv Rev"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-022-07117-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-022-07117-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-022-07117-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T13:23:31Z","timestamp":1690377811000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-022-07117-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,3]]},"references-count":59,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["7117"],"URL":"https:\/\/doi.org\/10.1007\/s00500-022-07117-5","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2022,5,3]]},"assertion":[{"value":"1 April 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2022","order":3,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":4,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Missing Open Access funding information has been added in the Funding Note.","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}