{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T18:29:53Z","timestamp":1769884193059,"version":"3.49.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s00607-025-01601-0","type":"journal-article","created":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T08:38:51Z","timestamp":1767429531000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An adaptive NLP-driven access control framework for northbound interface in software defined network"],"prefix":"10.1007","volume":"108","author":[{"given":"Zulkarnain","family":"Zainal","sequence":"first","affiliation":[]},{"given":"Azizol","family":"Abdullah","sequence":"additional","affiliation":[]},{"given":"Fahrul Hakim","family":"Huyop","sequence":"additional","affiliation":[]},{"given":"Muhammad Daniel Hafiz","family":"Abdullah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,3]]},"reference":[{"key":"1601_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2618874","author":"DB Rawat","year":"2017","unstructured":"Rawat DB, Reddy SR (2017) Software defined networking architecture, security and energy efficiency: a survey. IEEE Commun Surv Tutor. https:\/\/doi.org\/10.1109\/COMST.2016.2618874","journal-title":"IEEE Commun Surv Tutor"},{"key":"1601_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.103080","author":"PT Duy","year":"2022","unstructured":"Duy PT, Hoang H. Do, Hien DTT, Nguyen AGT, Pham VH (2022) B-DAC: a decentralized access control framework on Northbound interface for securing SDN using blockchain. J Inf Secur Appl. https:\/\/doi.org\/10.1016\/j.jisa.2021.103080","journal-title":"J Inf Secur Appl"},{"key":"1601_CR3","doi-asserted-by":"publisher","unstructured":"Al-Alaj A, Krishnan R, Sandhu R SDN-RBAC: An Access Control Model for SDN Controller Applications, in (2019) 4th International Conference on Computing, Communications and Security, ICCCS 2019, 2019. https:\/\/doi.org\/10.1109\/CCCS.2019.8888031","DOI":"10.1109\/CCCS.2019.8888031"},{"key":"1601_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-821936-2.00004-2","volume-title":"Rapid Sensory Profiling Techniques: Applications in New Product Development and Consumer Research, Second Edition","author":"LM Hamilton","year":"2022","unstructured":"Hamilton LM, Lahne J (2022) Natural Language Processing. Rapid Sensory Profiling Techniques: Applications in New Product Development and Consumer Research, Second Edition. https:\/\/doi.org\/10.1016\/B978-0-12-821936-2.00004-2"},{"key":"1601_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-17207-7","author":"SH Ahammad","year":"2024","unstructured":"Ahammad SH et al (2024) Improved neural machine translation using Natural Language Processing (NLP). Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-023-17207-7","journal-title":"Multimed Tools Appl"},{"key":"1601_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-021-00553-8","author":"M Mimura","year":"2022","unstructured":"Mimura M, Ito R (2022) Applying NLP techniques to malware detection in a practical environment. Int J Inf Secur. https:\/\/doi.org\/10.1007\/s10207-021-00553-8","journal-title":"Int J Inf Secur"},{"key":"1601_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3265894","author":"J McNamara","year":"2023","unstructured":"McNamara J et al (2023) NLP powered intent based network management for private 5G networks. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2023.3265894","journal-title":"IEEE Access"},{"key":"1601_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108047","volume":"192","author":"M Priyadarsini","year":"2021","unstructured":"Priyadarsini M, Bera P (2021) Software defined networking architecture, traffic management, security, and placement: a survey. Comput Netw 192:108047. https:\/\/doi.org\/10.1016\/j.comnet.2021.108047","journal-title":"Comput Netw"},{"key":"1601_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.05.022","author":"X Leng","year":"2019","unstructured":"Leng X, Hou K, Chen Y, Bu K, Song L, Li Y (2019) A lightweight policy enforcement system for resource protection and management in the SDN-based cloud. Comput Netw. https:\/\/doi.org\/10.1016\/j.comnet.2019.05.022","journal-title":"Comput Netw"},{"issue":"4","key":"1601_CR10","doi-asserted-by":"publisher","first-page":"2143","DOI":"10.1007\/s11280-022-01130-2","volume":"26","author":"Y Liu","year":"2023","unstructured":"Liu Y, Zhao B, An Y, Guo J (2023) Dacas: integration of attribute-based access control for northbound interface security in SDN. World Wide Web 26(4):2143\u20132173. https:\/\/doi.org\/10.1007\/s11280-022-01130-2","journal-title":"World Wide Web"},{"issue":"7","key":"1601_CR11","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11070996","volume":"11","author":"S Algarni","year":"2022","unstructured":"Algarni S, Eassa F, Almarhabi K, Algarni A, Albeshri A (2022) Bcnbi: a blockchain-based security framework for northbound interface in software-defined networking. Electronics 11(7):996. https:\/\/doi.org\/10.3390\/electronics11070996","journal-title":"Electronics"},{"key":"1601_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2880238","author":"JS Weng","year":"2019","unstructured":"Weng JS, Weng J, Zhang Y, Luo W, Lan W (2019) Benbi: scalable and dynamic access control on the northbound interface of SDN-based VANET. IEEE Trans Veh Technol. https:\/\/doi.org\/10.1109\/TVT.2018.2880238","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"1601_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-024-01825-5","volume":"18","author":"S Zangaraki","year":"2025","unstructured":"Zangaraki S, Mirabi M, Erfani SH, Sahafi A (2025) Secshield: an IoT access control framework with edge caching using software defined network. Peer Peer Netw Appl 18(1):1\u201317. https:\/\/doi.org\/10.1007\/s12083-024-01825-5","journal-title":"Peer Peer Netw Appl"},{"key":"1601_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.03.007","author":"H Kang","year":"2019","unstructured":"Kang H, Yoon C, Shin S (2019) Astraea: towards an effective and usable application permission system for SDN. Comput Netw. https:\/\/doi.org\/10.1016\/j.comnet.2019.03.007","journal-title":"Comput Netw"},{"key":"1601_CR15","doi-asserted-by":"publisher","unstructured":"Wen X et al . (2016) SDNShield: Reconciliating configurable application permissions for SDN App markets, in Proceedings \u2013\u200946th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN\u00a0, 2016. doi:, 2016. https:\/\/doi.org\/10.1109\/DSN.2016.20","DOI":"10.1109\/DSN.2016.20"},{"key":"1601_CR16","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s11265-016-1115-8","volume":"86","author":"M Wang","year":"2017","unstructured":"Wang M, Liu J, Chen J, Liu X, Mao J (2017) Perm-guard: authenticating the validity of flow rules in software defined networking. J Signal Process Syst 86:2\u20133. https:\/\/doi.org\/10.1007\/s11265-016-1115-8","journal-title":"J Signal Process Syst"},{"key":"1601_CR17","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-018-0019-2","author":"M Alohaly","year":"2019","unstructured":"Alohaly M, Takabi H, Blanco E (2019) Automated extraction of attributes from natural language attribute-based access control (ABAC) policies. Cybersecurity. https:\/\/doi.org\/10.1186\/s42400-018-0019-2","journal-title":"Cybersecurity"},{"key":"1601_CR18","doi-asserted-by":"publisher","DOI":"10.1145\/3290367","author":"V Touzeau","year":"2019","unstructured":"Touzeau V, Ma\u00efza C, Monniaux D, Reineke J (2019) Fast and exact analysis for LRU caches. Proc ACM Program Lang. https:\/\/doi.org\/10.1145\/3290367","journal-title":"Proc ACM Program Lang"},{"key":"1601_CR19","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6601965","author":"ZH Wang","year":"2022","unstructured":"Wang ZH, Dong AL (2022) Research on load balancing and caching strategy for central network. J Electr Comput Eng. https:\/\/doi.org\/10.1155\/2022\/6601965","journal-title":"J Electr Comput Eng"},{"key":"1601_CR20","unstructured":"Team RD (2018) RYU Documentation Release 4.24, RYU Documentation. [Online]. Available: https:\/\/ryu.readthedocs.io\/en\/latest\/app.html#"},{"key":"1601_CR21","unstructured":"IBM IBM blockchain based on hyperledger fabric from the Linux foundation, www.ibm.com"},{"key":"1601_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08920-3","author":"S Bhardwaj","year":"2022","unstructured":"Bhardwaj S, Panda SN (2022) Performance evaluation using RYU SDN controller in software-defined networking environment. Wirel Pers Commun. https:\/\/doi.org\/10.1007\/s11277-021-08920-3","journal-title":"Wirel Pers Commun"},{"key":"1601_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/s40031-023-00982-0","author":"A Ram","year":"2024","unstructured":"Ram A, Dutta MP, Chakraborty SK (2024) A flow-based performance evaluation on RYU SDN controller. J Instit Eng (India). https:\/\/doi.org\/10.1007\/s40031-023-00982-0","journal-title":"J Instit Eng (India)"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-025-01601-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-025-01601-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-025-01601-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T05:19:11Z","timestamp":1769836751000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-025-01601-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["1601"],"URL":"https:\/\/doi.org\/10.1007\/s00607-025-01601-0","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"19 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have influenced the work reported in this study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"18"}}