{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T01:56:24Z","timestamp":1775008584033,"version":"3.50.1"},"reference-count":74,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2020,8,19]],"date-time":"2020-08-19T00:00:00Z","timestamp":1597795200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,19]],"date-time":"2020-08-19T00:00:00Z","timestamp":1597795200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN Appl. Sci."],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s42452-020-03335-4","type":"journal-article","created":{"date-parts":[[2020,8,19]],"date-time":"2020-08-19T18:02:22Z","timestamp":1597860142000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Modeling cooperative behavior for resilience in cyber-physical systems using SDN and NFV"],"prefix":"10.1007","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3516-8781","authenticated-orcid":false,"given":"Jose","family":"Moura","sequence":"first","affiliation":[]},{"given":"David","family":"Hutchison","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,19]]},"reference":[{"issue":"2","key":"3335_CR1","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.ijepes.2017.12.020","volume":"13","author":"L Da Xu","year":"2019","unstructured":"Da Xu L, Duan L (2019) Big data for cyber physical systems in industry 4.0: a survey. Enterp Inf Syst 13(2):148\u2013169. https:\/\/doi.org\/10.1016\/j.ijepes.2017.12.020.","journal-title":"Enterp Inf Syst"},{"key":"3335_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2017.12.020","author":"CC Sun","year":"2018","unstructured":"Sun CC, Hahn A, Liu CC (2018) Cyber security of a power grid: state-of-the-art. Int J Electrical Power Energy Syst. https:\/\/doi.org\/10.1016\/j.ijepes.2017.12.020","journal-title":"Int J Electrical Power Energy Syst"},{"key":"3335_CR3","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1109\/ACCESS.2016.2531279","volume":"4","author":"P Eder-Neuhauser","year":"2016","unstructured":"Eder-Neuhauser P, Zseby T, Fabini J (2016) Resilience and security: a qualitative survey of urban smart grid architectures. IEEE Access 4:839\u2013848. https:\/\/doi.org\/10.1109\/ACCESS.2016.2531279","journal-title":"IEEE Access"},{"key":"3335_CR4","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1016\/J.ENBUILD.2015.12.033","volume":"4","author":"D Kolokotsa","year":"2016","unstructured":"Kolokotsa D (2016) The role of smart grids in the building sector. Energy Build 116:703\u2013708. https:\/\/doi.org\/10.1016\/J.ENBUILD.2015.12.033.","journal-title":"Energy Build"},{"issue":"12","key":"3335_CR5","doi-asserted-by":"publisher","first-page":"4847","DOI":"10.1109\/JSEN.2018.2829268","volume":"18","author":"A Kumar","year":"2018","unstructured":"Kumar A, Singh A, Kumar A, Singh MK, Mahanta P, Mukhopadhyay SC (2018) Sensing technologies for monitoring intelligent buildings: a review. IEEE Sens J 18(12):4847\u20134860. https:\/\/doi.org\/10.1109\/JSEN.2018.2829268.","journal-title":"IEEE Sens J"},{"issue":"3","key":"3335_CR6","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/COMST.2016.2532458","volume":"18","author":"M Agiwal","year":"2016","unstructured":"Agiwal M, Roy A, Saxena N (2016) Next generation 5G wireless networks: a comprehensive survey. IEEE Commun Surv Tutorials 18(3):1617\u20131655. https:\/\/doi.org\/10.1109\/COMST.2016.2532458.","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"7","key":"3335_CR7","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/MCOM.2015.7158272","volume":"53","author":"Y Xu","year":"2015","unstructured":"Xu Y, Wang J, Wu Q, Du Z, Shen L, Anpalagan A (2015) A game-theoretic perspective on self-organizing optimization for cognitive small cells. IEEE Commun Mag 53(7):100\u2013108. https:\/\/doi.org\/10.1109\/MCOM.2015.7158272","journal-title":"IEEE Commun Mag"},{"key":"3335_CR8","doi-asserted-by":"publisher","unstructured":"Boyi Xu, Li Da Xu, Hongming Cai, Cheng Xie, Jingyuan Hu, Fenglin Bu (2014) Ubiquitous data accessing method in IoT-based information system for emergency medical services. IEEE Trans Ind Informatics 10(2):1578\u20131586. https:\/\/doi.org\/10.1109\/TII.2014.2306382.","DOI":"10.1109\/TII.2014.2306382"},{"key":"3335_CR9","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/J.FUTURE.2018.07.049","volume":"90","author":"AA Mutlag","year":"2019","unstructured":"Mutlag AA, Abd Ghani MK, Arunkumar N, Mohammed MA, Mohd O (2019) Enabling technologies for fog computing in healthcare IoT systems. Futur Gener Comput Syst 90: 62\u201378. https:\/\/doi.org\/10.1016\/J.FUTURE.2018.07.049.","journal-title":"Futur Gener Comput Syst"},{"key":"3335_CR10","doi-asserted-by":"publisher","unstructured":"Ordonez-Garcia A, Siller M, Begovich O (2017) IoT architecture for urban agronomy and precision applications. In: 2017 IEEE International autumn meeting on power, electronics and computing (ROPEC), pp 1\u20134. https:\/\/doi.org\/10.1109\/ROPEC.2017.8261582.","DOI":"10.1109\/ROPEC.2017.8261582"},{"key":"3335_CR11","doi-asserted-by":"publisher","unstructured":"G\u00f3mez-Chabla R, Real-Avil\u00e9s K, Mor\u00e1n C, Grijalva P, Recalde T (2019) IoT applications in agriculture: a systematic literature review. In: 2nd International conference on ICTs in agronomy and environment, pp 68\u201376. https:\/\/doi.org\/10.1007\/978-3-030-10728-4_8.","DOI":"10.1007\/978-3-030-10728-4_8"},{"issue":"8","key":"3335_CR12","doi-asserted-by":"publisher","first-page":"2168","DOI":"10.1109\/JSAC.2016.2577318","volume":"34","author":"M Mu","year":"2016","unstructured":"Mu M et al (2016) (2016) A scalable user fairness model for adaptive video streaming over SDN-assisted future networks. IEEE J Sel Areas Commun 34(8):2168\u20132184. https:\/\/doi.org\/10.1109\/JSAC.2016.2577318","journal-title":"IEEE J Sel Areas Commun"},{"key":"3335_CR13","doi-asserted-by":"publisher","first-page":"106984","DOI":"10.1016\/j.comnet.2019.106984","volume":"167","author":"AA Barakabitze","year":"2020","unstructured":"Barakabitze AA, Ahmad A, Mijumbi R, Hines A (2020) 5G network slicing using SDN and NFV: a survey of taxonomy, architectures and future challenges. Comput Netw 167:106984. https:\/\/doi.org\/10.1016\/j.comnet.2019.106984","journal-title":"Comput Netw"},{"issue":"1","key":"3335_CR14","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MNET.2018.1700175","volume":"32","author":"R Morabito","year":"2018","unstructured":"Morabito R, Cozzolino V, Ding AY, Beijar N, Ott J (2018)Consolidate IoT edge computing with lightweight virtualization. IEEE Netw 32(1):102\u2013111. https:\/\/doi.org\/10.1109\/MNET.2018.1700175","journal-title":"IEEE Netw"},{"issue":"1","key":"3335_CR15","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1109\/COMST.2018.2863030","volume":"21","author":"J Moura","year":"2019","unstructured":"Moura J, Hutchison D (2019) Game theory for multi-access edge computing: survey, use cases, and future trends. IEEE Commun Surv Tutorials 21(1):260\u2013288. https:\/\/doi.org\/10.1109\/COMST.2018.2863030","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"1","key":"3335_CR16","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/COMST.2018.2866942","volume":"21","author":"J Xie","year":"2019","unstructured":"Xie J et al (2019) A survey of machine learning techniques applied to software defined networking (SDN): research issues and challenges. IEEE Commun Surv Tutorials 21(1):393\u2013430. https:\/\/doi.org\/10.1109\/COMST.2018.2866942","journal-title":"IEEE Commun Surv Tutorials"},{"key":"3335_CR17","doi-asserted-by":"publisher","unstructured":"Sun N, Zhang J, Rimba P, Gao S, Xiang Y, Zhang LY (2018) Data-driven cybersecurity incident prediction: a survey. IEEE communications surveys & tutorials, p 1. https:\/\/doi.org\/10.1109\/COMST.2018.2885561.","DOI":"10.1109\/COMST.2018.2885561"},{"key":"3335_CR18","doi-asserted-by":"crossref","unstructured":"Moura J, Hutchison D (2020) Fog computing systems: state of the art, research issues and future trends, with a focus on resilience, pp 1\u201338. Available: https:\/\/arxiv.org\/abs\/1908.05077.","DOI":"10.1016\/j.jnca.2020.102784"},{"issue":"4","key":"3335_CR19","doi-asserted-by":"publisher","first-page":"3250","DOI":"10.1109\/TIE.2016.2631530","volume":"64","author":"P Park","year":"2017","unstructured":"Park P, Di Marco P, Johansson KH (2017) Cross-layer optimization for industrial control applications using wireless sensor and actuator mesh networks. IEEE Trans Ind Electron 64(4):3250\u20133259. https:\/\/doi.org\/10.1109\/TIE.2016.2631530","journal-title":"IEEE Trans Ind Electron"},{"issue":"3","key":"3335_CR20","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/MCOM.001.1900627","volume":"58","author":"L Cui","year":"2020","unstructured":"Cui L, Tso FP, Jia W (2020) Federated srvice chaining: architecture and challenges. IEEE Commun Mag 58(3):47\u201353. https:\/\/doi.org\/10.1109\/MCOM.001.1900627","journal-title":"IEEE Commun Mag"},{"key":"3335_CR21","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.future.2018.07.039","volume":"90","author":"LM Vaquero","year":"2019","unstructured":"Vaquero LM, Cuadrado F, Elkhatib Y, Bernal-Bernabe J, Srirama SN, Zhani MF (2019) Research challenges in nextgen service orchestration. Futur Gener Comput Syst 90:20\u201338. https:\/\/doi.org\/10.1016\/j.future.2018.07.039","journal-title":"Futur Gener Comput Syst"},{"key":"3335_CR22","doi-asserted-by":"crossref","unstructured":"Moura J, Hutchison D (2020) Resilient cyber-physical systems: Using NFV Orchestration. https:\/\/arxiv.org\/abs\/2003.12401v2. Accessed May 06, 2020.","DOI":"10.1007\/s42452-020-03335-4"},{"key":"3335_CR23","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.comcom.2018.07.028","volume":"131","author":"D Hutchison","year":"2018","unstructured":"Hutchison D, Sterbenz JPG (2018) Architecture and design for resilient networked systems. Comput Commun 131:13\u201321. https:\/\/doi.org\/10.1016\/j.comcom.2018.07.028","journal-title":"Comput Commun"},{"key":"3335_CR24","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/J.CSI.2016.12.006","volume":"54","author":"C Rotsos","year":"2017","unstructured":"Rotsos C et al (2017) Network service orchestration standardization: a technology survey. Comput Stand Interfaces 54:203\u2013215. https:\/\/doi.org\/10.1016\/J.CSI.2016.12.006","journal-title":"Comput Stand Interfaces"},{"key":"3335_CR25","doi-asserted-by":"publisher","unstructured":"Smith P, Schaeffer-Filho A, Hutchison D, Mauthe A (2014) Management patterns: SDN-enabled network resilience management. In: IEEE\/IFIP NOMS 2014\u2014IEEE\/IFIP network operations and management symposium: management in a software defined world, pp 1\u20139, https:\/\/doi.org\/10.1109\/NOMS.2014.6838323.","DOI":"10.1109\/NOMS.2014.6838323"},{"issue":"2","key":"3335_CR26","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.comnet.2016.04.010","volume":"107","author":"J Moura","year":"2016","unstructured":"Moura J, Edwards C (2016) Efficient access of mobile flows to heterogeneous networks under flash crowds. Comput Netw 107(2):163\u2013177. https:\/\/doi.org\/10.1016\/j.comnet.2016.04.010","journal-title":"Comput Netw"},{"key":"3335_CR27","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/3-540-60938-5_16","volume":"1045","author":"N Yeadon","year":"1996","unstructured":"Yeadon N, Mauthe A, Garc\u00eda F, Hutchison D (1996) QoS filters: addressing the heterogeneity gap. Lect Notes Comput Sci 1045:227\u2013243. https:\/\/doi.org\/10.1007\/3-540-60938-5_16","journal-title":"Lect Notes Comput Sci"},{"key":"3335_CR28","doi-asserted-by":"publisher","first-page":"8394","DOI":"10.1109\/ACCESS.2017.2693425","volume":"5","author":"S Rass","year":"2017","unstructured":"Rass S, Alshawish A, Abid MA, Schauer S, Zhu Q, De Meer H (2017) Physical intrusion games\u2014optimizing surveillance by simulation and game theory. IEEE Access 5:8394\u20138407. https:\/\/doi.org\/10.1109\/ACCESS.2017.2693425","journal-title":"IEEE Access"},{"issue":"3","key":"3335_CR29","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MWC.2017.1500371WC","volume":"24","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Pan M, Song L, Dawy Z, Han Z (2017) A survey of contract theory-based incentive mechanism design in wireless networks. IEEE Wirel Commun 24(3):80\u201385. https:\/\/doi.org\/10.1109\/MWC.2017.1500371WC","journal-title":"IEEE Wirel Commun"},{"issue":"3","key":"3335_CR30","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MCOM.2017.1600690CM","volume":"55","author":"G Yang","year":"2017","unstructured":"Yang G, He S, Shi Z, Chen J (2017) Promoting cooperation by the social incentive mechanism in mobile crowdsensing. IEEE Commun Mag 55(3):86\u201392. https:\/\/doi.org\/10.1109\/MCOM.2017.1600690CM","journal-title":"IEEE Commun Mag"},{"key":"3335_CR31","doi-asserted-by":"publisher","unstructured":"Ding Q, Zeng X, Zhang X, Sung DK (2018) A public goods game theory-based approach to cooperation in VANETs under a high vehicle density condition. IEEE Trans Intell Transp Syst, pp 1\u201311. https:\/\/doi.org\/10.1109\/TITS.2018.2876237.","DOI":"10.1109\/TITS.2018.2876237"},{"issue":"5","key":"3335_CR32","doi-asserted-by":"publisher","first-page":"2015","DOI":"10.1109\/TVT.2014.2334655","volume":"64","author":"S Shivshankar","year":"2015","unstructured":"Shivshankar S, Jamalipour A (2015) An evolutionary game theory-based approach to cooperation in VANETs under different network conditions. IEEE Trans Veh Technol 64(5):2015\u20132022. https:\/\/doi.org\/10.1109\/TVT.2014.2334655","journal-title":"IEEE Trans Veh Technol"},{"key":"3335_CR33","doi-asserted-by":"publisher","unstructured":"Kapade N (2014) TLC: trust point load balancing method using coalitional game theory for message forwarding in VANET. In: IEEE global conference on wireless computing & networking (GCWCN), pp 160\u2013164. https:\/\/doi.org\/10.1109\/GCWCN.2014.7030870","DOI":"10.1109\/GCWCN.2014.7030870"},{"key":"3335_CR34","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/J.VEHCOM.2018.10.003","volume":"14","author":"C Ghorai","year":"2018","unstructured":"Ghorai C, Banerjee I (2018) A robust forwarding node selection mechanism for efficient communication in urban VANETs. Veh Commun 14:109\u2013121. https:\/\/doi.org\/10.1016\/J.VEHCOM.2018.10.003","journal-title":"Veh Commun"},{"key":"3335_CR35","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/J.VEHCOM.2018.05.003","volume":"13","author":"M Kadadha","year":"2018","unstructured":"Kadadha M, Otrok H, Barada H, Al-Qutayri M, Al-Hammadi Y (2018) A Stackelberg game for street-centric QoS-OLSR protocol in urban Vehicular Ad Hoc Networks. Veh Commun 13:64\u201377. https:\/\/doi.org\/10.1016\/J.VEHCOM.2018.05.003","journal-title":"Veh Commun"},{"key":"3335_CR36","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/J.VEHCOM.2017.11.001","volume":"10","author":"LC Hua","year":"2017","unstructured":"Hua LC, Anisi MH, Yee PL, Alam M (2017) Social networking-based cooperation mechanisms in vehicular ad-hoc network\u2014a survey. Veh Commun 10:57\u201373. https:\/\/doi.org\/10.1016\/J.VEHCOM.2017.11.001","journal-title":"Veh Commun"},{"key":"3335_CR37","doi-asserted-by":"publisher","unstructured":"Zhang H, Ding W, Song J, Han Z (2016) A hierarchical game approach for visible light communication and D2D heterogeneous network. In: 2016 IEEE global communications conference (GLOBECOM), pp 1\u20136. https:\/\/doi.org\/10.1109\/GLOCOM.2016.7841505.","DOI":"10.1109\/GLOCOM.2016.7841505"},{"issue":"2","key":"3335_CR38","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MVT.2018.2814022","volume":"13","author":"Z Zhou","year":"2018","unstructured":"Zhou Z, Tan L, Gu B, Zhang Y, Wu J (2018) Bandwidth slicing in software-defined 5G: a Stackelberg game approach. IEEE Veh Technol Mag 13(2):102\u2013109. https:\/\/doi.org\/10.1109\/MVT.2018.2814022","journal-title":"IEEE Veh Technol Mag"},{"key":"3335_CR39","doi-asserted-by":"publisher","first-page":"43564","DOI":"10.1109\/ACCESS.2019.2908223","volume":"7","author":"X Li","year":"2019","unstructured":"Li X, Zhang C, Gu B, Yamori K, Tanaka Y (2019) Optimal pricing and service selection in the mobile cloud architectures. IEEE Access 7:43564\u201343572. https:\/\/doi.org\/10.1109\/ACCESS.2019.2908223","journal-title":"IEEE Access"},{"key":"3335_CR40","doi-asserted-by":"publisher","first-page":"32064","DOI":"10.1109\/ACCESS.2018.2842469","volume":"6","author":"L Cheng","year":"2018","unstructured":"Cheng L, Yu T (2018) Nash equilibrium-based asymptotic stability analysis of multi-group asymmetric evolutionary games in typical scenario of electricity market. IEEE Access 6:32064\u201332086. https:\/\/doi.org\/10.1109\/ACCESS.2018.2842469","journal-title":"IEEE Access"},{"key":"3335_CR41","doi-asserted-by":"publisher","unstructured":"Li S, Fei F, Ruihan D, Yu S, Dou W (2016) A dynamic pricing method for carpooling service based on coalitional game analysis. In: 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC\/SmartCity\/DSS), pp 78\u201385. https:\/\/doi.org\/10.1109\/HPCC-SmartCity-DSS.2016.0022.","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0022"},{"issue":"9","key":"3335_CR42","doi-asserted-by":"publisher","first-page":"7797","DOI":"10.1109\/TVT.2017.2682236","volume":"66","author":"N Zhang","year":"2017","unstructured":"Zhang N, Zhang S, Zheng J, Fang X, Mark JW, Shen X (2017) QoE driven decentralized spectrum sharing in 5G networks: potential game approach. IEEE Trans Veh Technol 66(9):7797\u20137808. https:\/\/doi.org\/10.1109\/TVT.2017.2682236","journal-title":"IEEE Trans Veh Technol"},{"key":"3335_CR43","doi-asserted-by":"publisher","first-page":"45137","DOI":"10.1109\/ACCESS.2019.2908872","volume":"7","author":"X Zhao","year":"2019","unstructured":"Zhao X, Li L, Geng S, Zhang H, Ma Y (2019) A link-based variable probability learning approach for partially overlapping channels assignment on multi-radio multi-channel wireless mesh information-centric IoT networks. IEEE Access 7:45137\u201345145. https:\/\/doi.org\/10.1109\/ACCESS.2019.2908872","journal-title":"IEEE Access"},{"key":"3335_CR44","doi-asserted-by":"publisher","unstructured":"Chen l, Wu J, Zhang X-X, Zhou G (2018) TARCO: two-Stage auction for D2D relay aided computation resource allocation in HetNet. IEEE transactions on services computing, p 1. https:\/\/doi.org\/10.1109\/TSC.2018.2792024.","DOI":"10.1109\/TSC.2018.2792024"},{"issue":"4","key":"3335_CR45","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MNET.2018.1700442","volume":"32","author":"Z Zhou","year":"2018","unstructured":"Zhou Z, Liao H, Gu B, Huq KMS, Mumtaz S, Rodriguez J (2018) Robust mobile crowd sensing: when deep learning meets edge computing. IEEE Netw 32(4):54\u201360. https:\/\/doi.org\/10.1109\/MNET.2018.1700442","journal-title":"IEEE Netw"},{"issue":"3","key":"3335_CR46","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MCOM.2017.1600746CM","volume":"55","author":"T Luo","year":"2017","unstructured":"Luo T, Kanhere SS, Huang J, Das SK, Wu F (2017) Sustainable incentives for mobile crowdsensing: auctions, lotteries, and trust and reputation systems. IEEE Commun Mag 55(3):68\u201374. https:\/\/doi.org\/10.1109\/MCOM.2017.1600746CM","journal-title":"IEEE Commun Mag"},{"issue":"3","key":"3335_CR47","doi-asserted-by":"publisher","first-page":"4491","DOI":"10.1109\/JIOT.2018.2883452","volume":"6","author":"J Liu","year":"2019","unstructured":"Liu J, Gao W, Li D, Huang S, Liu H (2019) An incentive mechanism combined with anchoring effect and loss aversion to stimulate data offloading in IoT. IEEE Internet Things J 6(3):4491\u20134511. https:\/\/doi.org\/10.1109\/JIOT.2018.2883452","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"3335_CR48","doi-asserted-by":"publisher","first-page":"2463","DOI":"10.1109\/JIOT.2018.2870294","volume":"6","author":"J Wu","year":"2019","unstructured":"Wu J, Luo S, Wang S, Wang H (2019) NLES: a novel lifetime extension scheme for safety-critical cyber-physical systems using SDN and NFV IEEE Internet Things J 6(2):2463\u20132475. https:\/\/doi.org\/10.1109\/JIOT.2018.2870294","journal-title":"IEEE Internet Things J"},{"key":"3335_CR49","doi-asserted-by":"publisher","unstructured":"Kathiravelu P, Veiga L (2017) SD-CPS: taming the challenges of cyber-physical systems with a software-defined approach. In: Fourth international conference on software defined systems (SDS), pp 6\u201313. https:\/\/doi.org\/10.1109\/SDS.2017.7939133","DOI":"10.1109\/SDS.2017.7939133"},{"key":"3335_CR50","doi-asserted-by":"publisher","first-page":"5591","DOI":"10.1109\/ACCESS.2016.2607786","volume":"4","author":"N Bizanis","year":"2016","unstructured":"Bizanis N, Kuipers FA (2016) SDN and virtualization solutions for the internet of things: a survey. IEEE Access 4:5591\u20135606. https:\/\/doi.org\/10.1109\/ACCESS.2016.2607786","journal-title":"IEEE Access"},{"issue":"4","key":"3335_CR51","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/MCOM.2015.7081093","volume":"53","author":"J Matias","year":"2015","unstructured":"Matias J, Garay J, Toledo N, Unzilla J, Jacob E (2015) Toward an SDN-enabled NFV architecture. IEEE Commun Mag 53(4):187\u2013193. https:\/\/doi.org\/10.1109\/MCOM.2015.7081093","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"3335_CR52","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1109\/COMST.2018.2862350","volume":"21","author":"I Farris","year":"2019","unstructured":"Farris I, Taleb T, Khettab Y, Song J (2019) A survey on emerging SDN and NFV security mechanisms for IoT systems. IEEE Commun Surv Tutorials 21(1):812\u2013837. https:\/\/doi.org\/10.1109\/COMST.2018.2862350","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"1","key":"3335_CR53","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/s10669-017-9634-9","volume":"37","author":"EB Connelly","year":"2017","unstructured":"Connelly EB, Allen CR, Hatfield K, Palma-Oliveira JM, Woods DD, Linkov I (2017) Features of resilience. Environ Syst Decis 37(1):46\u201350. https:\/\/doi.org\/10.1007\/s10669-017-9634-9","journal-title":"Environ Syst Decis"},{"key":"3335_CR54","doi-asserted-by":"publisher","unstructured":"Frohlich P, Gelenbe E, Nowak MP (2020) Smart SDN management of fog services. TechRxiv-11640162, pp. 1\u20136. https:\/\/doi.org\/10.36227\/techrxiv.11640162.v1.","DOI":"10.36227\/techrxiv.11640162.v1"},{"issue":"5","key":"3335_CR55","doi-asserted-by":"publisher","first-page":"8076","DOI":"10.1109\/JIOT.2019.2920987","volume":"6","author":"HN Dai","year":"2019","unstructured":"Dai HN, Zheng Z, Zhang Y (2019) Blockchain for internet of things: a survey. IEEE Internet Things J 6(5):8076\u20138094. https:\/\/doi.org\/10.1109\/JIOT.2019.2920987","journal-title":"IEEE Internet Things J"},{"key":"3335_CR56","doi-asserted-by":"publisher","first-page":"58822","DOI":"10.1109\/ACCESS.2019.2914675","volume":"7","author":"SK Lo","year":"2019","unstructured":"Lo SK et al (2019) Analysis of blockchain solutions for IoT: a systematic literature review. IEEE Access 7:58822\u201358835. https:\/\/doi.org\/10.1109\/ACCESS.2019.2914675","journal-title":"IEEE Access"},{"key":"3335_CR57","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/ACCESS.2017.2757955","volume":"6","author":"PK Sharma","year":"2018","unstructured":"Sharma PK, Chen M-Y, Park JH (2018) A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access 6:115\u2013124. https:\/\/doi.org\/10.1109\/ACCESS.2017.2757955","journal-title":"IEEE Access"},{"issue":"5","key":"3335_CR58","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.1109\/TII.2019.2905295","volume":"15","author":"D Ding","year":"2019","unstructured":"Ding D, Han Q-L, Wang Z, Ge X (2019) A survey on model-based distributed control and filtering for industrial cyber-physical systems. IEEE Trans Ind Informatics 15(5):2483\u20132499. https:\/\/doi.org\/10.1109\/TII.2019.2905295","journal-title":"IEEE Trans Ind Informatics"},{"key":"3335_CR59","doi-asserted-by":"publisher","unstructured":"Medhat Salih Q, Rahman MA, Al-Turjman F, Azmi ZRM (2020) Smart routing management framework exploiting dynamic data resources of cross-layer design and machine learning approaches for mobile cognitive radio networks: a survey. IEEE Access, vol. 8. Institute of Electrical and Electronics Engineers Inc., pp 67835\u201367867. https:\/\/doi.org\/10.1109\/ACCESS.2020.2986369.","DOI":"10.1109\/ACCESS.2020.2986369"},{"key":"3335_CR60","doi-asserted-by":"publisher","first-page":"54074","DOI":"10.1109\/ACCESS.2020.2981434","volume":"8","author":"T Alfakih","year":"2020","unstructured":"Alfakih T, Hassan MM, Gumaei A, Savaglio C, Fortino G (2020) Task offloading and resource allocation for mobile edge computing by deep reinforcement learning based on SARSA. IEEE Access 8:54074\u201354084. https:\/\/doi.org\/10.1109\/ACCESS.2020.2981434","journal-title":"IEEE Access"},{"key":"3335_CR61","doi-asserted-by":"publisher","unstructured":"Ma B, Guo W, Zhang J (2020) A survey of online data-driven proactive 5G network optimisation using machine learning. IEEE Access, vol. 8. Institute of Electrical and Electronics Engineers Inc., pp 35606\u201335637. https:\/\/doi.org\/10.1109\/ACCESS.2020.2975004.","DOI":"10.1109\/ACCESS.2020.2975004"},{"key":"3335_CR62","doi-asserted-by":"publisher","first-page":"50118","DOI":"10.1109\/ACCESS.2020.2974764","volume":"8","author":"W Zhang","year":"2020","unstructured":"Zhang W, Chen X, Liu Y, Xi Q (2020) A distributed storage and computation k-nearest neighbor algorithm based cloud-edge computing for cyber-physical-social systems. IEEE Access 8:50118\u201350130. https:\/\/doi.org\/10.1109\/ACCESS.2020.2974764","journal-title":"IEEE Access"},{"key":"3335_CR63","doi-asserted-by":"publisher","first-page":"56359","DOI":"10.1109\/ACCESS.2020.2980558","volume":"8","author":"Z Zhu","year":"2020","unstructured":"Zhu Z, Wen Y, Zhang Z, Yan Z, Huang S, Xu X (2020) Accurate position estimation of mobile robot based on cyber-physical-social systems (CPSS). IEEE Access 8:56359\u201356370. https:\/\/doi.org\/10.1109\/ACCESS.2020.2980558","journal-title":"IEEE Access"},{"key":"3335_CR64","doi-asserted-by":"publisher","first-page":"24746","DOI":"10.1109\/ACCESS.2020.2970576","volume":"8","author":"R Gupta","year":"2020","unstructured":"Gupta R, Tanwar S, Al-Turjman F, Italiya P, Nauman A, Kim SW (2020) Smart contract privacy protection using AI in cyber-physical systems: tools, techniques and challenges. IEEE Access 8:24746\u201324772. https:\/\/doi.org\/10.1109\/ACCESS.2020.2970576","journal-title":"IEEE Access"},{"key":"3335_CR65","doi-asserted-by":"publisher","first-page":"60117","DOI":"10.1109\/ACCESS.2020.2982318","volume":"8","author":"G Fortino","year":"2020","unstructured":"Fortino G, Fotia L, Messina F, Rosaci D, Sarn\u00e9 GML (2020) Trust and reputation in the internet of things: state-of-the-art and research challenges. IEEE Access 8:60117\u201360125. https:\/\/doi.org\/10.1109\/ACCESS.2020.2982318","journal-title":"IEEE Access"},{"issue":"1","key":"3335_CR66","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1257\/jel.20160980","volume":"56","author":"PD B\u00f3","year":"2018","unstructured":"B\u00f3 PD, Fr\u00e9chette GR (2018) On the determinants of cooperation in infinitely repeated games: a survey. J Econ Lit 56(1):60\u2013114. https:\/\/doi.org\/10.1257\/jel.20160980","journal-title":"J Econ Lit"},{"key":"3335_CR67","doi-asserted-by":"publisher","unstructured":"Perc M, Jordan JJ, Rand DG, Wang Z, Boccaletti S, Szolnoki A (2017) Statistical physics of human cooperation. Physics Reports, vol. 687. Elsevier, Amsterdam, pp 1\u201351. https:\/\/doi.org\/10.1016\/j.physrep.2017.05.004.","DOI":"10.1016\/j.physrep.2017.05.004"},{"issue":"8","key":"3335_CR68","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/MCOM.2011.5978425","volume":"49","author":"K Akkarajitsakul","year":"2011","unstructured":"Akkarajitsakul K, Hossain E, Niyato D (2011) Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game. IEEE Commun Mag 49(8):120\u2013127. https:\/\/doi.org\/10.1109\/MCOM.2011.5978425","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"3335_CR69","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2465769.2465771","volume":"1","author":"L Blume","year":"2013","unstructured":"Blume L, Easley D, Kleinberg J, Kleinberg R, Tardos \u00c9 (2013) Network formation in the presence of contagious risk. ACM Trans Econ Comput 1(2):1\u201320. https:\/\/doi.org\/10.1145\/2465769.2465771","journal-title":"ACM Trans Econ Comput"},{"key":"3335_CR70","doi-asserted-by":"publisher","unstructured":"Goyal S, Jabbari S, Kearns M, Khanna S, Morgenstern J (2016) Strategic network formation with attack and immunization. In: Lecture notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 10123. LNCS, pp 429\u2013443, https:\/\/doi.org\/10.1007\/978-3-662-54110-4_30.","DOI":"10.1007\/978-3-662-54110-4_30"},{"key":"3335_CR71","doi-asserted-by":"crossref","unstructured":"Chen Y, Jabbari S, Kearns M, Khanna S, Morgenstern J (2019) Network formation under random attack and probabilistic spread. IJCAI International joint conference on Artificial intelligence, vol 2019, pp 180\u2013186. Accessed: 24 July 2020. Available: https:\/\/arxiv.org\/abs\/1906.00241.","DOI":"10.24963\/ijcai.2019\/26"},{"issue":"2","key":"3335_CR72","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/3089649.3089656","volume":"42","author":"T Bures","year":"2017","unstructured":"Bures T et al (2017) Software engineering for smart cyber-physical systems. ACM SIGSOFT Softw Eng Notes 42(2):19\u201324. https:\/\/doi.org\/10.1145\/3089649.3089656","journal-title":"ACM SIGSOFT Softw Eng Notes"},{"key":"3335_CR73","doi-asserted-by":"publisher","unstructured":"Shirazi NUH, Simpson S, Marnerides AK, Watson M, Mauthe A, Hutchison D (2014) Assessing the impact of intra-cloud live migration on anomaly detection. In: 2014 IEEE 3rd international conference on cloud networking, CloudNet 2014, pp 52\u201357, https:\/\/doi.org\/10.1109\/CloudNet.2014.6968968.","DOI":"10.1109\/CloudNet.2014.6968968"},{"key":"3335_CR74","doi-asserted-by":"publisher","unstructured":"Wang L, Bai Y, Jiang Q, Leung VCM, Cai W, Li X (2020) Beh-Raft-Chain: a behavior-based fast blockchain protocol for complex networks. IEEE Transactions on Network Science and Engineering, pp 1\u20131. https:\/\/doi.org\/10.1109\/tnse.2020.2984490.","DOI":"10.1109\/tnse.2020.2984490"}],"container-title":["SN Applied Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42452-020-03335-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42452-020-03335-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42452-020-03335-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T22:48:59Z","timestamp":1667947739000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42452-020-03335-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,19]]},"references-count":74,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["3335"],"URL":"https:\/\/doi.org\/10.1007\/s42452-020-03335-4","relation":{},"ISSN":["2523-3963","2523-3971"],"issn-type":[{"value":"2523-3963","type":"print"},{"value":"2523-3971","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,19]]},"assertion":[{"value":"9 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}],"article-number":"1534"}}