{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:21:33Z","timestamp":1740169293654,"version":"3.37.3"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100020884","name":"Agencia Nacional de Investigaci\u00f3n y Desarrollo (ANID) through Fondecyt Postdoctorado 2020","doi-asserted-by":"publisher","award":["3200858"],"award-info":[{"award-number":["3200858"]}],"id":[{"id":"10.13039\/501100020884","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3215675","type":"journal-article","created":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T21:40:57Z","timestamp":1667511657000},"page":"111153-111170","source":"Crossref","is-referenced-by-count":1,"title":["Guaranteeing Network Reliability to 0-Day Exploits Using Cost-Effective Heterogeneous Node Migration"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6827-2657","authenticated-orcid":false,"given":"Yasmany","family":"Prieto","sequence":"first","affiliation":[{"name":"Departamento de Ingenier&#x00ED;a Inform&#x00E1;tica, Universidad Cat&#x00F3;lica de la Sant&#x00ED;sima Concepci&#x00F3;n, Concepci&#x00F3;n, Chile"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5033-432X","authenticated-orcid":false,"given":"Miguel","family":"Figueroa","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, Universidad de Concepci&#x00F3;n, Concepci&#x00F3;n, Chile"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5225-5334","authenticated-orcid":false,"given":"Jorge E.","family":"Pezoa","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, Universidad de Concepci&#x00F3;n, Concepci&#x00F3;n, Chile"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2017.8169853"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2723090"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2018.8780785"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2909929"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11786-018-0345-5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/OPCS53376.2021.9588716"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/RNDM.2018.8489811"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2013.2293193"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3095149"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.06.004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2516916"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66505-4_6"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_28"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508177"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986867"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2373392"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2019.8814635"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2018.8780822"},{"key":"ref20","first-page":"1","article-title":"Would diversity really increase the robustness of the routing infrastructure against software defects?","volume-title":"Proc. NDSS","author":"Caballero"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2019.8651765"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICETA51985.2020.9379257"},{"volume-title":"Network Functions Virtualization (NFV) With a Touch of SDN: Netw Fun Vir (NFV ePub_1)","year":"2016","author":"Chayapathi","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1201\/9781315208787"},{"volume-title":"Understanding SD-WAN Managed Services","year":"2017","author":"Santitoro","key":"ref25"},{"volume-title":"SD-WAN\u2014Software-Defined WAN","year":"2022","key":"ref26"},{"volume-title":"Secure SD-WAN","year":"2022","key":"ref27"},{"volume-title":"What is SD-WAN?","year":"2022","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2669082"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2014.6914312"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2015.7483086"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614094"},{"volume-title":"Software Engineering Institute the Cert Division","year":"2022","key":"ref33"},{"volume-title":"CVE Details","year":"2022","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1201\/b13098-10"},{"volume-title":"Rapid7 Exploit Database","year":"2022","key":"ref36"},{"volume-title":"Security Week: Internet and Enterprise Security News, Insights, Analysis","year":"2022","key":"ref37"},{"volume-title":"Network Science","year":"2016","author":"Barab\u00e1si","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMNET.2010.03.005"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-011-9573-6"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5936160"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ares.2014.86"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.003"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3139857"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978002"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2979895"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2019.8806678"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/c2009-0-30640-6"},{"volume-title":"Your Comprehensive Guide to SD-WAN Service Features and Pricing","year":"2022","author":"Thorne","key":"ref49"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON.2014.6876711"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC48623.2020.9084791"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/LPT.2003.820105"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3121622"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.11.025"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2050490"},{"volume-title":"Distributed Computing Network Reliability","year":"1990","author":"Rai","key":"ref56"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2002.1039866"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT.2012.6459764"},{"issue":"5","key":"ref59","first-page":"1055","article-title":"Placing controllers over complex wide area SDNs based on clique identification","volume":"22","author":"Liao","year":"2021","journal-title":"J. Internet Technol."},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111002"},{"volume-title":"Who are the Best SD WAN Providers and Vendors?","year":"2021","key":"ref61"},{"volume-title":"Top SD-WAN Vendors and How They Got There","year":"2021","author":"Vance","key":"ref62"},{"volume-title":"Gartner Magic Quadrant for WAN Edge Infrastructure","year":"2021","key":"ref63"},{"volume-title":"SD-WAN Pricing: Cost Analysis, Price List and Roi","year":"2021","key":"ref64"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/icec.1994.349995"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09923914.pdf?arnumber=9923914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T06:06:53Z","timestamp":1706076413000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9923914\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3215675","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2022]]}}}