{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T16:41:58Z","timestamp":1769272918499,"version":"3.49.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:00:00Z","timestamp":1699228800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:00:00Z","timestamp":1699228800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,6]]},"DOI":"10.1109\/cscn60443.2023.10453125","type":"proceedings-article","created":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T19:01:05Z","timestamp":1709578865000},"page":"296-301","source":"Crossref","is-referenced-by-count":11,"title":["Security in Intent-Based Networking: Challenges and Solutions"],"prefix":"10.1109","author":[{"given":"Ijaz","family":"Ahmad","sequence":"first","affiliation":[{"name":"VTT Technical Research Centre of Finland"}]},{"given":"Jere","family":"Malinen","sequence":"additional","affiliation":[{"name":"VTT Technical Research Centre of Finland"}]},{"given":"Filippos","family":"Christou","sequence":"additional","affiliation":[{"name":"Institute of Communication Networks and Computer Engineering (IKR), University of Stuttgart,Germany"}]},{"given":"Pawani","family":"Porambage","sequence":"additional","affiliation":[{"name":"VTT Technical Research Centre of Finland"}]},{"given":"Andreas","family":"Kirst\u00e4dter","sequence":"additional","affiliation":[{"name":"Institute of Communication Networks and Computer Engineering (IKR), University of Stuttgart,Germany"}]},{"given":"Jani","family":"Suomalainen","sequence":"additional","affiliation":[{"name":"VTT Technical Research Centre of Finland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3215919"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.07.001"},{"key":"ref3","year":"2021","journal-title":"Experiential networked intelligence (eni); overview of prominent control loop architectures"},{"key":"ref4","year":"2021","journal-title":"Zero-touch network and Service Management (ZSM); ClosedLoop Automation; Part 1: Enablers"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2474118"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3188311"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.13052\/jicts2245-800X.926"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit58263.2023.10188316"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2015.7266528"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM54355.2022.00056"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3510547.3517923"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102955"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3183591"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.10.000289"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft51509.2021.9492679"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.101.2100141"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps56602.2022.10008673"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2051"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM.2017.8256016"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM55787.2022.9964606"},{"key":"ref21","first-page":"1","article-title":"Grooming connectivity intents in ip-optical networks using directed acyclic graphs","volume-title":"Photonic Networks; 24th ITG-Symposium","author":"Christou"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17487\/rfc9315"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2015.26"},{"key":"ref25","first-page":"501","article-title":"Fingerprinting SDN applications via encrypted control traffic","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019)","author":"Cao"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3031966"},{"key":"ref27","volume-title":"Zero-touch network and Service Management (ZSM); General Security Aspects","year":"2021"},{"key":"ref28","volume-title":"Securing artificial intelligence (sai); problem statement","year":"2020"},{"key":"ref29","volume-title":"Securing Artificial Intelligence (SAI); Mitigation Strategy Report","year":"2021"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/PST47121.2019.8949034"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3163591"},{"key":"ref32","first-page":"121","volume-title":"Towards Reverse-Engineering BlackBox Neural Networks","author":"Oh","year":"2019"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241142"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3595292"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50423-6_46"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"ref37","volume-title":"Intent-Based Networking","year":"2015"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft54395.2022.9844116"},{"key":"ref39","article-title":"Service Assurance for Intent-Based Networking Architecture","author":"Claise","year":"2023","journal-title":"RFC 9417"},{"key":"ref40","article-title":"Intent Classification","author":"Li","year":"2022","journal-title":"RFC 9316"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Spring48590.2020.9128422"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3265894"}],"event":{"name":"2023 IEEE Conference on Standards for Communications and Networking (CSCN)","location":"Munich, Germany","start":{"date-parts":[[2023,11,6]]},"end":{"date-parts":[[2023,11,8]]}},"container-title":["2023 IEEE Conference on Standards for Communications and Networking (CSCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10452895\/10453116\/10453125.pdf?arnumber=10453125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T17:51:05Z","timestamp":1744393865000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10453125\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,6]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/cscn60443.2023.10453125","relation":{},"subject":[],"published":{"date-parts":[[2023,11,6]]}}}