{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:49:07Z","timestamp":1762004947934,"version":"3.37.3"},"reference-count":100,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:00:00Z","timestamp":1509494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Select. Areas Commun."],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/jsac.2017.2760354","type":"journal-article","created":{"date-parts":[[2017,10,9]],"date-time":"2017-10-09T18:08:53Z","timestamp":1507572533000},"page":"2431-2445","source":"Crossref","is-referenced-by-count":28,"title":["Autonomic Communications in Software-Driven Networks"],"prefix":"10.1109","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0979-9272","authenticated-orcid":false,"given":"Zhongliang","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2187-0382","authenticated-orcid":false,"given":"Eryk","family":"Schiller","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1101-8367","authenticated-orcid":false,"given":"Eirini","family":"Kalogeiton","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5968-7108","authenticated-orcid":false,"given":"Torsten","family":"Braun","sequence":"additional","affiliation":[]},{"given":"Burkhard","family":"Stiller","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2782-3600","authenticated-orcid":false,"given":"Mevlut Turker","family":"Garip","sequence":"additional","affiliation":[]},{"given":"Joshua","family":"Joy","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Gerla","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4070-6580","authenticated-orcid":false,"given":"Nabeel","family":"Akhtar","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Matta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2017","journal-title":"HPE OpenNFV Solution Portal","key":"ref39"},{"year":"2017","journal-title":"H2020 5GPPP CogNet Project","key":"ref38"},{"year":"2017","journal-title":"H2020 5GPPP Selfnet Project","key":"ref33"},{"year":"2017","journal-title":"The 3rd Generation Partnership Project (3GPP) Portal","key":"ref32"},{"year":"2017","journal-title":"OPNFV Portal","key":"ref31"},{"year":"2017","journal-title":"ITU Telecommunication Standardization Sector Portal","key":"ref30"},{"year":"2017","journal-title":"H2020 5GPPP 5G-XHaul Project","key":"ref37"},{"year":"2017","journal-title":"EU FP7 Project","key":"ref36"},{"year":"2017","author":"bernini","journal-title":"VNF Pool Orchestration For Automated Resiliency in Service Chains","key":"ref35"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1155\/2016\/2897479"},{"year":"2017","journal-title":"European Telecommunications Standards Institute (ETSI) Portal","key":"ref28"},{"year":"2017","journal-title":"Open Grid Forum (OGF) Portal","key":"ref27"},{"year":"2017","journal-title":"OpenDaylight Portal","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/MCOM.2013.6553677"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/MCOM.2017.1600936"},{"year":"2017","journal-title":"EU FP7 Mobile Cloud Networking Project","key":"ref21"},{"year":"2014","author":"patel","article-title":"MobilEe-edge computing&#x2014;Introductory technical white paper","key":"ref24"},{"year":"2013","journal-title":"Network Functions Virtualisation (NFV)","key":"ref23"},{"year":"2017","journal-title":"The Internet Engineering Task Force (IETF) Portal","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref100","DOI":"10.1007\/978-3-642-02029-2_2"},{"year":"2017","journal-title":"Open Networking Foundation (ONF) Portal","key":"ref25"},{"year":"2017","author":"zhao","journal-title":"Next Place Prediction With Hybrid Features Using Ensemble Learning","key":"ref50"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1109\/TNET.2016.2562259"},{"year":"2007","author":"ragouzis","article-title":"Security assertion markup language (SAML) V2.0 technical overview","key":"ref59"},{"year":"2017","journal-title":"Business Support System Definition","key":"ref58"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.1109\/TMM.2016.2596042"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1109\/INM.2015.7140442"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1145\/3098593.3098600"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1109\/TNET.2012.2188837"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1145\/1921168.1921172"},{"key":"ref52","first-page":"671","article-title":"Packet routing in dynamically changing networks: A reinforcement learning approach","author":"boyan","year":"1994","journal-title":"Proceedings of ACM NIPS"},{"year":"2017","journal-title":"Huawei NFV Open Lab Portal","key":"ref40"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/MPOT.2007.906119"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/1186778.1186782"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/JPROC.2009.2013012"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/98.788210"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/863955.863957"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1109\/LCN.2016.77"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/MCOM.2006.273099"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/DASC.2006.44"},{"year":"2017","journal-title":"New ETSI Group on Improving Operator Experience Using Artificial Intelligence","key":"ref46"},{"year":"2015","author":"bj\u00f6rklund","journal-title":"YANG&#x2014;A data modeling language for the Network Configuration Protocol (NETCONF)","key":"ref45"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/TNSM.2016.2544402"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/MWC.2016.1500356WC"},{"year":"2017","journal-title":"Intel Open Network Platform Portal","key":"ref42"},{"year":"2017","journal-title":"Cisco Open Network Environment Portal","key":"ref41"},{"year":"2010","journal-title":"Methods for Testing and Specification (MTS) Automated Interoperability Testing Methodology and Framework","key":"ref44"},{"year":"2017","journal-title":"Network Functions Virtualization Testing Best Practices","key":"ref43"},{"key":"ref73","first-page":"1","article-title":"CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)","author":"shin","year":"2012","journal-title":"Proc IEEE ICNP"},{"doi-asserted-by":"publisher","key":"ref72","DOI":"10.1109\/TDSC.2013.8"},{"doi-asserted-by":"publisher","key":"ref71","DOI":"10.1109\/EWSDN.2014.24"},{"key":"ref70","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-642-23644-0_9","article-title":"Revisiting traffic anomaly detection using software defined networking","author":"mehdi","year":"2011","journal-title":"2nd Int Workshop Recent Adv Intrusion Detect"},{"doi-asserted-by":"publisher","key":"ref76","DOI":"10.1007\/978-81-322-2550-8_48"},{"doi-asserted-by":"publisher","key":"ref77","DOI":"10.1109\/ICCT.2013.6820345"},{"doi-asserted-by":"publisher","key":"ref74","DOI":"10.1016\/j.bjp.2013.10.014"},{"doi-asserted-by":"publisher","key":"ref75","DOI":"10.1109\/CloudNet.2014.6969003"},{"doi-asserted-by":"publisher","key":"ref78","DOI":"10.1145\/2491185.2491215"},{"doi-asserted-by":"publisher","key":"ref79","DOI":"10.1145\/2620728.2620749"},{"year":"2005","author":"wason","journal-title":"Liberty ID-FF Architecture Overview","key":"ref60"},{"year":"2006","author":"kaler","journal-title":"Web Services Federation Language (WS-Federation) Version 1 2","key":"ref62"},{"year":"2005","journal-title":"Liberty ID-FF Architecture Overview","key":"ref61"},{"year":"2007","journal-title":"OpenID Authentication 2 0&#x2014;Final","key":"ref63"},{"doi-asserted-by":"publisher","key":"ref64","DOI":"10.1080\/00987913.2004.10764917"},{"doi-asserted-by":"publisher","key":"ref65","DOI":"10.1002\/cpe.1313"},{"doi-asserted-by":"publisher","key":"ref66","DOI":"10.1109\/DASC.2011.31"},{"doi-asserted-by":"publisher","key":"ref67","DOI":"10.1007\/11610113_89"},{"doi-asserted-by":"publisher","key":"ref68","DOI":"10.1007\/978-3-642-24669-2_13"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/WOWMOM.2006.110"},{"key":"ref69","first-page":"1","article-title":"Ensemble-learning approaches for network security and anomaly detection","author":"vanerio","year":"2017","journal-title":"Proc ACM Workshop Big-DAMA"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/MC.2003.1160055"},{"doi-asserted-by":"publisher","key":"ref95","DOI":"10.1109\/MC.2010.361"},{"key":"ref94","article-title":"Formal and practical aspects of autonomic computing and networking: Specification, development, and verification","author":"cong-vinh","year":"2011","journal-title":"Information Science Reference"},{"doi-asserted-by":"publisher","key":"ref93","DOI":"10.1016\/B978-044450813-3\/50026-6"},{"year":"2017","journal-title":"Address Space Layout Randomization (ASLR)","key":"ref92"},{"year":"2017","journal-title":"Address space layout randomization","key":"ref91"},{"doi-asserted-by":"publisher","key":"ref90","DOI":"10.1109\/MILCOM.2011.6127486"},{"doi-asserted-by":"publisher","key":"ref98","DOI":"10.1145\/501978.501980"},{"doi-asserted-by":"publisher","key":"ref99","DOI":"10.1109\/NSS.2009.28"},{"key":"ref96","first-page":"16","article-title":"Model checking for autonomic systems specified with ASSL","author":"vassev","year":"2009","journal-title":"Proc 1st NASA Formal Methods Symp"},{"doi-asserted-by":"publisher","key":"ref97","DOI":"10.1016\/j.entcs.2004.10.011"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.adhoc.2012.02.016"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/j.future.2013.01.010"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/MedHocNet.2014.6849111"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/SECON.2015.7132919"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TVT.2016.2563164"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/MNET.2015.7064907"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TNSM.2016.2598354"},{"year":"2017","journal-title":"SEL publication","key":"ref82"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/2795381.2795390"},{"year":"2017","journal-title":"5G Depends on SDN & NFV","key":"ref81"},{"year":"2009","journal-title":"3rd Generation Partnership Project Technical Specification Group Services and System Aspects Telecommunication Management Self-Organizing Networks (SON) Concepts and Requirements","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref84","DOI":"10.1109\/MIC.2017.3481345"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/s10458-008-9054-9"},{"key":"ref83","first-page":"1","article-title":"Tackling cyber threats with automatic decisions and reactions based on machine-learning techniques","author":"zago","year":"2017","journal-title":"Proc EuCNC"},{"doi-asserted-by":"publisher","key":"ref80","DOI":"10.1109\/COMST.2015.2487361"},{"year":"2017","journal-title":"Moving Target Defense vs Moving Target Attacks The Two Faces of Deception","key":"ref89"},{"key":"ref85","first-page":"1","article-title":"Keeping an eye on botnets in 5G networks: Detection and mitigation by NFV and SDN apps","author":"perez","year":"2017","journal-title":"Proc EuCNC"},{"key":"ref86","first-page":"35","author":"peng","year":"2014","journal-title":"Moving Target Defense for Cloud Infrastructures Lessons from Botnets"},{"key":"ref87","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-0977-9","volume":"54","author":"jajodia","year":"2011","journal-title":"Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats"},{"year":"2017","journal-title":"Moving Target Defense Common Practices","key":"ref88"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/49\/8165922\/08063402.pdf?arnumber=8063402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:25:35Z","timestamp":1642004735000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8063402\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":100,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/jsac.2017.2760354","relation":{},"ISSN":["0733-8716"],"issn-type":[{"type":"print","value":"0733-8716"}],"subject":[],"published":{"date-parts":[[2017,11]]}}}