{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:30:33Z","timestamp":1775579433137,"version":"3.50.1"},"reference-count":103,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1109\/tnsm.2025.3570052","type":"journal-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T13:32:31Z","timestamp":1747229551000},"page":"3480-3495","source":"Crossref","is-referenced-by-count":5,"title":["Toward Intelligent Intent-Based Network Slicing for IoT Systems: Enabling Technologies, Challenges, and Vision"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7439-5952","authenticated-orcid":false,"given":"Dana","family":"Haj Hussein","sequence":"first","affiliation":[{"name":"Department of Systems and Computer Engineering, Carleton University, Ottawa, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4319-8021","authenticated-orcid":false,"given":"Mohamed","family":"Ibnkahla","sequence":"additional","affiliation":[{"name":"Department of Systems and Computer Engineering, Carleton University, Ottawa, ON, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc9315"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3215919"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN58024.2023.10230112"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3084834"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps56602.2022.10008673"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3067807"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.002.2200119"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT56141.2022.10073456"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51644.2023.10059966"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCWorkshops57813.2023.10233836"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969208"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Spring48590.2020.9128422"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.2100194"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3044626"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3050155"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3277466"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3158270"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3267985"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.006.2200534"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3287651"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2023.3294445"},{"key":"ref22","volume-title":"Autonomic computing: IBM\u2019s perspective on the state of information technology","author":"Horn","year":"2001"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8328"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3050297"},{"key":"ref25","article-title":"Telecommunication management; study on management and orchestration of network slicing for next generation network","year":"2018"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3045381"},{"key":"ref27","volume-title":"The European Telecommunications Standards Institute Industry Specification Group on Network Function Virtualization (ETSI ISG NFV)","year":"2019"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3218527"},{"key":"ref29","article-title":"Multi-access edge computing (MEC), MEC management, part 2: Application lifecycle, rules and requirements management","year":"2022"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2814571"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3151028"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.133.2200527"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2020.000019"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3239220"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110408"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS50412.2020.9236962"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS52696.2021.9562662"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft51509.2021.9492643"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICT52184.2021.9511519"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft51509.2021.9492534"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCWorkshops52231.2021.9538888"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN53031.2021.9665134"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN53031.2021.9665048"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482575"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/commnet56067.2022.9993854"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789706"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3324010"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3265894"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3312795"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft60951.2024.10588881"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2025.3564138"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2025.3546124"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2022.3214826"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500987"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3318123"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3015432"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3132925"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3229891"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3174469"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3348117"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC57260.2024.10570551"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2025.3539646"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3122147"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT62078.2024.10811126"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC49221.2020.9297174"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-6198-6_20"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3193189"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3312349"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC49221.2020.9297185"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2023.3293279"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.0003.2200014"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3194078"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10000950"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3293028"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3209281.3209335"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/CogMI52975.2021.00024"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/1107499.1107502"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/OJITS.2022.3207235"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001658"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2023.3340033"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.004.2200025"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800898"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3118058"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.005.20949"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA-C57050.2023.00066"},{"key":"ref86","volume-title":"Integrating heterogeneous data in dataspaces\u2014A systematic mapping study.","author":"Hutterer","year":"2022"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft57336.2023.10175454"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/APCC55198.2022.9943779"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC54292.2022.9805815"},{"key":"ref90","article-title":"Study on RAN improvements for machine-type communications","year":"2012"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3129116"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3338189"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2023.3316750"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/AIST55798.2022.10065328"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ETIS64005.2025.10961869"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN60692.2024.10539172"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft60951.2024.10588917"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft60951.2024.10588897"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.001.2400368"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft57336.2023.10175410"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM59352.2023.10327837"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2024.3503292"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3420120"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/11118327\/11004066.pdf?arnumber=11004066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T17:44:45Z","timestamp":1754588685000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11004066\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":103,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2025.3570052","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8]]}}}