{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:00:47Z","timestamp":1774022447959,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/netsoft60951.2024.10588935","type":"proceedings-article","created":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T17:23:25Z","timestamp":1720632205000},"page":"13-18","source":"Crossref","is-referenced-by-count":7,"title":["Knowledge Graph Embedding in Intent-Based Networking"],"prefix":"10.1109","author":[{"given":"Kashif","family":"Mehmood","sequence":"first","affiliation":[{"name":"NTNU&#x2014;Norwegian University of Science and Technology,Department of Information Security and Communication Technology (IIK),Trondheim,Norway"}]},{"given":"Katina","family":"Kralevska","sequence":"additional","affiliation":[{"name":"NTNU&#x2014;Norwegian University of Science and Technology,Department of Information Security and Communication Technology (IIK),Trondheim,Norway"}]},{"given":"David","family":"Palma","sequence":"additional","affiliation":[{"name":"NTNU&#x2014;Norwegian University of Science and Technology,Department of Information Security and Communication Technology (IIK),Trondheim,Norway"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109477"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3215919"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc9315"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft57336.2023.10175454"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2300270"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCWorkshops57813.2023.10233789"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BalkanCom58402.2023.10167994"},{"key":"ref10","article-title":"Owl 2 web ontology language; structural specification and functional-style syntax","volume-title":"technical report","year":"2012"},{"key":"ref11","article-title":"Rdf 1.1 primer","volume-title":"technical report","year":"2014"},{"key":"ref12","article-title":"Intent common model v2.1.0","volume-title":"Technical Report TR292","year":"2022"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MeditCom58224.2023.10266653"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806502"},{"key":"ref15","article-title":"Knowledge Representation Learning: A Quantitative Review","author":"Lin","year":"2018"},{"key":"ref16","article-title":"Intent management ontology v1.1.0","volume-title":"Technical Report TR290","year":"2022"},{"key":"ref17","article-title":"A unified framework for rank-based evaluation metrics for link prediction in knowledge graphs","author":"Hoyt","year":"2022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3070843"}],"event":{"name":"2024 IEEE 10th International Conference on Network Softwarization (NetSoft)","location":"Saint Louis, MO, USA","start":{"date-parts":[[2024,6,24]]},"end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 IEEE 10th International Conference on Network Softwarization (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10587319\/10588876\/10588935.pdf?arnumber=10588935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T05:46:32Z","timestamp":1721281592000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10588935\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/netsoft60951.2024.10588935","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}