{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:05:04Z","timestamp":1771661104111,"version":"3.50.1"},"reference-count":39,"publisher":"Zhejiang University Press","issue":"12","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front Inform Technol Electron Eng"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1631\/fitee.2500218","type":"journal-article","created":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T05:33:32Z","timestamp":1764653612000},"page":"2550-2568","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic trust-based service function chain deployment method for disrupting attack chains"],"prefix":"10.1631","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-0326-0513","authenticated-orcid":false,"given":"Deqiang","family":"Zhou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9579-6132","authenticated-orcid":false,"given":"Xinsheng","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Wei","family":"You","sequence":"additional","affiliation":[]},{"given":"Hang","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Mingyan","family":"Xu","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2025,12,2]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2023.3287757"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-023-09734-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2023.3327632"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2022.3189546"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.001.2300383"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2017.2668470"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/globecom52923.2024.10901375"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-2008-9_43"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2016.2598420"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ictc49870.2020.9289547"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/netsoft51509.2021.9492596"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.112194"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3572717"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.24.816"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuron.2015.08.033"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2022.3145103"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109484"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2021.3096477"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/noms47738.2020.9110334"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuron.2019.01.026"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.06.041"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3327795"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/nfv-sdn50289.2020.9289885"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/sds.2019.8768602"},{"issue":"9","key":"ref25","doi-asserted-by":"crossref","first-page":"1871","DOI":"10.1162\/neco_a_01522","article-title":"Probing the relationship between latent linear dynamical systems and low-rank recurrent neural network models","volume":"34","author":"Valente","year":"2022","journal-title":"Neur Comput"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2021.3128882"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-neuro-092619-094115"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2021.3051903"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2022.3193074"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2022.3200059"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3346187"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/anthology.2013.6784925"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2020.2995863"},{"issue":"1","key":"ref34","first-page":"46","article-title":"Network function heterogeneous redundancy deployment method based on immune algorithm","volume":"7","author":"Zhang","year":"2021","journal-title":"Chin J Netw Inform Secur"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2023.3237604"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3293497"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10436953"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110843"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110748"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2500218.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1631\/FITEE.2500218","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2500218.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:14:48Z","timestamp":1771658088000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1631\/FITEE.2500218"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":39,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["2120"],"URL":"https:\/\/doi.org\/10.1631\/fitee.2500218","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"17 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"All the authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}