{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T21:14:28Z","timestamp":1769202868383,"version":"3.49.0"},"reference-count":31,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065665","type":"journal-article","created":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T03:49:31Z","timestamp":1749095371000},"page":"3305-3319","source":"Crossref","is-referenced-by-count":2,"title":["DRL-AMIR: Intelligent Flow Scheduling for Software-Defined Zero Trust Networks"],"prefix":"10.32604","volume":"84","author":[{"given":"Wenlong","family":"Ke","sequence":"first","affiliation":[]},{"given":"Zilong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Peiyu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Benfeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jinglin","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ziyi","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Shigen","family":"Shen","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"110376","DOI":"10.1016\/j.comnet.2024.110376","article-title":"ATT&CK-based advanced persistent threat attacks risk propagation assessment model for zero trust networks","volume":"245","author":"Zhang","year":"2024","journal-title":"Comput Netw"},{"key":"ref2","first-page":"1","article-title":"Token as a service for software-defined zero trust networking","volume":"33","author":"Erel-\u00d6z\u00e7evik","year":"2024","journal-title":"J Netw Syst Manag"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MWC.001.2300414","article-title":"Distributed edge caching for zero trust-enabled connected and automated vehicles: a multi-agent reinforcement learning approach","volume":"31","author":"Xu","year":"2024","journal-title":"IEEE Wirel Commun"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"182805","DOI":"10.1007\/s11704-023-2495-0","article-title":"Exploiting blockchain for dependable services in zero-trust vehicular networks","volume":"18","author":"Hao","year":"2023","journal-title":"Front Comput Sci"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1186\/s13677-024-00651-7","article-title":"An overview of QoS-aware load balancing techniques in SDN-based IoT networks","volume":"13","author":"Rostami","year":"2024","journal-title":"J Cloud Comput"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"835","DOI":"10.1109\/TMC.2022.3215976","article-title":"Software defined multicast using segment routing in LEO satellite networks","volume":"23","author":"Hu","year":"2024","journal-title":"IEEE Trans Mob Comput"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MWC.001.2300368","article-title":"Industrial wireless internet zero trust model: zero trust meets dynamic federated learning with blockchain","volume":"31","author":"Xie","year":"2024","journal-title":"IEEE Wirel Commun"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"2119","DOI":"10.1109\/TNSM.2022.3151552","article-title":"Software defined multicast for large-scale multi-Layer LEO satellite networks","volume":"19","author":"Hu","year":"2022","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1933","DOI":"10.1007\/s00607-024-01269-y","article-title":"Matyas-Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network","volume":"106","author":"Dhanaraj","year":"2024","journal-title":"Computing"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1269","DOI":"10.1109\/TCCN.2021.3136221","article-title":"Intelligent joint network slicing and routing via GCN-powered multi-task deep reinforcement learning","volume":"8","author":"Dong","year":"2022","journal-title":"IEEE Trans Cogn Commun Netw"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"2283","DOI":"10.1109\/TNSM.2023.3287936","article-title":"Dealing with changes: resilient routing via graph neural networks and multi-agent deep reinforcement learning","volume":"20","author":"Bhavanasi","year":"2023","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1328","DOI":"10.3390\/s24041328","article-title":"A review and comparative analysis of relevant approaches of zero trust network model","volume":"24","author":"Dhiman","year":"2024","journal-title":"Sensors"},{"key":"ref13","first-page":"2743","article-title":"SCIRD: revealing infection of malicious software in edge computing-enabled IoT networks","volume":"79","author":"Ye","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"6978","DOI":"10.1109\/TIFS.2024.3420233","article-title":"SGD3QN: joint stochastic games and dueling double deep Q-networks for defending malware propagation in edge intelligence-enabled internet of things","volume":"19","author":"Shen","year":"2024","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1016\/B978-0-443-34226-4.00018-6","author":"Okegbile","year":"2025","journal-title":"Blockchain and digital twin for smart hospitals"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"22726","DOI":"10.1109\/JIOT.2024.3382829","article-title":"A reputation-enhanced shard-based byzantine fault-tolerant scheme for secure data sharing in zero trust human digital twin systems","volume":"11","author":"Okegbile","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"109435","DOI":"10.1016\/j.compeleceng.2024.109435","article-title":"Personalized device authentication scheme using Q-learning-based decision-making with the aid of transfer fuzzy learning for IIoT devices in zero trust network (PDA-QLTFL)","volume":"118","author":"Singh","year":"2024","journal-title":"Comput Electr Eng"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"9032","DOI":"10.1109\/ACCESS.2025.3527224","article-title":"Hybrid-hierarchical synchronization for resilient large-scale SDN architectures","volume":"13","author":"Pacini","year":"2025","journal-title":"IEEE Access"},{"key":"ref19","first-page":"605","article-title":"An SDN-based framework for E2E QoS guarantee in internet-of-things devices","volume":"12","author":"Ali","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"102387","DOI":"10.1016\/j.phycom.2024.102387","article-title":"An effective deep-Q learning scheme for QoS improvement in physical layer of software-defined networks","volume":"66","author":"Alenazi","year":"2024","journal-title":"Phys Commun"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"33202","DOI":"10.1109\/ACCESS.2025.3543236","article-title":"A multi-phase DRL-driven SDN migration framework addressing budget, legacy service compatibility, and dynamic traffic","volume":"13","author":"Tan","year":"2025","journal-title":"IEEE Access"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TNSM.2024.3424928","article-title":"SNS: smart node selection for scalable traffic engineering in segment routing networks","volume":"22","author":"Wang","year":"2025","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"23931","DOI":"10.1109\/JIOT.2024.3387090","article-title":"MFGD3QN: enhancing edge intelligence defense against DDoS with mean-field games and dueling double deep Q-Network","volume":"11","author":"Shen","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref24","first-page":"1","article-title":"Joint mean-field game and multiagent asynchronous advantage actor-critic for edge intelligence-based IoT malware propagation defense","volume":"2025","author":"Shen","year":"2025","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"4807","DOI":"10.1109\/TNSM.2021.3132491","article-title":"DRSIR: a deep reinforcement learning approach for routing in software-defined networking","volume":"19","author":"Casas-Velasco","year":"2022","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"1444","DOI":"10.1109\/TMC.2023.3235446","article-title":"Routing optimization with deep reinforcement learning in knowledge defined networking","volume":"23","author":"He","year":"2024","journal-title":"IEEE Trans Mob Comput"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"5302","DOI":"10.1109\/TIFS.2023.3307956","article-title":"Joint differential game and double deep Q-networks for suppressing malware spread in industrial internet of things","volume":"18","author":"Shen","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1109\/TNET.2021.3126933","article-title":"Enabling scalable routing in software-defined networks with deep reinforcement learning on critical nodes","volume":"30","author":"Sun","year":"2022","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"3383","DOI":"10.1109\/TNSE.2024.3371384","article-title":"Delay-aware routing in software-defined networks via network tomography and reinforcement learning","volume":"11","author":"Tao","year":"2024","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"6190","DOI":"10.1109\/TNSM.2024.3447753","article-title":"SAC-PP: jointly optimizing privacy protection and computation offloading for mobile edge computing","volume":"21","author":"Shen","year":"2024","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"5733","DOI":"10.1109\/TNSM.2024.3402275","article-title":"DHRL-FNMR: an intelligent multicast routing approach based on deep hierarchical reinforcement learning in SDN","volume":"21","author":"Ye","year":"2024","journal-title":"IEEE Trans Netw Serv Manag"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-2\/TSP_CMC_65665\/TSP_CMC_65665.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:52:20Z","timestamp":1763344340000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n2\/62920"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":31,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065665","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}