Computer Science ›› 2026, Vol. 53 ›› Issue (1): 371-381.doi: 10.11896/jsjkx.250300076
• Information Security • Previous Articles Next Articles
ZHOU Deqiang1, JI Xinsheng1,2, YOU Wei1, QIU Hang1 , YANG Jie1
CLC Number:
| [1]NA M,LEE J,CHOI G,et al.Operator’s Perspective on 6G:6G Services,Vision,and Spectrum[J].IEEE Communications Ma-gazine,2024,62(8):178-184. [2]ITU.Framework and overall objectives of the future development of IMT for 2030 and beyond[EB/OL].https://www.itu.int/md/R19-WP5D/new/en. [3]HERRERA J G,BOTERO J F.Resource allocation in NFV:A comprehensive survey[J].IEEE Transactions on Network and Service Management,2016,13(3):518-532. [4]HALEPLIDIS E,PENTIKOUSIS K,DENAZIS S,et al.Soft-ware-defined networking(SDN):Layers and architecture terminology[R].2015. [5]QUINN P,NADEAU T.Problem statement for service function chaining[R].2015. [6]MOGYOROSI F,BABARCZI P,ZERWAS J,et al.Resilientcontrol plane design for virtualized 6g core networks[J].IEEE Transactions on Network and Service Management,2022,19(3):2453-2467. [7]SARKAR S,VITTAL S.Locomotive 5g core for 6g ready resilient and highly available network slices and sfcs[C]//2022 18th International Conference on Network and Service Management(CNSM).IEEE,2022:367-373. [8]HE G,LIAO X,LIU C.A security survey of NFV:from causes to practices[C]//2023 3rd International Conference on Consu-mer Electronics and Computer Engineering(ICCECE).IEEE,2023:624-628. [9]MALEH Y,QASMAOUI Y,El GHOLAMI K,et al.A compre-hensive survey on SDN security:threats,mitigations,and future directions[J].Journal of Reliable Intelligent Environments,2023,9(2):201-239. [10]PATTARANTAKUL M,VORAKULPIPAT C,TAKAHASHI T.Service Function Chaining security survey:Addressing security challenges and threats[J].Computer Networks,2023,221:109484. [11]WANG M,CHENG B,WANG S,et al.Availability-and traffic-aware placement of parallelized SFC in data center networks[J].IEEE Transactions on Network and Service Management,2021,18(1):182-194. [12]QU L,ASSI C,SHABAN K,et al.A reliability-aware network service chain provisioning with delay guarantees in NFV-enabled enterprise datacenter networks[J].IEEE Transactions on Network and Service Management,2017,14(3):554-568. [13]ZHAO J H,MA J,LI Q W,et al.Service Function Chain Deployment Method Based on VNF Divided Backup Mechanisms[J].Computer Science,2025,52(7):287-294. [14]ALOMARI Z,ZHANI M F,ALOQAILY M,et al.On ensuring full yet cost-efficient survivability of service function chains in NFV environments[J].Journal of Network and Systems Management,2023,31(3):45. [15]PENG C,ZHENG D,PHILIP S,et al.Latency-bounded off-site virtual node protection in NFV[J].IEEE Transactions on Network and Service Management,2021,18(3):2545-2556. [16]TANG H B,QIU H,YOU W,et al.A Reliability-guaranteeMethod for Service Function Chain Deployment Based on Joint Backup[J].Journal of Electronics & Information Technology,2019,41(12):3006-3013. [17]HU Y,GUO Y.Survivable service function chain mapping inNFV-enabled 5G networks[C]//2021 IEEE 7th International Conference on Network Softwarization(NetSoft).IEEE,2021:375-380. [18]SOUALAH O,MECHTRI M,GHRIBI C,et al.A link failure recovery algorithm for virtual network function chaining[C]//2017 IFIP/IEEE Symposium on Integrated Network and Service Management(IM).IEEE,2017:213-221. [19]CAO H,JINDAL A,HU H,et al.Secure and intelligent service function chain for sustainable services in healthcare cyber physical systems[J].IEEE Transactions on Network Science and Engineering,2022,10(5):2674-2684. [20]ZHOU D Q,JI X S,YOU W,et al.DDQN-SFCAG:A service function chain recovery method against network attacks in 6G networks[J].Computer Networks,2024,254:110748. [21]HUANG Z,HUANG H.Proactive failure recovery for stateful NFV[C]//2020 IEEE 26th International Conference on Parallel and Distributed Systems(ICPADS).IEEE,2020:536-543. [22]ZHANG P,SHU S,ZHOU M C.Adaptive and dynamic adjustment of fault detection cycles in cloud computing[J].IEEE Transactions on Industrial Informatics,2019,17(1):20-30. [23]DONG S,XIA Y,PENG T.Network abnormal traffic detection model based on semi-supervised deep reinforcement learning[J].IEEE Transactions on Network and Service Management,2021,18(4):4197-4212. [24]DONG S,XIA Y,WANG T.Network abnormal traffic detection framework based on deep reinforcement learning[J].IEEE Wireless Communications,2024,31(3):9. [25]FEI X,LIU F,XU H,et al.Adaptive VNF scaling and flow routing with proactive demand prediction[C]//IEEE INFOCOM 2018-IEEE Conference on Computer Communications.IEEE,2018:486-494. [26]ERAMO V,MIUCCI E,AMMAR M,et al.An approach forservice function chain routing and virtual function network instance migration in network function virtualization architectures[J].IEEE/ACM Transactions on Networking,2017,25(4):2008-2025. [27]KIKUCHI H,TAKAHASHI K.Zipf distribution model forquantifying risk of re-identification from trajectory data[J].Journal of Information Processing,2016,24(5):816-823. |
| [1] | FAN Xinggang, JIANG Xinyang, GU Wenting, XU Juntao, YANG Youdong, LI Qiang. Effective Task Offloading Strategy Based on Heterogeneous Nodes [J]. Computer Science, 2025, 52(8): 354-362. |
| [2] | LIU Mengzhen, ZHOU Qinglei, HAN Lin, NIE Kai, LI Haoran, CHEN Mengyao, LIU Haohao. Research on Automatic Vectorization Benefit Evaluation Model Based on Particle SwarmAlgorithm [J]. Computer Science, 2025, 52(7): 248-254. |
| [3] | ZHAO Jihong, MA Jian, LI Qianwen, NING Lijuan. Service Function Chain Deployment Method Based on VNF Divided Backup Mechanisms [J]. Computer Science, 2025, 52(7): 287-294. |
| [4] | JIANG Jun, ZHAI Yanhe, ZENG Zhiheng, GU Yichao, HUANG Liangming. Loop-invariant Code Motion Algorithm Based on Loop Cost Analysis [J]. Computer Science, 2025, 52(6): 44-51. |
| [5] | ZHANG Mengxi, HAN Jianjun, XIAO Yan. Dynamic Conflict-Prediction Based Algorithm for Multi-agent Path Finding [J]. Computer Science, 2025, 52(4): 21-32. |
| [6] | CHEN Guangyuan, WANG Zhaohui, CHENG Ze. Multi-view Stereo Reconstruction with Context-guided Cost Volume and Depth Refinemen [J]. Computer Science, 2025, 52(3): 231-238. |
| [7] | XU Jia, ZHANG Yiming, CHEN Wenbin, YU Xinshi. Electric Taxi Charging Pile Rental Model and Cost Optimization [J]. Computer Science, 2025, 52(3): 366-376. |
| [8] | WAN Desheng, CHEN Hao, CHENG Wenhui, GAO Yunlong. Joint Scheduling Algorithm of Battery Charging Power and User Allocation for Time-varyingElectricity Prices [J]. Computer Science, 2025, 52(2): 242-252. |
| [9] | PENG Jiao, CHANG Yongjuan, YAN Tao, YOU Zhangzheng, SONG Meina, ZHU Yifan, ZHANG Pengfei, HE Yue, ZHANG Bo, OU Zhonghong. Decentralized Federated Learning Algorithm Sensitive to Delay [J]. Computer Science, 2025, 52(12): 314-320. |
| [10] | SU Xinzhong, XU Youyun. Lightweight Secure Authentication and Key Update Scheme for 5G Urban Transportation [J]. Computer Science, 2025, 52(12): 331-338. |
| [11] | HAN Lin, WU Ruofeng, LIU Haohao, NIE Kai, LI Haoran, CHEN Mengyao. Speculative Control Flow Vectorization Method for SIMD [J]. Computer Science, 2025, 52(11A): 241100012-7. |
| [12] | ZHU Ziyi, ZHANG Jianhui, ZENG Junjieand ZHANG Hongyuan. Security-aware Service Function Chain Deployment Method Based on Deep ReinforcementLearning [J]. Computer Science, 2025, 52(10): 404-411. |
| [13] | LIANG Jingyu, MA Bowen, HUANG Jiwei. Reliability-aware VNF Instance Placement in Edge Computing [J]. Computer Science, 2024, 51(6A): 230500064-6. |
| [14] | XU Yicheng, DAI Chaofan, MA Wubin, WU Yahui, ZHOU Haohao, LU Chenyang. Particle Swarm Optimization-based Federated Learning Method for Heterogeneous Data [J]. Computer Science, 2024, 51(6): 391-398. |
| [15] | WANG Zhen, NIE Kai, HAN Lin. Auto-vectorization Cost Model Based on Instruction MKS [J]. Computer Science, 2024, 51(4): 78-85. |
|
||