The role of security orchestrator in network slicing for future networks.
Shalitha WijethilakaMadhusanka LiyanagePublished in: J. Commun. Networks (2023)
Keyphrases
- network structure
- enterprise network
- network topologies
- complex networks
- computer networks
- network model
- network size
- network parameters
- network management
- network design
- sparsely connected
- heterogeneous networks
- community structure
- telecommunication networks
- real world networks
- network resources
- network security
- transport network
- future internet
- security issues
- cellular networks
- scale free
- high bandwidth
- network traffic
- recurrent networks
- counter propagation
- security threats
- dynamic networks
- cohesive subgroups
- internet service providers
- small world
- information security
- communication networks
- information networks
- network services
- connectionist networks
- criminal networks
- security measures
- link prediction
- social networks
- network externalities
- virtual private network
- ns simulator
- peer to peer
- security policies
- internet protocol
- information diffusion
- optical networks
- access control
- mobile networks
- tcp ip
- role based access control
- access points