On Credibility-Based Service Function Chain Deployment

Article Properties
Cite
Fan, Weiqi, et al. “On Credibility-Based Service Function Chain Deployment”. IEEE Open Journal of the Computer Society, vol. 2, 2021, pp. 152-63, https://doi.org/10.1109/ojcs.2021.3064887.
Fan, W., Cui, Q., Li, X., Huang, X., & Tao, X. (2021). On Credibility-Based Service Function Chain Deployment. IEEE Open Journal of the Computer Society, 2, 152-163. https://doi.org/10.1109/ojcs.2021.3064887
Fan W, Cui Q, Li X, Huang X, Tao X. On Credibility-Based Service Function Chain Deployment. IEEE Open Journal of the Computer Society. 2021;2:152-63.
Journal Categories
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Science
Science (General)
Cybernetics
Information theory
Technology
Electrical engineering
Electronics
Nuclear engineering
Electric apparatus and materials
Electric circuits
Electric networks
Technology
Electrical engineering
Electronics
Nuclear engineering
Electronics
Computer engineering
Computer hardware
Technology
Technology (General)
Industrial engineering
Management engineering
Information technology
Refrences
Title Journal Journal Categories Citations Publication Date
Information theoretic framework of trust modeling and evaluation for ad hoc networks IEEE Journal on Selected Areas in Communications
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Technology (General): Industrial engineering. Management engineering: Information technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
2006
Network functions virtualisation (nfv); reliability; report on models and features for end-to-end reliability 2016
Cloud computing information assurance framework 2009
Policy based virtualised security architecture for SDN/NFV enabled 5�G access networks 0
An attack graph based network security evaluation model for hierarchical network 0