Providing customized security based on network function composition and reconfiguration | IEEE Journals & Magazine | IEEE Xplore