{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:58:15Z","timestamp":1743148695969,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030996185"},{"type":"electronic","value":"9783030996192"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99619-2_36","type":"book-chapter","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T05:19:48Z","timestamp":1648617588000},"page":"380-387","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Real Time Self-developing Cybersecurity Function for 5G"],"prefix":"10.1007","author":[{"given":"Maksim","family":"Iavich","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Razvan","family":"Bocu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Avtandil","family":"Gagnidze","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,3,31]]},"reference":[{"key":"36_CR1","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1109\/Trustcom.2015.499","volume":"2015","author":"P Schneider","year":"2015","unstructured":"Schneider, P., Horn, G.: Towards 5G security. IEEE Trustcom\/BigDataSE\/ISPA 2015, 1165\u20131170 (2015). https:\/\/doi.org\/10.1109\/Trustcom.2015.499","journal-title":"IEEE Trustcom\/BigDataSE\/ISPA"},{"issue":"8","key":"36_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-017-9426-4","volume":"61","author":"X Ji","year":"2018","unstructured":"Ji, X., et al.: Overview of 5G security technology. Sci. China Inf. Sci. 61(8), 1\u201325 (2018). https:\/\/doi.org\/10.1007\/s11432-017-9426-4","journal-title":"Sci. China Inf. Sci."},{"key":"36_CR3","doi-asserted-by":"publisher","first-page":"24956","DOI":"10.1109\/ACCESS.2019.2899254","volume":"7","author":"RP Jover","year":"2019","unstructured":"Jover, R.P., Marojevic, V.: Security and protocol exploit analysis of the 5G specifications. IEEE Access 7, 24956\u201324963 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2899254","journal-title":"IEEE Access"},{"key":"36_CR4","doi-asserted-by":"publisher","unstructured":"Dutta, A., Hammad, E.: 5G Security challenges and opportunities: a system approach. In: 2020 IEEE 3rd 5G World Forum (5GWF), pp. 109\u2013114 (2020). https:\/\/doi.org\/10.1109\/5GWF49715.2020.9221122","DOI":"10.1109\/5GWF49715.2020.9221122"},{"key":"36_CR5","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-030-75078-7_44","volume-title":"Advanced Information Networking and Applications","author":"R Bocu","year":"2021","unstructured":"Bocu, R., Iavich, M., Tabirca, S.: A real-time intrusion detection system for software defined 5G networks. In: Barolli, L., Woungang, I., Enokido, T. (eds.) AINA 2021. LNNS, vol. 227, pp. 436\u2013446. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75078-7_44"},{"key":"36_CR6","doi-asserted-by":"publisher","unstructured":"Iwamura, M.: NGMN view on 5G architecture. In: 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), pp. 1\u20135 (2015). https:\/\/doi.org\/10.1109\/VTCSpring.2015.7145953","DOI":"10.1109\/VTCSpring.2015.7145953"},{"issue":"11","key":"36_CR7","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MCOM.2014.6957145","volume":"52","author":"PK Agyapong","year":"2014","unstructured":"Agyapong, P.K., Iwamura, M., Staehle, D., Kiess, W., Benjebbour, A.: Design considerations for a 5G network architecture. IEEE Commun. Mag. 52(11), 65\u201375 (2014). https:\/\/doi.org\/10.1109\/MCOM.2014.6957145","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"36_CR8","doi-asserted-by":"publisher","first-page":"3060","DOI":"10.1109\/COMST.2018.2843719","volume":"20","author":"I Ahmed","year":"2018","unstructured":"Ahmed, I., et al.: A survey on hybrid beamforming techniques in 5G: architecture and system model perspectives. IEEE Commun. Surv. Tutor. 20(4), 3060\u20133097 (2018). https:\/\/doi.org\/10.1109\/COMST.2018.2843719. Fourthquarter","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"5","key":"36_CR9","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MCOM.2017.1600951","volume":"55","author":"X Foukas","year":"2017","unstructured":"Foukas, X., Patounas, G., Elmokashfi, A., Marina, M.K.: Network slicing in 5G: survey and challenges. IEEE Commun. Mag. 55(5), 94\u2013100 (2017). https:\/\/doi.org\/10.1109\/MCOM.2017.1600951","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"36_CR10","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/MWC.2019.1800234","volume":"26","author":"S Zhang","year":"2019","unstructured":"Zhang, S.: An overview of network slicing for 5G. IEEE Wirel. Commun. 26(3), 111\u2013117 (2019). https:\/\/doi.org\/10.1109\/MWC.2019.1800234","journal-title":"IEEE Wirel. Commun."},{"key":"36_CR11","doi-asserted-by":"publisher","first-page":"85","DOI":"10.3390\/fi11040085","volume":"11","author":"J Yao","year":"2019","unstructured":"Yao, J., Han, Z., Sohail, M., Wang, L.: A robust security architecture for SDN-based 5G networks. Future Internet 11, 85 (2019). https:\/\/doi.org\/10.3390\/fi11040085","journal-title":"Future Internet"},{"key":"36_CR12","doi-asserted-by":"publisher","first-page":"103860","DOI":"10.1109\/ACCESS.2020.2999455","volume":"8","author":"Y Yang","year":"2020","unstructured":"Yang, Y., Wei, X., Xu, R., Peng, L., Zhang, L., Ge, L.: Man-in-the-middle attack detection and localization based on cross-layer location consistency. IEEE Access 8, 103860\u2013103874 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2999455","journal-title":"IEEE Access"},{"key":"36_CR13","doi-asserted-by":"publisher","unstructured":"Kang, J.J., Fahd, K., Venkatraman, S., Trujillo-Rasua, R., Haskell-Dowland, P.: Hybrid routing for man-in-the-middle (MITM) attack detection in IoT networks. In: 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/ITNAC46935.2019.9077977","DOI":"10.1109\/ITNAC46935.2019.9077977"},{"key":"36_CR14","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1007\/978-3-030-75075-6_47","volume-title":"Advanced Information Networking and Applications","author":"M Iavich","year":"2021","unstructured":"Iavich, M., Gnatyuk, S., Odarchenko, R., Bocu, R., Simonov, S.: The novel system of attacks detection in 5G. In: Barolli, L., Woungang, I., Enokido, T. (eds.) AINA 2021. LNNS, vol. 226, pp. 580\u2013591. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75075-6_47"},{"key":"36_CR15","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-030-87675-3_14","volume-title":"Systems, Decision and Control in Energy III","author":"M Iavich","year":"2022","unstructured":"Iavich, M., Akhalaia, G., Gnatyuk, S.: Method of improving the security of 5G network architecture concept for energy and other sectors of the critical infrastructure. In: Zaporozhets, A. (ed.) Systems, Decision and Control in Energy III, pp. 237\u2013246. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-87675-3_14"},{"key":"36_CR16","doi-asserted-by":"publisher","unstructured":"Rezvy, S., Luo, Y., Petridis, M., Lasebae, A., Zebin, T.: An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. In: 2019 53rd Annual Conference on Information Sciences and Systems (CISS), pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/CISS.2019.8693059","DOI":"10.1109\/CISS.2019.8693059"},{"key":"36_CR17","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-030-79766-9_5","volume-title":"Secure Communication for 5G and IoT Networks","author":"TR Kumudavalli","year":"2022","unstructured":"Kumudavalli, T.R., Sandeep, S.C.: Machine learning IDS models for 5G and IoT. In: Velliangiri, S., Gunasekaran, M., Karthikeyan, P. (eds.) Secure Communication for 5G and IoT Networks, pp. 73\u201384. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-79766-9_5"},{"issue":"11","key":"36_CR18","doi-asserted-by":"publisher","first-page":"3129","DOI":"10.1007\/s13042-020-01253-w","volume":"12","author":"N Hu","year":"2021","unstructured":"Hu, N., Tian, Z., Lu, H., Du, X., Guizani, M.: A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks. Int. J. Mach. Learn. Cybern. 12(11), 3129\u20133144 (2021). https:\/\/doi.org\/10.1007\/s13042-020-01253-w","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"36_CR19","doi-asserted-by":"publisher","unstructured":"Ghosh, P., Mitra, R.: Proposed GA-BFSS and logistic regression-based intrusion detection system. In: Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT), pp. 1\u20136 (2015). https:\/\/doi.org\/10.1109\/C3IT.2015.7060117","DOI":"10.1109\/C3IT.2015.7060117"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99619-2_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T06:13:26Z","timestamp":1648620806000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99619-2_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030996185","9783030996192"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99619-2_36","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}