{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:33:33Z","timestamp":1756384413952,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031710780"},{"type":"electronic","value":"9783031710797"}],"license":[{"start":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:00:00Z","timestamp":1729641600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:00:00Z","timestamp":1729641600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-71079-7_9","type":"book-chapter","created":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:03:03Z","timestamp":1729620183000},"page":"104-121","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Countering Hybrid Threats: Towards an Ontology for Securing 5G Networks"],"prefix":"10.1007","author":[{"given":"R. Andrew","family":"Paskauskas","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,23]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"125","DOI":"10.12688\/openreseurope.15219.2","volume":"2","author":"RA Paskauskas","year":"2024","unstructured":"Paskauskas, R.A.: ENISA: 5G design and architecture of global mobile networks; threats, risks, vulnerabilities; cybersecurity considerations. Open Res. Europe 2, 125 (2024)","journal-title":"Open Res. Europe"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"43925","DOI":"10.1109\/ACCESS.2023.3268759","volume":"11","author":"Z Salazar","year":"2023","unstructured":"Salazar, Z., et al.: A network traffic mutation based ontology, and its application to 5G networks. IEEE Access 11, 43925\u201343944 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3268759","journal-title":"IEEE Access"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-030-69893-5_9","volume-title":"Mobile Edge Computing","author":"R Mahmud","year":"2021","unstructured":"Mahmud, R., et al.: Software-defined multi-domain tactical networks: Foundations and future directions. In: Mobile Edge Computing, pp. 183\u2013227. Springer, Cham (2021)"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/978-3-030-69893-5_21","volume-title":"Mobile Edge Computing","author":"M Jaseemuddin","year":"2021","unstructured":"Jaseemuddin, M., et al.: Application design and service provisioning for multi-access edge cloud (MEC). In: Mukherjee, A., et al. (eds.) Mobile Edge Computing, pp. 527\u2013563. Springer, Cham (2021)"},{"key":"9_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2023.101879","volume":"55","author":"AJC Trappey","year":"2023","unstructured":"Trappey, A.J.C., et al.: Digital transformation of technological IP portfolio analysis for complex domain of satellite communication innovations. Adv. Eng. Inform. 55, 101879 (2023)","journal-title":"Adv. Eng. Inform."},{"key":"9_CR6","unstructured":"Globa, L.S., et al.: Ontological Model for Data Processing Organization in Information and Communication Networks (2021). http:\/\/journal.iasa.kpi.ua\/article\/view\/236706. Accessed 19 February 2024"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Khyavi, M.H., Rahimi, M.: Conceptual model for security in next generation network. In: 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 591\u2013595. IEEE (2016)","DOI":"10.1109\/WAINA.2016.12"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Liu, L.: Discussion and practice of computer network information and network security protection strategy. In: 2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE), pp. 1810\u20131813. IEEE (2020)","DOI":"10.1109\/ICMCCE51767.2020.00397"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Sarkar, S. Ghosh, S.C. Mobility aware path selection for millimeterwave 5G networks in the presence of obstacles. In: International Conference on Computer and Communication Engineering, pp. 67\u201380. Springer, Cham (2023)","DOI":"10.1007\/978-3-031-35299-7_6"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Abalos, M.S., Fajardo, A.C.: Tropical cyclone analysis and accumulated precipitation predictive model using regression machine learning algorithm. In: International Conference on Computer and Communication Engineering, pp. 203\u2013219. Springer, Cham (2023)","DOI":"10.1007\/978-3-031-35299-7_17"},{"key":"9_CR11","unstructured":"Nikolouzou, E., Milenkovic, G., Bafoutsou, G., et al.: NFV Security in 5G: Challenges and Best Practices (2022). https:\/\/www.enisa.europa.eu\/publications\/nfv-security-in-5g-challenges-and-best-practices. Accessed 19 February 2024"},{"key":"9_CR12","unstructured":"3GPP 23.501 \u2013 System Architecture for the 5G System (5GS), Stage 2 (Release 18). https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3144. Accessed 19 February 2024"},{"key":"9_CR13","unstructured":"Louren\u00e7o, M.B., Marinos, L., Palseas, L.: ENISA Threat Landscape for 5G Networks: Updated Threat Assessment for the Fifth Generation of Mobile Telecommunications Networks (2020). https:\/\/iapp.org\/media\/pdf\/resource_center\/threat_landscape_5G_networks.pdf. Accessed 19 February 2024"},{"key":"9_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-43715-6","volume-title":"Massive MIMO Meets Small Cell: Backhaul and Cooperation","author":"HH Yang","year":"2017","unstructured":"Yang, H.H., Quek, T.Q.: Massive MIMO Meets Small Cell: Backhaul and Cooperation. Springer International Publishing, Cham (2017)"},{"key":"9_CR15","unstructured":"5G Action plan (2022). https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/5g-action-plan. Accessed 19 February 2024"},{"key":"9_CR16","unstructured":"Trans-European Transport Network (2024). https:\/\/en.wikipedia.org\/wiki\/Trans-European_Transport_Network. Accessed 19 February 2024"},{"key":"9_CR17","unstructured":"5G ROUTES. https:\/\/www.5g-routes.eu\/about\/concept-and-methodology\/; https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/cross-border-corridors. Accessed 19 February 2024"},{"key":"9_CR18","unstructured":"Hybrid Threats as a Concept. https:\/\/www.hybridcoe.fi\/hybrid-threats-as-a-phenomenon. Accessed 19 Febraury 2024"}],"container-title":["Communications in Computer and Information Science","Computer and Communication Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-71079-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:11:57Z","timestamp":1729620717000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-71079-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,23]]},"ISBN":["9783031710780","9783031710797"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-71079-7_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024,10,23]]},"assertion":[{"value":"23 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CCCE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer and Communication Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 May 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 May 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccce2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ccce.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}