{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:00:31Z","timestamp":1743084031651,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819944293"},{"type":"electronic","value":"9789819944309"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-4430-9_2","type":"book-chapter","created":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T18:04:44Z","timestamp":1689789884000},"page":"18-32","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Systematic Approach to\u00a0Security Management in\u00a0the\u00a0MonB5G Architecture"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2954-3418","authenticated-orcid":false,"given":"S\u0142awomir","family":"Kukli\u0144ski","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3804-8133","authenticated-orcid":false,"given":"Jacek","family":"Wytr\u0119bowicz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,20]]},"reference":[{"key":"2_CR1","unstructured":"3GPP: 5G; Management and orchestration; Generic management services, 16.4.0, 3GPP TS 28.532. Technical Report, ETSI, Sophia Antipolis, August 2020"},{"key":"2_CR2","unstructured":"3GPP: 5G; Management and orchestration; Provisioning, version 16.6.0, 3GPP TS 28.531. Technical Report, ETSI, Sophia Antipolis, August 2020"},{"key":"2_CR3","unstructured":"3GPP: Management of network slicing in mobile networks; Concepts, use cases and requirements, 3GPP TS 28.530, v17.1.0. Technical Report, 3GPP, April 2021"},{"issue":"3","key":"2_CR4","doi-asserted-by":"publisher","first-page":"2429","DOI":"10.1109\/COMST.2018.2815638","volume":"20","author":"I Afolabi","year":"2018","unstructured":"Afolabi, I., Taleb, T., Samdanis, K., Ksentini, A., Flinck, H.: Network slicing and softwarization: a survey on principles, enabling technologies, and solutions. IEEE Commun. Surv. Tutorials 20(3), 2429\u20132453 (2018). https:\/\/doi.org\/10.1109\/COMST.2018.2815638","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Barakabitze, A.A., Ahmad, A., Mijumbi, R., Hines, A.: 5G network slicing using SDN and NFV: a survey of taxonomy, architectures and future challenges. Comput. Netw. 167, 106984 (2020). https:\/\/doi.org\/10.1016\/j.comnet.2019.106984","DOI":"10.1016\/j.comnet.2019.106984"},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Chafika, B., Taleb, T., Phan, C.T., Tselios, C., Tsolis, G.: Distributed AI-based security for massive numbers of network slices in 5G & beyond mobile systems. In: 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit), pp. 401\u2013406. IEEE, June 2021. https:\/\/doi.org\/10.1109\/EuCNC\/6GSummit51104.2021.9482418","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482418"},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Cunha, V.A., et al.: Network slicing security: challenges and directions. Internet Technol. Lett. 2(5), e125 (2019). https:\/\/doi.org\/10.1002\/itl2.125","DOI":"10.1002\/itl2.125"},{"key":"2_CR8","unstructured":"ETSI GR NFV-SEC 001: Network Functions Virtualisation (NFV); NFV Security; Problem Statement, V1.1.1. Technical Report, ETSI, October 2016"},{"key":"2_CR9","unstructured":"ETSI GR NFV-SEC 003: network functions virtualisation (NFV); NFV security; security and trust guidance, v1.2.1. Technical Report, ETSI, August 2016"},{"key":"2_CR10","unstructured":"ETSI GR NFV-SEC 014: network functions virtualisation (NFV); NFV security; security specification for mano components and reference points, v3.1.1. Technical Report, ETSI, April 2018"},{"key":"2_CR11","unstructured":"ETSI GS NFV-EVE 012: network functions virtualization (NFV); evolution and ecosystem; report on network slicing support with ETSI NFV architecture framework, V3.1.1. Technical Report, ETSI, December 2017"},{"key":"2_CR12","unstructured":"ETSI GS NFV-MAN 001: network functions virtualisation (NFV); management and orchestration, V1.1.1. Technical Report, ETSI, December 2014"},{"issue":"5","key":"2_CR13","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MCOM.2017.1600951","volume":"55","author":"X Foukas","year":"2017","unstructured":"Foukas, X., Patounas, G., Elmokashfi, A., Marina, M.K.: Network slicing in 5G: survey and challenges. IEEE Commun. Mag. 55(5), 94\u2013100 (2017). https:\/\/doi.org\/10.1109\/MCOM.2017.1600951","journal-title":"IEEE Commun. Mag."},{"key":"2_CR14","doi-asserted-by":"publisher","unstructured":"Gonzalez, A.J., et al.: The isolation concept in the 5G network slicing. In: 2020 European Conference on Networks and Communications (EuCNC), pp. 12\u201316. IEEE, June 2020. https:\/\/doi.org\/10.1109\/EuCNC48522.2020.9200939","DOI":"10.1109\/EuCNC48522.2020.9200939"},{"issue":"1","key":"2_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-018-0072-0","volume":"2018","author":"Z Kotulski","year":"2018","unstructured":"Kotulski, Z., et al.: Towards constructive approach to end-to-end slice isolation in 5G networks. EURASIP J. Inf. Secur. 2018(1), 1\u201323 (2018). https:\/\/doi.org\/10.1186\/s13635-018-0072-0","journal-title":"EURASIP J. Inf. Secur."},{"key":"2_CR16","unstructured":"Kuklinski, S.: Deliverable D2.4 final release of the MonB5G architecture (including security) (2021). https:\/\/www.monb5g.eu\/wp-content\/uploads\/2021\/11\/D2.4_MonB5G-Architecture.pdf"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Kuklinski, S.: In-slice management decomposition and implementation issues. In: IEEE 5th Future Networks World Forum (FNWF 2022), Montreal. IEEE (2022). https:\/\/ieeexplore.ieee.org\/xpl\/conhome\/1826784\/all-proceedings","DOI":"10.1109\/FNWF55208.2022.00073"},{"key":"2_CR18","doi-asserted-by":"publisher","unstructured":"Kuklinski, S., et al.: MonB5G: AI\/ML-capable distributed orchestration and management framework for network slices. In: IEEE (ed.) 2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), pp. 29\u201334. IEEE, Athens, September 2021. https:\/\/doi.org\/10.1109\/MeditCom49071.2021.9647681","DOI":"10.1109\/MeditCom49071.2021.9647681"},{"key":"2_CR19","doi-asserted-by":"publisher","unstructured":"Kuklinski, S., Tomaszewski, L.: DASMO: a scalable approach to network slices management and orchestration. In: NOMS 2018\u20132018 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20136. IEEE, April 2018. https:\/\/doi.org\/10.1109\/NOMS.2018.8406279","DOI":"10.1109\/NOMS.2018.8406279"},{"key":"2_CR20","doi-asserted-by":"publisher","unstructured":"Kuklinski, S., et al.: A reference architecture for network slicing. In: 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), pp. 217\u2013221. IEEE, June 2018. https:\/\/doi.org\/10.1109\/NETSOFT.2018.8460057","DOI":"10.1109\/NETSOFT.2018.8460057"},{"key":"2_CR21","doi-asserted-by":"publisher","unstructured":"Marinos, L., Patseas, L., Barros Louren\u00e7o, M. (eds.): ENISA: threat landscape for 5G networks. In: European Agency for Cybersecurity (2020). https:\/\/doi.org\/10.2824\/802229","DOI":"10.2824\/802229"},{"key":"2_CR22","doi-asserted-by":"publisher","first-page":"99999","DOI":"10.1109\/ACCESS.2020.2997702","volume":"8","author":"RF Olimid","year":"2020","unstructured":"Olimid, R.F., Nencioni, G.: 5G network slicing: a security overview. IEEE Access 8, 99999\u2013100009 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2997702","journal-title":"IEEE Access"},{"key":"2_CR23","doi-asserted-by":"publisher","unstructured":"Phan, C.T., Rahali, M., Morin, C.: Threat detection and mitigation with MonB5G components in the aLTEr scenario. In: 2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), pp. 1\u20132. IEEE, September 2021. https:\/\/doi.org\/10.1109\/MeditCom49071.2021.9647575","DOI":"10.1109\/MeditCom49071.2021.9647575"},{"issue":"3","key":"2_CR24","doi-asserted-by":"publisher","first-page":"1909","DOI":"10.1109\/COMST.2020.2982955","volume":"22","author":"S Sengupta","year":"2020","unstructured":"Sengupta, S., Chowdhary, A., Sabur, A., Alshamrani, A., Huang, D., Kambhampati, S.: A survey of moving target defenses for network security. IEEE Commun. Surv. Tutorials 22(3), 1909\u20131941 (2020). https:\/\/doi.org\/10.1109\/COMST.2020.2982955","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"2_CR25","doi-asserted-by":"publisher","first-page":"222","DOI":"10.3390\/electronics11020222","volume":"11","author":"T Wichary","year":"2022","unstructured":"Wichary, T., Mongay Batalla, J., Mavromoustakis, C.X., \u017burek, J., Mastorakis, G.: Network slicing security controls and assurance for verticals. Electronics 11(2), 222 (2022). https:\/\/doi.org\/10.3390\/electronics11020222","journal-title":"Electronics"}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-4430-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T18:10:17Z","timestamp":1689790217000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-4430-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819944293","9789819944309"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-4430-9_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"20 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisecsymposium2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isyou.info\/conf\/mobisec22\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}