{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T04:57:02Z","timestamp":1769921822439,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T00:00:00Z","timestamp":1740441600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T00:00:00Z","timestamp":1740441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"The Air Force Research Laboratory, Rome  through the Information Directorate\u2019s Information Institute\u00ae","award":["FA8750-23-C-0517 and"],"award-info":[{"award-number":["FA8750-23-C-0517 and"]}]},{"name":"The Air Force Research Laboratory, Rome  through the Information Directorate\u2019s Information Institute\u00ae","award":["SA10032024050805"],"award-info":[{"award-number":["SA10032024050805"]}]},{"name":"The Korea Institute for Advancement of Technology (KIAT) Grant funded by the Ministry of Trade, Industry and Energy","award":["P0019809"],"award-info":[{"award-number":["P0019809"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10586-024-04955-w","type":"journal-article","created":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T11:22:04Z","timestamp":1740482524000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Dynamic network slicing orchestration in open 5G networks using multi-criteria decision making and secure federated learning techniques"],"prefix":"10.1007","volume":"28","author":[{"given":"Hisham A.","family":"Kholidy","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,25]]},"reference":[{"issue":"2","key":"4955_CR1","doi-asserted-by":"publisher","first-page":"1876","DOI":"10.1109\/TNSM.2022.3157248","volume":"19","author":"SY Bello","year":"2022","unstructured":"Bello, S.Y., Hussein, A.R., Ulema, M., Koilpillai, J.: On sustained zero trust conceptualization security for mobile core networks in 5G and beyond. IEEE Trans. Netw. Serv. Manag. 19(2), 1876\u20131889 (2022)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"4955_CR2","unstructured":"Department of Homeland Security Science and Technology Directorate (S&T): Fifth Generation (5G) Mobile Broadband Impacts and Recommendations for Public Safety. Department of Homeland Security Science and Technology Directorate (S&T) (May 2021)"},{"key":"4955_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-020-09571-8","volume":"29","author":"B Valera-Muros","year":"2021","unstructured":"Valera-Muros, B., Panizo, L., Rios, A., et al.: An architecture for creating slices to experiment on wireless networks. J. Netw. Syst. Manag. 29, 1 (2021)","journal-title":"J. Netw. Syst. Manag."},{"key":"4955_CR4","doi-asserted-by":"publisher","unstructured":"Valsamas, P., Papadimitriou, P., Sakellariou, I., et al.: Multi-PoP network slice deployment: a feasibility study. In: 2019 IEEE 8th International Conference on Cloud Networking (CloudNet), 2019, pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/CloudNet47604.2019.9064124","DOI":"10.1109\/CloudNet47604.2019.9064124"},{"key":"4955_CR5","doi-asserted-by":"publisher","unstructured":"Kholidy, H.A., Hariri, S.: Toward an experimental federated 6G testbed: a federated leaning approach. In: 2022 IEEE\/ACS International Conference on Computer Systems and Applications (AICCSA), Abu Dhabi, UAE, 2022, pp. 1\u20136 (2022). https:\/\/doi.org\/10.1109\/AICCSA56895.2022.10017506","DOI":"10.1109\/AICCSA56895.2022.10017506"},{"issue":"17","key":"4955_CR6","doi-asserted-by":"publisher","first-page":"13051","DOI":"10.1016\/j.eswa.2012.05.056","volume":"39","author":"M Behzadian","year":"2012","unstructured":"Behzadian, M., Khanmohammadi, S., Yazdani, M., Ignatius, J.: A state-of the-art survey of TOPSIS applications. Expert Syst. Appl. 39(17), 13051\u201313069 (2012). https:\/\/doi.org\/10.1016\/j.eswa.2012.05.056","journal-title":"Expert Syst. Appl."},{"key":"4955_CR7","doi-asserted-by":"publisher","unstructured":"Chakraborty, A., Maity, S., Alam, S.: Hexagonal fuzzy number and its distinctive representation, ranking, defuzzification technique and application in production inventory management problem (2020). https:\/\/doi.org\/10.1007\/s41066-020-00212-8,","DOI":"10.1007\/s41066-020-00212-8"},{"key":"4955_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947454","author":"X Li","year":"2019","unstructured":"Li, X., Guo, C., Gupta, L., Jain, R.: Efficient and secure 5G core network slice provisioning based on VIKOR approach. IEEE Access (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2947454","journal-title":"IEEE Access"},{"issue":"4","key":"4955_CR9","doi-asserted-by":"publisher","first-page":"2146","DOI":"10.1109\/TWC.2017.2789294","volume":"17","author":"YL Lee","year":"2018","unstructured":"Lee, Y.L., Loo, J., Chuah, T.C., Wang, L.-C.: Dynamic network slicing for multitenant heterogeneous cloud radio access networks. IEEE Trans. Wirel. Commun. 17(4), 2146\u20132161 (2018)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"1","key":"4955_CR10","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/JIOT.2017.2769446","volume":"5","author":"C Delgado","year":"2018","unstructured":"Delgado, C., Canales, M., Ort\u00edn, J., G\u00e1llego, J.R., Redondi, A., Bousnina, S., Cesana, M.: Joint application admission control and network slicing in virtual sensor networks. IEEE Internet Things J. 5(1), 28\u201343 (2018)","journal-title":"IEEE Internet Things J."},{"key":"4955_CR11","doi-asserted-by":"crossref","unstructured":"Hoang, D.T., Niyato, D., Wang, P., De Domenico, A., Strinati, E.C.: Optimal cross slice orchestration for 5G mobile services. In: Proceedings of the IEEE 88th Vehicular Technology Conference (VTC-Fall), August 2018, pp. 1\u20135 (2008)","DOI":"10.1109\/VTCFall.2018.8690608"},{"key":"4955_CR12","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MVT.2018.2809473","volume":"13","author":"Q Ye","year":"2018","unstructured":"Ye, Q., Li, J., Qu, K., Zhuang, W., Shen, X.S., Li, X.: End-to-end quality of service in 5G networks: examining the effectiveness of a network slicing framework. IEEE Trans. Veh. Technol. 13, 65\u201374 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"4955_CR13","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1109\/JSAC.2019.2959186","volume":"38","author":"H Chergui","year":"2020","unstructured":"Chergui, H., Verikoukis, C.: Offline SLA-constrained deep learning for 5G networks reliable and dynamic end-to-end slicing. IEEE J. Sel. Areas Commun. 38(2), 350\u2013360 (2020). https:\/\/doi.org\/10.1109\/JSAC.2019.2959186","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"7","key":"4955_CR14","doi-asserted-by":"publisher","first-page":"215","DOI":"10.14445\/22315381\/IJETT-V69I7P229","volume":"69","author":"A Ramadhan","year":"2021","unstructured":"Ramadhan, A.: T-S3RA: traffic-aware scheduling for secure slicing and resource allocation in SDN\/NFV enabled 5G networks. Int. J. Eng. Trends Technol. 69(7), 215\u2013232 (2021)","journal-title":"Int. J. Eng. Trends Technol."},{"key":"4955_CR15","unstructured":"OSM project. https:\/\/osm.etsi.org\/"},{"key":"4955_CR16","unstructured":"FlexRAN (Mosaic5G). https:\/\/mosaic5g.io\/flexran\/"},{"key":"4955_CR17","doi-asserted-by":"crossref","unstructured":"Tupper, M., Zincir-Heywood, A.: VEA-bility security metric: a network security analysis tool. In: Proceedings of the IEEE Third International Conference on Availability, Reliability and Security, 2008 (2008)","DOI":"10.1109\/ARES.2008.138"},{"key":"4955_CR18","unstructured":"https:\/\/www.first.org\/cvss\/specification-document"},{"key":"4955_CR19","doi-asserted-by":"crossref","unstructured":"Kholidy, H.A., Karam, A., Sidoran, J.L., Rahman, M.A.: 5G core security in edge networks: a vulnerability assessment approach. In: 2021 IEEE Symposium on Computers and Communications (ISCC), 2021, pp. 1\u20136 (2021)","DOI":"10.1109\/ISCC53001.2021.9631531"},{"key":"4955_CR20","doi-asserted-by":"publisher","first-page":"9","DOI":"10.3390\/s22010009","volume":"22","author":"HA Kholidy","year":"2022","unstructured":"Kholidy, H.A.: Multi-layer attack graph analysis in the 5G Edge network using a dynamic hexagonal fuzzy method. Sensors 22, 9 (2022). https:\/\/doi.org\/10.3390\/s22010009","journal-title":"Sensors"},{"key":"4955_CR21","doi-asserted-by":"crossref","unstructured":"Kholidy, H.A., et al.: Toward zero trust security in 5G open architecture network slices. In: 2022 IEEE Military Communications Conference (MILCOM), Rockville, MD, USA, 2022, pp. 577\u2013582 (2022)","DOI":"10.1109\/MILCOM55135.2022.10017474"},{"key":"4955_CR22","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1109\/OJVT.2022.3172709","volume":"3","author":"J Meijers","year":"2022","unstructured":"Meijers, J., et al.: Blockchain for V2X: applications and architectures. IEEE Open J. Veh. Technol. 3, 193\u2013209 (2022). https:\/\/doi.org\/10.1109\/OJVT.2022.3172709","journal-title":"IEEE Open J. Veh. Technol."},{"key":"4955_CR23","unstructured":"https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-2.5\/blockchain.html"},{"key":"4955_CR24","unstructured":"https:\/\/medium.com\/@diletta.chiaro\/aggregation-techniques-in-federated-learning-a-brief-overview-90a8c168c560"},{"key":"4955_CR25","doi-asserted-by":"crossref","unstructured":"Truex, S., Baracaldo, N., Anwar, A., Steinke, T., Ludwig, H., Zhang, R., Zhou, Y.: A hybrid approach to privacy-preserving federated learning. In: ACM AISec\u201919, 2019, pp. 1\u201311 (2019)","DOI":"10.1145\/3338501.3357370"},{"key":"4955_CR26","doi-asserted-by":"crossref","unstructured":"Xu, R., Baracaldo, N., Zhou, Y., Anwar, A., Ludwig, H.: HybridAlpha: an efficient approach for privacy-preserving federated learning. In: ACM AISec\u201919, 2019, pp. 13\u201323 (2019)","DOI":"10.1145\/3338501.3357371"},{"key":"4955_CR27","doi-asserted-by":"publisher","unstructured":"Xu, R., Baracaldo, N., Zhou, Y., Anwar, A., Kadhe, S., Ludwig, H.: DeTrust-FL: privacy-preserving federated learning in decentralized trust setting. In: 2022 IEEE 15th International Conference on Cloud Computing (CLOUD), Barcelona, Spain, 2022, pp. 417\u2013426 (2022). https:\/\/doi.org\/10.1109\/CLOUD55607.2022.00065","DOI":"10.1109\/CLOUD55607.2022.00065"},{"key":"4955_CR28","doi-asserted-by":"crossref","unstructured":"Kholidy, H., Kamaludeen, R.: An innovative hashgraph-based federated learning approach for multi domain 5G network protection. In: IEEE Future Networks (5G World Forum), Montreal, Canada, October 2022 (2022)","DOI":"10.1109\/FNWF55208.2022.00033"},{"key":"4955_CR29","first-page":"15","volume":"2019","author":"HA Kholidy","year":"2019","unstructured":"Kholidy, H.A., Erradi, A.: VHDRA: a vertical and horizontal dataset reduction approach for cyber\u2013physical power-aware intrusion detection systems. Secur. Commun. Netw. J. 2019, 15 (2019)","journal-title":"Secur. Commun. Netw. J."},{"key":"4955_CR30","unstructured":"Kholidy, H.A., Erradi, A., Abdelwahed, S., Baiardi, F.: A hierarchical, autonomous, and forecasting cloud IDS. In: 2013 5th International Conference on Modelling, Identification and Control (ICMIC), Cairo, Egypt, 2013, pp. 213\u2013220 (2013)"},{"key":"4955_CR31","doi-asserted-by":"crossref","unstructured":"Kholidy, H.A., Erradi, A., Abdelwahed, S.: Online risk assessment and prediction models for autonomic cloud intrusion prevention systems. In: The ACS\/rEEE International Conference on Computer Systems and Applications (AICCSA), Doha, Qatar, November 2014 (2014)","DOI":"10.1109\/AICCSA.2014.7073270"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04955-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04955-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04955-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T06:33:43Z","timestamp":1757140423000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04955-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,25]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["4955"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04955-w","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,25]]},"assertion":[{"value":"16 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"237"}}