{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T08:27:17Z","timestamp":1768379237175,"version":"3.49.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032141378","type":"print"},{"value":"9783032141385","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-14138-5_10","type":"book-chapter","created":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T03:30:28Z","timestamp":1768361428000},"page":"91-100","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploring Time Series xAI Techniques for\u00a05G\/6G Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9872-7117","authenticated-orcid":false,"given":"F\u00e1bio","family":"Silva","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2457-1567","authenticated-orcid":false,"given":"Jos\u00e9","family":"Ribeiro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7796-644X","authenticated-orcid":false,"given":"Cesar","family":"Analide","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2139-5414","authenticated-orcid":false,"given":"Ricardo","family":"Santos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,15]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"52138","DOI":"10.1109\/ACCESS.2018.2870052","volume":"6","author":"A Adadi","year":"2018","unstructured":"Adadi, A., Berrada, M.: Peeking inside the black-box: a survey on explainable artificial intelligence (XAI). IEEE Access 6, 52138\u201352160 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2870052","journal-title":"IEEE Access"},{"key":"10_CR2","doi-asserted-by":"publisher","unstructured":"Argyriou, L., Karamatskou, A.: Privateer deliverable d3.1: decentralised robust security analytics enablers - rel.a. (2024). https:\/\/doi.org\/10.5281\/zenodo.12530825","DOI":"10.5281\/zenodo.12530825"},{"key":"10_CR3","doi-asserted-by":"publisher","unstructured":"Cho, K., Merrienboer, B., Gulcehre, C., Bougares, F., Schwenk, H., Bengio, Y.: Learning phrase representations using RNN encoder-decoder for statistical machine translation (2014). https:\/\/doi.org\/10.3115\/v1\/D14-1179","DOI":"10.3115\/v1\/D14-1179"},{"key":"10_CR4","unstructured":"Doshi-Velez, F., Kim, B.: Towards a rigorous science of interpretable machine learning. arXiv, Machine Learning (2017)"},{"key":"10_CR5","doi-asserted-by":"publisher","unstructured":"Greff, K., Srivastava, R.K., Koutnik, J., Steunebrink, B.R., Schmidhuber, J.: LSTM: a search space odyssey. IEEE Trans. Neural Networks Learn. Syst. 28, 2222\u20132232 (2017). https:\/\/doi.org\/10.1109\/TNNLS.2016.2582924","DOI":"10.1109\/TNNLS.2016.2582924"},{"key":"10_CR6","doi-asserted-by":"publisher","unstructured":"Guidotti, R., Monreale, A., Ruggieri, S., Turini, F., Giannotti, F., Pedreschi, D.: A survey of methods for explaining black box models. ACM Comput. Surv. 51 (9 2018). https:\/\/doi.org\/10.1145\/3236009","DOI":"10.1145\/3236009"},{"key":"10_CR7","doi-asserted-by":"publisher","unstructured":"Heaton, J.: Ian goodfellow, yoshua bengio, and aaron courville: deep learning. Genet. Program. Evolvable Mach. 19, 305\u2013307 (2017). https:\/\/doi.org\/10.1007\/S10710-017-9314-Z","DOI":"10.1007\/S10710-017-9314-Z"},{"key":"10_CR8","doi-asserted-by":"publisher","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9, 1735\u20131780 (1997). https:\/\/doi.org\/10.1162\/NECO.1997.9.8.1735","DOI":"10.1162\/NECO.1997.9.8.1735"},{"key":"10_CR9","doi-asserted-by":"publisher","unstructured":"Liyanage, M., et al.: Advancing security for 6G smart networks and services 1169\u20131174 (2024). https:\/\/doi.org\/10.1109\/EuCNC\/6GSummit60053.2024.10597131","DOI":"10.1109\/EuCNC\/6GSummit60053.2024.10597131"},{"key":"10_CR10","unstructured":"Lundberg, S.M., Lee, S.I.: A unified approach to interpreting model predictions. In: Proceedings of the 31st International Conference on Neural Information Processing Systems, pp. 4768\u20134777, NIPS 2017. Curran Associates Inc., Red Hook, NY, USA (2017)"},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"Masouros, D., et al.: Towards privacy-first security enablers for 6G networks: the privateer approach, pp. 379\u2013391 (2023). https:\/\/doi.org\/10.1007\/978-3-031-46077-7_25","DOI":"10.1007\/978-3-031-46077-7_25"},{"key":"10_CR12","unstructured":"Molnar, C.: Interpretable Machine Learning. Leanpub (2020)"},{"key":"10_CR13","unstructured":"Olah, C.: Understanding LSTM networks (2015). https:\/\/research.google\/pubs\/understanding-lstm-networks\/"},{"key":"10_CR14","doi-asserted-by":"publisher","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: \u201cwhy should i trust you?\u201d explaining the predictions of any classifier. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining ,13\u201317-August-2016, pp. 1135\u20131144 (2016). https:\/\/doi.org\/10.1145\/2939672.2939778","DOI":"10.1145\/2939672.2939778"},{"key":"10_CR15","unstructured":"Samek, W., Wiegand, T., M\u00fcller, K.R.: Explainable artificial intelligence: understanding, visualizing and interpreting deep learning models. arXiv:1708.08296 (2017)"},{"key":"10_CR16","doi-asserted-by":"publisher","unstructured":"Hellas, S.: NCSRD-DS-5GDDoS: 5G radio and core metrics containing sporadic DDoS attacks. Nat. Centre Sci. Res., Dataset. (2024) https:\/\/doi.org\/10.5281\/ZENODO.10671494, https:\/\/zenodo.org\/records\/10671494","DOI":"10.5281\/ZENODO.10671494"},{"key":"10_CR17","unstructured":"Sundararajan, M., Taly, A., Yan, Q.: Axiomatic attribution for deep networks. In: Proceedings of the 34th International Conference on Machine Learning - Volume 70, pp. 3319\u20133328, ICML 2017. JMLR.org (2017)"}],"container-title":["Lecture Notes in Networks and Systems","Ambient Intelligence \u2013 Software and Applications \u2013 16th International Symposium on Ambient Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-14138-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T03:30:35Z","timestamp":1768361435000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-14138-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032141378","9783032141385"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-14138-5_10","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"15 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISAmI2025","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Ambient Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lille","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isaml2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.isami-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}