{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T11:52:46Z","timestamp":1775044366601,"version":"3.50.1"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"METEOR Network Company and the Computer Laboratory of Paris 6"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3546338","type":"journal-article","created":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T18:52:24Z","timestamp":1740682344000},"page":"40950-40976","source":"Crossref","is-referenced-by-count":24,"title":["Intrusion Detection in 5G and Wi-Fi Networks: A Survey of Current Methods, Challenges, and Perspectives"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3611-7174","authenticated-orcid":false,"given":"Cherifa","family":"Hamroun","sequence":"first","affiliation":[{"name":"Computer Laboratory of Paris 6 (LIP6), Sorbonne University, Paris, France"}]},{"given":"Anne","family":"Fladenmuller","sequence":"additional","affiliation":[{"name":"Computer Laboratory of Paris 6 (LIP6), Sorbonne University, Paris, France"}]},{"given":"Michel","family":"Pariente","sequence":"additional","affiliation":[{"name":"METEOR Network, Rungis, France"}]},{"given":"Guy","family":"Pujolle","sequence":"additional","affiliation":[{"name":"Computer Laboratory of Paris 6 (LIP6), Sorbonne University, Paris, France"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4528119"},{"key":"ref2","volume-title":"Private 5G and Wi-Fi Convergence\u2014Key Use Cases and Requirements","author":"Group","year":"2023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3412841.3441986"},{"key":"ref4","volume-title":"Implementing machine learning to achieve dynamic zero-trust intrusion detection systems (Zt-ids) in 5G based IoT networks","author":"Nour","year":"2023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12173731"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2017.8397440"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2803446"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3129336"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3148857"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3179242"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3236448"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.22667\/JISIS.2020.05.31.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSN48538.2019.00079"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2402161"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3061609"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3183597"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12112355"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3362803"},{"issue":"2","key":"ref19","first-page":"1436","article-title":"Distributed denial of service attacks detection using statistical process control in centralized wireless networks","volume":"17","author":"Sounni","year":"2022","journal-title":"J. Eng. Sci. Technol."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528548"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2985089"},{"key":"ref23","volume-title":"Low carbon footprint intrusion detection in IoT systems based on deep learning algorithms combined with a metaheuristic","author":"Sassi","year":"2023"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3367004"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSE50710.2020.00020"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11162627"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3294568"},{"key":"ref28","volume-title":"Darpa Dataset","year":"1998"},{"key":"ref29","volume-title":"KDD Cup 99 Dataset","year":"1999"},{"key":"ref30","volume-title":"NSL KDD Dataset","year":"1999"},{"key":"ref31","volume-title":"Ddos 2007 Attack","year":"2007"},{"key":"ref32","volume-title":"Intrusion Detection Evaluation Dataset (CIC-IDS2017)","year":"2018"},{"key":"ref33","volume-title":"CTU-13","year":"2011"},{"key":"ref34","article-title":"5G-NIDD: A comprehensive network intrusion detection dataset generated over 5G wireless network","author":"Samarakoon","year":"2022","journal-title":"arXiv:2212.01298"},{"key":"ref35","volume-title":"Awid2 Dataset","year":"2015"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i3.24.22797"},{"key":"ref37","volume-title":"Intrusion Detection Evaluation Dataset (CIC-IDS2018)","year":"2018"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2100615"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2019.00059"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2019.8693059"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MSN53354.2021.00044"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103560"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103707"},{"key":"ref44","volume-title":"OpenWIPS-ng an Open Source and Modular Wireless IPS","year":"2025"},{"key":"ref45","volume-title":"Wi-Fi association_disassociation dataset","author":"Kahsay"},{"key":"ref46","volume-title":"3GPP TR 21.916 Version 16.2.0 Release 16","author":"Sultan","year":"2022"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10906593.pdf?arnumber=10906593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T04:54:15Z","timestamp":1741668855000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10906593\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3546338","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}