{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T22:38:21Z","timestamp":1769035101296,"version":"3.49.0"},"reference-count":51,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,14]]},"DOI":"10.1109\/cloudcom67567.2025.11331548","type":"proceedings-article","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T20:37:16Z","timestamp":1768941436000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["An AI Security Testbed for the 5G Core"],"prefix":"10.1109","author":[{"given":"Cl\u00e9ment","family":"Duchesne","sequence":"first","affiliation":[{"name":"Thales SIX GTS France,Gennevilliers,France"}]},{"given":"Johannes","family":"Hartel","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam,Amsterdam,The Netherlands"}]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam,Amsterdam,The Netherlands"}]},{"given":"Mengyuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam,Amsterdam,The Netherlands"}]},{"given":"Agathe","family":"Blaise","sequence":"additional","affiliation":[{"name":"Thales SIX GTS France,Gennevilliers,France"}]}],"member":"263","reference":[{"key":"ref1","first-page":"29","article-title":"A cloud-based SDNINFV testbed for end-to-end network slicing in 4g\/5g","author":"Esmaeily","year":"2020","journal-title":"IEEE NetSoft"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/FNWF58287.2023.10520411"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/FNWF55208.2022.00069"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN59985.2024.10572091"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/app14167018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS56262.2023.10041360"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit58263.2023.10188342"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3286680.3286683"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/5GWF49715.2020.9221109"},{"key":"ref10","article-title":"5G; System Architecture for the 5G System (Release 17)","year":"2022","journal-title":"ETSI, Tech. Rep."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.001.2000046"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.11.090"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7452271"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2021.3056230"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10436766"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000088"},{"key":"ref18","article-title":"Towards nwdaf-enabled analytics and closed-loop automation in 5g networks","volume":"abs\/2505.06789","author":"Ardestani","year":"2025","journal-title":"CoRR"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100696"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.23919\/ICN.2021.0002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MeditCom49071.2021.9647461"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.12.009"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-022-09615-y"},{"key":"ref24","article-title":"Security threats in cloud computing models: Domains and proposals","author":"da Silva","year":"2013","journal-title":"IEEE CLOUD"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102667"},{"key":"ref26","article-title":"Referentiel d\u2019 objectifs de securite en matiere de fonctions reseau virtualisees","year":"2021","journal-title":"Tech. Rep."},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1613\/jair.301"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3043876"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482609"},{"key":"ref30","article-title":"NFV Security in 5G - Challenges and Best Practices","year":"2022","journal-title":"ENISA, Tech. Rep."},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3487890"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom59040.2023.00053"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3151000"},{"key":"ref34","volume-title":"free5gc"},{"key":"ref35","volume-title":"Open5gs"},{"key":"ref36","volume-title":"towards5 gs- helm"},{"key":"ref37","volume-title":"5G compatible GTP kernel module"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11010016"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3233\/jcs-200002"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3561123"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6655216"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid54584.2022.00127"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.107702"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA63423.2024.10912627"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN50289.2020.9289900"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2300675"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP54353.2022.9908028"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00086"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom59040.2023.00052"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3580569"},{"key":"ref51","volume-title":"srsran project: Open source ran"}],"event":{"name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","location":"Shenzhen, China","start":{"date-parts":[[2025,11,14]]},"end":{"date-parts":[[2025,11,16]]}},"container-title":["2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11330195\/11331311\/11331548.pdf?arnumber=11331548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T07:08:26Z","timestamp":1768979306000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11331548\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,14]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/cloudcom67567.2025.11331548","relation":{},"subject":[],"published":{"date-parts":[[2025,11,14]]}}}