{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T16:44:52Z","timestamp":1768409092807,"version":"3.49.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:00Z","timestamp":1732492800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:00Z","timestamp":1732492800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,25]]},"DOI":"10.1109\/cscn63874.2024.10849726","type":"proceedings-article","created":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T18:36:30Z","timestamp":1738002990000},"page":"308-313","source":"Crossref","is-referenced-by-count":3,"title":["A New Sub-Use Case for Signaling Storm Attack in Open RAN and an ML-based Detection Approach"],"prefix":"10.1109","author":[{"given":"Samara","family":"Mayhoub","sequence":"first","affiliation":[{"name":"Institute for Communication Systems, University of Surrey,5G\/6G Innovation Centre,Guildford,UK"}]},{"given":"Sotiris","family":"Chatzimiltis","sequence":"additional","affiliation":[{"name":"Institute for Communication Systems, University of Surrey,5G\/6G Innovation Centre,Guildford,UK"}]},{"given":"Hamed","family":"Alimohammadi","sequence":"additional","affiliation":[{"name":"Institute for Communication Systems, University of Surrey,5G\/6G Innovation Centre,Guildford,UK"}]},{"given":"Zhizhou","family":"He","sequence":"additional","affiliation":[{"name":"Institute for Communication Systems, University of Surrey,5G\/6G Innovation Centre,Guildford,UK"}]},{"given":"Sulyman Age","family":"Abdulkareem","sequence":"additional","affiliation":[{"name":"Institute for Communication Systems, University of Surrey,5G\/6G Innovation Centre,Guildford,UK"}]},{"given":"Mohammad","family":"Shojafar","sequence":"additional","affiliation":[{"name":"Institute for Communication Systems, University of Surrey,5G\/6G Innovation Centre,Guildford,UK"}]},{"given":"Ayhan","family":"Akbas","sequence":"additional","affiliation":[{"name":"Institute for Communication Systems, University of Surrey,5G\/6G Innovation Centre,Guildford,UK"}]},{"given":"Chuan Heng","family":"Foh","sequence":"additional","affiliation":[{"name":"Institute for Communication Systems, University of Surrey,5G\/6G Innovation Centre,Guildford,UK"}]}],"member":"263","reference":[{"key":"ref1","article-title":"O-RAN Alliance Who We Are","author":"Alliance","year":"2024"},{"key":"ref2","article-title":"About 3GPP","year":"2024"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3239220"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.002.2300317"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.101.2000014"},{"key":"ref6","article-title":"O-RAN E2 Service Model (E2SM) KPM, V05.00","author":"Alliance","year":"2024","journal-title":"Tecchnical Specification"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3367289"},{"key":"ref8","article-title":"O-RAN E2 Service Model (E2SM), V06.00","author":"Alliance","year":"2024","journal-title":"Tecchnical Specification"},{"key":"ref9","article-title":"Management and orchestration, 5G performance measurements, TS 28.552, V19.0.0","year":"2024","journal-title":"Tecchnical Specification"},{"key":"ref10","article-title":"Telecommunication management Performance Management, TS 32.425"},{"key":"ref11","article-title":"NR; Physical layer measurements, TS 38.215"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3643833.3656119"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.108.2100659"},{"key":"ref14","first-page":"55","article-title":"Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE","volume-title":"28th USENIX Security Symposium (USENIX Security 19).","author":"Yang"},{"key":"ref15","first-page":"101","article-title":"Oh No, My RAN! Breaking Into an O-RAN 5 G Indoor Base Station","volume-title":"18th USENIX WOOT Conference on Offensive Technologies (WOOT 24).","author":"Janzen"},{"key":"ref16","article-title":"O-RAN Use Cases Detailed Specification, V14.00","author":"Alliance","year":"2024","journal-title":"Tecchnical Specification"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS57453.2023.10226043"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM59352.2023.10327880"},{"issue":"23","key":"ref19","doi-asserted-by":"crossref","DOI":"10.3390\/app122312456","article-title":"Machine Learning Based Signaling DDoS Detection System for 5G Stand Alone Core Network","volume":"12","author":"Park","journal-title":"Applied Sciences"},{"key":"ref20","first-page":"338","article-title":"Estimating continuous distributions in Bayesian classifiers","volume-title":"Proceedings of the Eleventh conference on Uncertainty in artificial intelligence","author":"John"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2307\/2347628"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/BF00153759"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022643204877"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.29172\/7c2a6982-6d72-4cd8-bba6-2fccb06a7011"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2005.06.042"}],"event":{"name":"2024 IEEE Conference on Standards for Communications and Networking (CSCN)","location":"Belgrade, Serbia","start":{"date-parts":[[2024,11,25]]},"end":{"date-parts":[[2024,11,27]]}},"container-title":["2024 IEEE Conference on Standards for Communications and Networking (CSCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10849679\/10849681\/10849726.pdf?arnumber=10849726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T06:27:00Z","timestamp":1738045620000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10849726\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,25]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/cscn63874.2024.10849726","relation":{},"subject":[],"published":{"date-parts":[[2024,11,25]]}}}