{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:10:20Z","timestamp":1756271420283,"version":"3.44.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130136","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"687-692","source":"Crossref","is-referenced-by-count":0,"title":["NetPacketformer: Real-Time, Context-Aware Network Intrusion Detection with Transformers"],"prefix":"10.1109","author":[{"given":"Armando","family":"Domi","sequence":"first","affiliation":[{"name":"Information and Technologies Institute,Centre for Research and Technology Hellas,Thessaloniki,Greece"}]},{"given":"Christos","family":"Zonios","sequence":"additional","affiliation":[{"name":"Information and Technologies Institute,Centre for Research and Technology Hellas,Thessaloniki,Greece"}]},{"given":"Giorgos","family":"Tatsis","sequence":"additional","affiliation":[{"name":"Information and Technologies Institute,Centre for Research and Technology Hellas,Thessaloniki,Greece"}]},{"given":"Anastasios","family":"Drosou","sequence":"additional","affiliation":[{"name":"Information and Technologies Institute,Centre for Research and Technology Hellas,Thessaloniki,Greece"}]},{"given":"Dimitrios","family":"Tzovaras","sequence":"additional","affiliation":[{"name":"Information and Technologies Institute,Centre for Research and Technology Hellas,Thessaloniki,Greece"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICVES.2014.7063743"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/jcal.12383"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MOCAST52088.2021.9493392"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971654"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS48716.2020.243558"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2869847"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3045653"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS56730.2022.9897425"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3530775"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2953364"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.iotcps.2023.09.003"},{"key":"ref15","article-title":"Attention is all you need","author":"Vaswani","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"article-title":"Very deep transformers for neural machine translation","year":"2020","author":"Liu","key":"ref16"},{"article-title":"An image is worth 16x16 words: Transformers for image recognition at scale","year":"2021","author":"Dosovitskiy","key":"ref17"},{"key":"ref18","article-title":"wav2vec 2.0: A framework for self-supervised learning of speech representations","author":"Baevski","year":"2020","journal-title":"Advances in Neural Information Processing Systems (NeurIPS)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3549737.3549754"},{"article-title":"Vatt: Transformers for multimodal self-supervised learning from raw video, audio and text","year":"2021","author":"Akbari","key":"ref20"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2025.103347","article-title":"Transformers and large language models for efficient intrusion detection systems: A comprehensive survey","author":"Kheddar","year":"2025"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3182333"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110072"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1109\/DCOSS-IoT61029.2024.00026","article-title":"Beyond detection: Leveraging large language models for cyber attack prediction in iot networks","author":"Diaf","year":"2024"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122564"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3465045"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1109\/WiMob61911.2024.10770340","article-title":"Efficient federated intrusion detection in 5g ecosystem using optimized bert-based model","author":"Adjewa","year":"2024"},{"article-title":"Real-time network intrusion detection via decision transformers","year":"2023","author":"Chen","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/EASCT59475.2023.10393509"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit60053.2024.10597005"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2020-3015"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2021.3122291"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SLT.2016.7846260"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101351"},{"key":"ref36","article-title":"5G-NIDD: A comprehensive network intrusion detection dataset generated over 5g wireless network","author":"Samarakoon","year":"2022","journal-title":"IEEE Dataport"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/s23135941"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3544473"},{"article-title":"Decoupled weight decay regularization","volume-title":"International Conference on Learning Representations (ICLR)","author":"Loshchilov","key":"ref41"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130136.pdf?arnumber=11130136","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T04:51:06Z","timestamp":1756270266000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130136\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130136","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}