{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T17:25:41Z","timestamp":1778347541752,"version":"3.51.4"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T00:00:00Z","timestamp":1721606400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T00:00:00Z","timestamp":1721606400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,22]]},"DOI":"10.1109\/hpsr62440.2024.10635989","type":"proceedings-article","created":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T15:35:36Z","timestamp":1724168136000},"page":"179-184","source":"Crossref","is-referenced-by-count":15,"title":["Blockchain and AI for Collaborative Intrusion Detection in 6G-enabled IoT Networks"],"prefix":"10.1109","author":[{"given":"Massinissa","family":"Chelghoum","sequence":"first","affiliation":[{"name":"University of Constantine 2-Abdelhamid Mehri, Ali Mendjeli Campus,LIRE Laboratory,Constantine,Algeria,25000"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gueltoum","family":"Bendiab","sequence":"additional","affiliation":[{"name":"University of Fr&#x00E8;res Mentouri,LIRE Laboratory,Department of Electronics,Constantine,Algeria,25000"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohamed Aymen","family":"Labiod","sequence":"additional","affiliation":[{"name":"University of Paris-Est Creteil LISSI TincNET (CIR),Vitry-sur-Seine,France,F-94400"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohamed","family":"Benmohammed","sequence":"additional","affiliation":[{"name":"University of Constantine 2-Abdelhamid Mehri, Ali Mendjeli Campus,LIRE Laboratory,Constantine,Algeria,25000"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stavros","family":"Shiaeles","sequence":"additional","affiliation":[{"name":"University of Portsmouth,Centre for Cybercrime and Economic Crime,Portsmouth,UK,PO1 2UP"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Abdelhamid","family":"Mellouk","sequence":"additional","affiliation":[{"name":"University of Portsmouth,Centre for Cybercrime and Economic Crime,Portsmouth,UK,PO1 2UP"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2019.2963491"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.07.003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12153300"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-019-0355-6"},{"key":"ref5","article-title":"Connection density of 4 g, 5 g, and 6g mobile broadband technologies","author":"Taylor"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900488"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482503"},{"key":"ref8","article-title":"An emerging threat: Attacking 5g via network slices","author":"Seals"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3236274"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3188304"},{"key":"ref11","article-title":"Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017","journal-title":"arXiv preprint arXiv:1708.07747"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2954595"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCE58854.2023.10246078"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10417-3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101575"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103153"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/s23188006"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/s23249690"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.013.2100768"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICNAS59892.2023.10330507"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3320282"},{"key":"ref23","article-title":"Industrial control system (ics) cyber attack datasets","author":"Morris"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft48620.2020.9165381"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_71011"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref28","first-page":"6105","article-title":"Efficientnet: Rethinking model scaling for convolutional neural networks","volume-title":"International conference on machine learning","author":"Tan"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9326-7"},{"key":"ref30","article-title":"tatsu-i\/malware-traffic-analysis.net"},{"key":"ref31","article-title":"Publicly available pcap files"},{"key":"ref32","article-title":"Malware capture facility project"},{"key":"ref33","article-title":"cyber-threat intelligence gathering, detection, and mitigation platform"},{"key":"ref34","article-title":"913 malicious network traffic pcaps and binary visualisation images dataset"},{"key":"ref35","article-title":"scikit-learn machine learning in python"}],"event":{"name":"2024 IEEE 25th International Conference on High Performance Switching and Routing (HPSR)","location":"Pisa, Italy","start":{"date-parts":[[2024,7,22]]},"end":{"date-parts":[[2024,7,24]]}},"container-title":["2024 IEEE 25th International Conference on High Performance Switching and Routing (HPSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10635098\/10635910\/10635989.pdf?arnumber=10635989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T19:57:37Z","timestamp":1724961457000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10635989\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,22]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/hpsr62440.2024.10635989","relation":{},"subject":[],"published":{"date-parts":[[2024,7,22]]}}}