{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T20:52:42Z","timestamp":1770497562920,"version":"3.49.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T00:00:00Z","timestamp":1717891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T00:00:00Z","timestamp":1717891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland","doi-asserted-by":"publisher","award":["17\/CDA\/4760,18\/RI\/5721,13\/RC\/2077_p2"],"award-info":[{"award-number":["17\/CDA\/4760,18\/RI\/5721,13\/RC\/2077_p2"]}],"id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,9]]},"DOI":"10.1109\/icc51166.2024.10622345","type":"proceedings-article","created":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T15:34:42Z","timestamp":1724168082000},"page":"2384-2389","source":"Crossref","is-referenced-by-count":6,"title":["Cross-Domain AI for Early Attack Detection and Defense Against Malicious Flows in O-RAN"],"prefix":"10.1109","author":[{"given":"Bruno Missi","family":"Xavier","sequence":"first","affiliation":[{"name":"Federal University of Esp&#x00ED;rito Santo,Esp&#x00ED;rito Santo,Brazil"}]},{"given":"Merim","family":"Dzaferagic","sequence":"additional","affiliation":[{"name":"Trinity College Dublin,Ireland"}]},{"given":"Irene","family":"Vil\u00e0","sequence":"additional","affiliation":[{"name":"Trinity College Dublin,Ireland"}]},{"given":"Magnos","family":"Martinello","sequence":"additional","affiliation":[{"name":"Federal University of Esp&#x00ED;rito Santo,Esp&#x00ED;rito Santo,Brazil"}]},{"given":"Marco","family":"Ruffini","sequence":"additional","affiliation":[{"name":"Trinity College Dublin,Ireland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/978-981-19-9323-7_7","article-title":"World cyberse-curity development","volume-title":"World Internet Development Report 2021: Blue Book for World Internet Conference","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMM54429.2022.9817293"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.01.027"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00064"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/9781119892199.ch14"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCECE57866.2023.10151339"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR57248.2023.10147977"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109695"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100814"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3280913"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07812-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps56602.2022.10008563"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS56106.2022.9919972"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04969-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3212913"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-021-09633-5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3323771"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3318109"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.101.2001120"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-5640-8_47"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279349"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS57453.2023.10225864"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM57956.2023.00057"},{"key":"ref25","article-title":"O-RAN Working Group 2. AI\/ML Workflow Description and Requirements (O-RAN. WG2. AIML-v01. 02)","author":"Alliance","year":"2021","journal-title":"Tech. Rep"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66046-8_3"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406214"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24067"},{"key":"ref29","article-title":"O-RAN Working Group 3: Near-Real-time RAN Intel-ligent Controller E2 Service Model, RAN Control 1.0 (ORAN-WG3. E2SM-RC-v01.00)","author":"Alliance","year":"2021","journal-title":"Tech. Spec"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"}],"event":{"name":"ICC 2024 - IEEE International Conference on Communications","location":"Denver, CO, USA","start":{"date-parts":[[2024,6,9]]},"end":{"date-parts":[[2024,6,13]]}},"container-title":["ICC 2024 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10622104\/10622158\/10622345.pdf?arnumber=10622345","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T20:14:29Z","timestamp":1724962469000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10622345\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,9]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icc51166.2024.10622345","relation":{},"subject":[],"published":{"date-parts":[[2024,6,9]]}}}