{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:54:49Z","timestamp":1760028889206,"version":"3.37.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1109\/icnp61940.2024.10858543","type":"proceedings-article","created":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T18:29:45Z","timestamp":1738693785000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Towards Real-Time Intrusion Detection in P4-Programmable 5G User Plane Functions"],"prefix":"10.1109","author":[{"given":"Aristide Tanyi-Jong","family":"Akem","sequence":"first","affiliation":[{"name":"IMDEA Networks Institute,Spain"}]},{"given":"Marco","family":"Fiore","sequence":"additional","affiliation":[{"name":"Universidad Carlos III de Madrid,Spain"}]}],"member":"263","reference":[{"issue":"1","key":"ref1","first-page":"117","article-title":"Overview of 5G security and vulnerabilities","volume":"5","author":"Fonyi.","year":"2020","journal-title":"The Cyber Defense Review"},{"year":"2019","journal-title":"Positive Technologies. 5G security issues","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/NetSoft60951.2024.10588889"},{"key":"ref4","article-title":"A survey of machine learning methods for DDoS threats detection against SD N","author":"Chetouane","year":"2022","journal-title":"DiCES-N"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/WINCOM.2016.7777224"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/2774993.2775069"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/2656877.2656890"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ACCESS.2021.3086704"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/COMST.2023.3344351"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/3152434.3152461"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/3365609.3365864"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/INFOCOM53939.2023.10229100"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/NOMS59830.2024.10575394"},{"key":"ref16","article-title":"An efficient design of intelligent network data plane","author":"Zhou","year":"2023","journal-title":"USENIX Security"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/3565009.3569520"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/5GWF.2019.8911629"},{"year":"2020","journal-title":"LTE; 5G; interface between the control plane and the user plane nodes (3GPP TS 29.244 version 16.5.0 release 16)","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1186\/s13638-022-02204-5"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/3563647.3563651"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/3482898.3483358"},{"key":"ref23","article-title":"CeUPF: Offloading 5G user plane function to programmable hardware base on co-existence architecture","author":"Cong","year":"2022","journal-title":"ICEA"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/INFOCOM52122.2024.10621365"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/3472716.3472846"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/3503222.3507726"},{"key":"ref27","article-title":"Re-architecting traffic analysis with neural network interface cards","author":"Siracusano","year":"2022","journal-title":"USENIX NSDI"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.14722\/ndss.2021.24067"},{"key":"ref29","article-title":"Why do tree-based models still outperform deep learning on typical tabular data?","volume":"35","author":"Grinsztajn","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.48550\/arXiv.1201.0490"},{"year":"2013","author":"Turner","journal-title":"Tcpreplay","key":"ref31"},{"year":"2022","author":"Samarakoon","journal-title":"5G-NIDD: A comprehensive network intrusion detection dataset generated over 5G wireless network","key":"ref32"}],"event":{"name":"2024 IEEE 32nd International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2024,10,28]]},"location":"Charleroi, Belgium","end":{"date-parts":[[2024,10,31]]}},"container-title":["2024 IEEE 32nd International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10858485\/10858498\/10858543.pdf?arnumber=10858543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T05:58:45Z","timestamp":1738735125000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10858543\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icnp61940.2024.10858543","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]}}}