{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:31:34Z","timestamp":1760661094815,"version":"build-2065373602"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/jsyst.2025.3600900","type":"journal-article","created":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T17:30:19Z","timestamp":1757698219000},"page":"754-765","source":"Crossref","is-referenced-by-count":0,"title":["Secure 5G Core Network Slicing for DDoS Mitigation"],"prefix":"10.1109","volume":"19","author":[{"given":"Danish","family":"Sattar","sequence":"first","affiliation":[{"name":"Department of Systems and Computer Engineering, Carleton University, Ottawa, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9220-4630","authenticated-orcid":false,"given":"Ashraf","family":"Matrawy","sequence":"additional","affiliation":[{"name":"School of Information Technology, Carleton University, Ottawa, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3888-3975","authenticated-orcid":false,"given":"AbdulAziz","family":"AbdulGhaffar","sequence":"additional","affiliation":[{"name":"Department of Systems and Computer Engineering, Carleton University, Ottawa, ON, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3044626"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2815638"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3094116"},{"year":"2019","key":"ref4","article-title":"Study of enablers for network automation for 5G"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3377161"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.3481355"},{"year":"2017","key":"ref7","article-title":"Network functions virtualisation (NFV) release 3; security; security management and monitoring specification"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.15439\/2017F228"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802852"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC49221.2020.9297185"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103269"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108157"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107830"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.70039"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2974520"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ccwc.2018.8301700"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2487361"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2019.8801975"},{"year":"2016","key":"ref19","article-title":"5G Americas White Paper Network Slicing for 5G and Beyond"},{"article-title":"Language for mathematical programming","year":"2020","author":"Modeling","key":"ref20"},{"year":"2020","key":"ref22","article-title":"CentOS"},{"article-title":"Traffic control (TC)","year":"2020","author":"Hubert","key":"ref23"},{"article-title":"iperf","year":"2020","author":"Dugan","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2019.2908351"},{"article-title":"Network slicing slides more vigorously into 2025","year":"2025","author":"Jones","key":"ref26"},{"year":"2025","key":"ref27","article-title":"Network slicing unlocks huge new value for MNOS"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4267003\/11204754\/11163606.pdf?arnumber=11163606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:37:43Z","timestamp":1760636263000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11163606\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":26,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2025.3600900","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"type":"print","value":"1932-8184"},{"type":"electronic","value":"1937-9234"},{"type":"electronic","value":"2373-7816"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}