{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,20]],"date-time":"2026-05-20T04:18:24Z","timestamp":1779250704278,"version":"3.51.4"},"reference-count":130,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Commun."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tcomm.2025.3547764","type":"journal-article","created":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T13:47:31Z","timestamp":1741096051000},"page":"7650-7679","source":"Crossref","is-referenced-by-count":19,"title":["Toward Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networks"],"prefix":"10.1109","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9383-1097","authenticated-orcid":false,"given":"Li","family":"Yang","sequence":"first","affiliation":[{"name":"Faculty of Business and Information Technology, Ontario Tech University, Oshawa, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2941-9337","authenticated-orcid":false,"given":"Shimaa","family":"Naser","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Engineering, KU 6G Research Center, Khalifa University, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2887-0350","authenticated-orcid":false,"given":"Abdallah","family":"Shami","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Western University, London, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4649-9399","authenticated-orcid":false,"given":"Sami","family":"Muhaidat","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Engineering, KU 6G Research Center, Khalifa University, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2124-8828","authenticated-orcid":false,"given":"Lyndon","family":"Ong","sequence":"additional","affiliation":[{"name":"Ciena, Hanover, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8941-8080","authenticated-orcid":false,"given":"M\u00e9rouane","family":"Debbah","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Engineering, KU 6G Research Center, Khalifa University, Abu Dhabi, United Arab Emirates"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3078081"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103362"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.09.001"},{"key":"ref4","volume-title":"GS ZSM 002\u2013V1.1.1\u2014Zero-Touch Network and Service Management (ZSM); Reference Architecture","year":"2019"},{"key":"ref5","volume-title":"GS ZSM 012\u2013V1.1.1\u2014Zero-Touch Network and Service Management (ZSM); Enablers for Artificial Intelligence-based Network and Service Automation","year":"2022"},{"key":"ref6","volume-title":"GS ZSM 014\u2013V1.1.1\u2014Zero-Touch Network and Service Management (ZSM); ZSM Security Aspects","year":"2024"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900252"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105366"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685083"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05318-5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.0001.2100012"},{"key":"ref12","volume-title":"Computer Networking: A Top-Down Approach","author":"Kuros","year":"2007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3935"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2359538"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/JCIN.2020.9200889"},{"key":"ref16","first-page":"9","article-title":"Cross-layer intrusion detection in mobile ad hoc networks\u2014A survey","volume":"25","author":"Kumar Trivedi","year":"2021","journal-title":"Ann. Rom. Soc. Cell Biol."},{"issue":"8734","key":"ref17","article-title":"Optimized and automated machine learning techniques towards IoT data analytics and cybersecurity","author":"Yang","year":"2022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737463"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900273"},{"key":"ref21","volume-title":"GS ZSM 009-1\u2013V1.1.1\u2014Zero-Touch Network and Service Management (ZSM); Closed-Loop Automation; Part 1: Enablers","year":"2021"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110294"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2024.3505555"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51664.2024.10454808"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.002.2200318"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit54941.2022.9815754"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1201\/b16390-20"},{"issue":"4","key":"ref28","first-page":"1657","article-title":"Security threats in wireless sensor networks in each layer","volume":"4","author":"Sastry","year":"2013","journal-title":"Int. J. Adv. Netw. Appl."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2598968"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2927379"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/s23041814"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5120\/12006-7132"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983259"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8201-6_1"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3100308"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3101650"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3084796"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601959"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3108618"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3042188"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685338"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4301409"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1561928"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MeditCom55741.2022.9928604"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2784431"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7037452"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.104"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.767"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070194"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2010.5432018"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2375191"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127727"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3195925"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364429"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.032914.120921"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2010.5757798"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036892"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036875"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883440"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900054"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2960099"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2925418"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2881117"},{"key":"ref65","article-title":"Emitter identification using CNN IQ imbalance estimators","author":"Wong","year":"2018","journal-title":"arXiv:1808.02369"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.0001.1900065"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2796446"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2967393"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2945022"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035105"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2871514"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2524258"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3196648"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2963962"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971260"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2993175"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2938533"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3005931"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.3390\/s20020461"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.3103\/S0146411620010046"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-13061-z"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103560"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107042"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1002\/9781119740780.ch3"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001280"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.07.061"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106622"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMIA48430.2020.9074859"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3212003"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-6602-3_3"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-021-00793-1"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03411-6"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487629"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972771.42"},{"key":"ref95","first-page":"77","article-title":"Early drift detection method","volume-title":"Proc. 4th Int. Workshop Knowl. Discovery Data Streams","volume":"6","author":"Baena-Garc\u0131a"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2876857"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-017-5642-8"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00034"},{"key":"ref99","first-page":"240","article-title":"Non-stochastic best arm identification and hyperparameter optimization","volume-title":"Proc. 19th Int. Conf. Artif. Intell. Statist.","author":"Jamieson"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.2174\/1566524018666180611074856"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC57260.2024.10570951"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10278993"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621223"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3321401"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3376631"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/s11701-024-02153-9"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/CSPC.2017.8305855"},{"key":"ref108","first-page":"677","article-title":"Provisioning and recovery in flexible optical networks using ant colony optimization","volume-title":"Proc. IFIP\/IEEE Int. Symp. Integr. Netw. Manage. (IM)","author":"Lima"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ICAAIC60222.2024.10575599"},{"key":"ref110","first-page":"1","article-title":"River: Machine learning for streaming data in Python","volume":"22","author":"Montiel","year":"2021","journal-title":"J. Mach. Learn. Res."},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12208"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15880-3_15"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1111\/rssb.12425"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220005"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03915-7_22"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i3.24.22797"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2019.01.012"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3437192"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC52172.2021.9615795"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2019.8824956"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2558521"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCCC51823.2021.9478109"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3011561"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000088"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3064896"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW61823.2024.00034"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.23919\/PNC63053.2024.10697374"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ICKECS61492.2024.10616752"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2023.3238390"}],"container-title":["IEEE Transactions on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/26\/11176786\/10909604.pdf?arnumber=10909604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T13:08:46Z","timestamp":1759237726000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10909604\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":130,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tcomm.2025.3547764","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.23971707.v1","asserted-by":"object"}]},"ISSN":["0090-6778","1558-0857"],"issn-type":[{"value":"0090-6778","type":"print"},{"value":"1558-0857","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}