{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T23:15:51Z","timestamp":1768432551037,"version":"3.49.0"},"reference-count":100,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"CHEDDAR: Communications Hub for Empowering Distributed Cloud Computing Applications and Research"},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/Y037421\/1"],"award-info":[{"award-number":["EP\/Y037421\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/X040518\/1"],"award-info":[{"award-number":["EP\/X040518\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Mobile oRAN for highly Dense Environments"},{"name":"TUDOR"},{"name":"U.K.&#x2019;s Department of Science, Innovation and Technology"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tnse.2025.3629983","type":"journal-article","created":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T18:54:26Z","timestamp":1762455266000},"page":"3301-3319","source":"Crossref","is-referenced-by-count":1,"title":["AI-on-RAN for Cyber Defense: An XAI-LLM Framework for Interpretable Anomaly Detection"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4980-2608","authenticated-orcid":false,"given":"Sotiris","family":"Chatzimiltis","sequence":"first","affiliation":[{"name":"5G\/6GIC, Institute for Communication Systems (ICS), University of Surrey, Guildford, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3284-5086","authenticated-orcid":false,"given":"Mohammad","family":"Shojafar","sequence":"additional","affiliation":[{"name":"5G\/6GIC, Institute for Communication Systems (ICS), University of Surrey, Guildford, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9948-9165","authenticated-orcid":false,"given":"Mahdi Boloursaz","family":"Mashhadi","sequence":"additional","affiliation":[{"name":"5G\/6GIC, Institute for Communication Systems (ICS), University of Surrey, Guildford, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6062-8639","authenticated-orcid":false,"given":"Rahim","family":"Tafazolli","sequence":"additional","affiliation":[{"name":"5G\/6GIC, Institute for Communication Systems (ICS), University of Surrey, Guildford, U.K."}]}],"member":"263","reference":[{"key":"ref1","article-title":"O-RAN WhitePaperBuilding the next generation RAN","year":"2018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3239220"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2021.3062487"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2025.3526215"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3064398"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2025.3554250"},{"key":"ref7","article-title":"AI-RAN alliance vision and mission white paper","year":"2024"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2500018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3151000"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.011.2000065"},{"key":"ref11","article-title":"O-RAN WG3 E2 service model (E2SM) KPM specification","year":"2025"},{"key":"ref12","article-title":"O-RAN WG3 E2 general aspects and principles (E2GAP)","year":"2025"},{"key":"ref13","article-title":"O-RAN WG3 E2 application protocol (E2AP)","year":"2025"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3216617"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3504955"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3376419"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.004.2400105"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2024.3435524"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.015.2300552"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3466225"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MeditCom64437.2025.11104374"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3351088"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.52953\/UQWK9413"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15725-y"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DSC61021.2023.10354098"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108626"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/PAIS62114.2024.10541178"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3407709"},{"key":"ref29","first-page":"341","article-title":"Improved IDS for vehicular ad-hoc network using deep learning approaches","volume-title":"Proc. IEEE 2nd Int. Conf. Automat., Comput. Renewable Syst.","author":"Benziker","year":"2023"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3399219"},{"issue":"6","key":"ref31","first-page":"165","article-title":"From signatures to behavior: Evolving strategies for next-generation intrusion detection","volume":"8","author":"Iyer","year":"2021","journal-title":"Eur. J. Adv. Eng. Technol."},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00682-2"},{"key":"ref35","article-title":"Deep learning-based intrusion detection systems: A survey","author":"Xu","year":"2025"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3687124"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3233793"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3585884"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800155"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-85248-z"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.21428\/e90189c8.eb32676c"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3384528"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICIICS63763.2024.10860234"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122564"},{"key":"ref45","article-title":"Real-time network intrusion detection via decision transformers","author":"Chen","year":"2023"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103621"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3546338"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3408690"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279349"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC61673.2024.10733615"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS61880.2024.10620781"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/FNWF63303.2024.11028717"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2025.3546760"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10278993"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit60053.2024.10597083"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit58263.2023.10188245"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS56262.2023.10041318"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2974520"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2021.3133479"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2024.3353177"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3441862"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3280465"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3437248"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3465447"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2025.103347"},{"key":"ref66","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.4853709","article-title":"Generative AI and large language models for cyber security: All insights you need","author":"Ferrag","year":"2024"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3769676"},{"key":"ref68","doi-asserted-by":"crossref","DOI":"10.1016\/j.icte.2025.09.003","article-title":"Reasoning beyond limits: Advances and open problems for LLMs","author":"Ferrag","year":"2025","journal-title":"ICT Express"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2022.3186589"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2025.111145"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD62243.2024.10942895"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3636534.3649380"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6634811"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3368377"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2025.104542"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-57942-4_44"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3546700"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/EASCT59475.2023.10393509"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3363469"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops67674.2025.11162166"},{"key":"ref81","doi-asserted-by":"crossref","DOI":"10.1016\/j.icte.2025.09.003","article-title":"Reasoning beyond limits: Advances and open problems for LLMs","volume-title":"ICT Express","author":"Ferrag","year":"2025"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3696348.3696881"},{"key":"ref83","article-title":"XAI for All: Can large language models simplify explainable AI?","author":"Mavrepis","year":"2024"},{"key":"ref84","article-title":"HuntGPT: Integrating machine learning-based anomaly detection and explainable AI with large language models (LLMs)","author":"Ali","year":"2023"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3711896.3737239"},{"key":"ref86","article-title":"ChatIDS: Explainable cybersecurity using generative AI","author":"Jttner","year":"2023"},{"key":"ref87","first-page":"4768","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Lundberg","year":"2017"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2400384"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2025.3576176"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3501358"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/JCC62314.2024.00020"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00704"},{"key":"ref94","article-title":"FrugalGPT: How to use large language models while reducing cost and improving performance","author":"Chen","year":"2024","journal-title":"Trans. Mach. Learn. Res."},{"key":"ref95","article-title":"NCSRD-DS-5GDDoS: 5G radio and core metrics containing sporadic DDoS attacks","year":"2024"},{"key":"ref96","article-title":"BERTScore: Evaluating text generation with BERT","volume-title":"Int. Conf. Learn. Representations","author":"Zhang","year":"2020"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN63874.2024.10849694"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2025.3567151"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1976.4309452"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488902\/11264281\/11230680.pdf?arnumber=11230680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T12:31:04Z","timestamp":1766061064000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11230680\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":100,"URL":"https:\/\/doi.org\/10.1109\/tnse.2025.3629983","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}