{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:33:55Z","timestamp":1774449235834,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,30]]},"DOI":"10.23919\/cnsm59352.2023.10327918","type":"proceedings-article","created":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T14:04:20Z","timestamp":1701180260000},"page":"1-5","source":"Crossref","is-referenced-by-count":12,"title":["DTL-IDS: Deep Transfer Learning-Based Intrusion Detection System in 5G Networks"],"prefix":"10.23919","author":[{"given":"Behnam","family":"Farzaneh","sequence":"first","affiliation":[{"name":"University of Regina,Department of Computer Science,Canada"}]},{"given":"Nashid","family":"Shahriar","sequence":"additional","affiliation":[{"name":"University of Regina,Department of Computer Science,Canada"}]},{"given":"Abu Hena","family":"Al Muktadir","sequence":"additional","affiliation":[{"name":"Saskatchewan Polytechnic,Canada"}]},{"given":"Md. Shamim","family":"Towhid","sequence":"additional","affiliation":[{"name":"University of Regina,Department of Computer Science,Canada"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Deep Transfer Learning Applications in Intrusion Detection Systems: A Comprehensive Review","author":"Kheddar","year":"2023","journal-title":"arXiv preprint"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/FNWF55208.2022.00117"},{"key":"ref3","article-title":"5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network","author":"Samarakoon","year":"2022","journal-title":"arXiv preprint"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.08.011"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.05.130"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2023.03.008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s22155621"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-021-01415-4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.renene.2022.12.123"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838780"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC55113.2022.9825115"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000476"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/341\/1\/012001"}],"event":{"name":"2023 19th International Conference on Network and Service Management (CNSM)","location":"Niagara Falls, ON, Canada","start":{"date-parts":[[2023,10,30]]},"end":{"date-parts":[[2023,11,2]]}},"container-title":["2023 19th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10327686\/10327788\/10327918.pdf?arnumber=10327918","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T17:05:37Z","timestamp":1761066337000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10327918\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,30]]},"references-count":14,"URL":"https:\/\/doi.org\/10.23919\/cnsm59352.2023.10327918","relation":{},"subject":[],"published":{"date-parts":[[2023,10,30]]}}}