{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T06:34:57Z","timestamp":1726122897156},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030750749"},{"type":"electronic","value":"9783030750756"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-75075-6_47","type":"book-chapter","created":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T07:06:40Z","timestamp":1619420800000},"page":"580-591","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["The Novel System of Attacks Detection in 5G"],"prefix":"10.1007","author":[{"given":"Maksim","family":"Iavich","sequence":"first","affiliation":[]},{"given":"Sergiy","family":"Gnatyuk","sequence":"additional","affiliation":[]},{"given":"Roman","family":"Odarchenko","sequence":"additional","affiliation":[]},{"given":"Razvan","family":"Bocu","sequence":"additional","affiliation":[]},{"given":"Sergei","family":"Simonov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,27]]},"reference":[{"issue":"6","key":"47_CR1","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1109\/jsac.2014.2328098","volume":"32","author":"JG Andrews","year":"2014","unstructured":"Andrews, J.G., et al.: What will 5G be? IEEE J. Sel. Areas Commun. 32(6), 1065\u20131082 (2014). https:\/\/doi.org\/10.1109\/jsac.2014.2328098","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"5","key":"47_CR2","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/mcom.2014.6815890","volume":"52","author":"A Osseiran","year":"2014","unstructured":"Osseiran, A., et al.: Scenarios for 5G mobile and wireless communications: the vision of the METIS project. IEEE Commun. Mag. 52(5), 26\u201335 (2014). https:\/\/doi.org\/10.1109\/mcom.2014.6815890","journal-title":"IEEE Commun. Mag."},{"issue":"6","key":"47_CR3","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1109\/jsac.2017.2692307","volume":"35","author":"M Shafi","year":"2017","unstructured":"Shafi, M., et al.: 5G: a tutorial overview of standards, trials, challenges, deployment, and practice. IEEE J. Sel. Areas Commun. 35(6), 1201\u20131221 (2017). https:\/\/doi.org\/10.1109\/jsac.2017.2692307","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"47_CR4","doi-asserted-by":"publisher","unstructured":"Agiwal, M., Roy, A., Saxena, N.: Next generation 5G wireless networks: a comprehensive survey. In: IEEE Communications Surveys and Tutorials, vol. 18, no. 3, pp. 1617\u20131655, Thirdquarter (2016). https:\/\/doi.org\/10.1109\/comst.2016.2532458","DOI":"10.1109\/comst.2016.2532458"},{"issue":"4","key":"47_CR5","doi-asserted-by":"publisher","first-page":"6417","DOI":"10.1109\/jiot.2019.2895136","volume":"6","author":"J Cui","year":"2019","unstructured":"Cui, J., Zhang, X., Zhong, H., Ying, Z., Liu, L.: RSMA: reputation system-based lightweight message authentication framework and protocol for 5G-enabled vehicular networks. IEEE Internet Things J. 6(4), 6417\u20136428 (2019). https:\/\/doi.org\/10.1109\/jiot.2019.2895136","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"47_CR6","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/jsac.2018.2815418","volume":"36","author":"J Ni","year":"2018","unstructured":"Ni, J., Lin, X., Shen, X.S.: Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE J. Sel. Areas Commun. 36(3), 644\u2013657 (2018). https:\/\/doi.org\/10.1109\/jsac.2018.2815418","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"5","key":"47_CR7","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/mcom.2017.1600951","volume":"55","author":"X Foukas","year":"2017","unstructured":"Foukas, X., Patounas, G., Elmokashfi, A., Marina, M.K.: Network slicing in 5G: survey and challenges. IEEE Commun. Mag. 55(5), 94\u2013100 (2017). https:\/\/doi.org\/10.1109\/mcom.2017.1600951","journal-title":"IEEE Commun. Mag."},{"issue":"5","key":"47_CR8","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/mic.2017.3481355","volume":"21","author":"X Li","year":"2017","unstructured":"Li, X., et al.: Network slicing for 5G: challenges and opportunities. IEEE Internet Comput. 21(5), 20\u201327 (2017). https:\/\/doi.org\/10.1109\/mic.2017.3481355","journal-title":"IEEE Internet Comput."},{"key":"47_CR9","unstructured":"Huawei 5G Security White Paper (2019). https:\/\/www-file.huawei.com\/-\/media\/corporate\/pdf\/trust-center\/huawei-5g-security-white-paper-4th.pdf"},{"key":"47_CR10","unstructured":"5G Americas: The evolution of Security in 5G (2019). https:\/\/www.5gamericas.org\/files\/4715\/6450\/22-67\/5G_Security_White_Paper_07-26-19_FINAL.pdf"},{"key":"47_CR11","unstructured":"Report on EU coordinated risk assessment of 5G (2019). https:\/\/ec.europa.eu\/comm-ission\/presscorner\/detail\/en\/IP_19_6049"},{"issue":"5","key":"47_CR12","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/mnet.011.1900635","volume":"34","author":"Y Sun","year":"2020","unstructured":"Sun, Y., Tian, Z., Li, M., Zhu, C., Guizani, N.: Automated attack and defense framework toward 5G security. IEEE Netw. 34(5), 247\u2013253 (2020). https:\/\/doi.org\/10.1109\/mnet.011.1900635","journal-title":"IEEE Netw."},{"key":"47_CR13","doi-asserted-by":"crossref","unstructured":"Shaik, A., Borgaonkar, R.: New Vulnerabilities in 5G Networks. Black Hat USA Conference (2019)","DOI":"10.2478\/popets-2019-0039"},{"key":"47_CR14","doi-asserted-by":"publisher","unstructured":"\u00d6zg\u00fcr, A., Erdem, H.: A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015. PeerJ Preprints-4:e1954v1 (2010). https:\/\/doi.org\/10.7287\/peerj.preprints.1954v1","DOI":"10.7287\/peerj.preprints.1954v1"},{"key":"47_CR15","doi-asserted-by":"crossref","unstructured":"Li, J., Zhao, Z., Li, R.: Machine learning-based IDS for software-defined 5G network. IET Netw. 7(2) (2017)","DOI":"10.1049\/iet-net.2017.0212"},{"key":"47_CR16","doi-asserted-by":"publisher","unstructured":"Wang, Y.: A Novel Intrusion Detection System Based on Advanced Naive Bayesian Classification. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 211. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-72823-0_53","DOI":"10.1007\/978-3-319-72823-0_53"},{"key":"47_CR17","doi-asserted-by":"crossref","unstructured":"Iwendi, C., Khan, S., Anajemba, J.H., Mittal, M., Alenezi, M., Alazab, M.: The use of ensemble models for multiple class and binary class classification for improving intrusion detection systems. Sensors 20, 2559 (2020)","DOI":"10.3390\/s20092559"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-75075-6_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,25]],"date-time":"2022-12-25T12:12:00Z","timestamp":1671970320000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-75075-6_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030750749","9783030750756"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-75075-6_47","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"27 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}