{"id":"https://openalex.org/W2518732756","doi":"https://doi.org/10.1007/978-3-319-45931-8_5","title":"Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments","display_name":"Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2518732756","doi":"https://doi.org/10.1007/978-3-319-45931-8_5","mag":"2518732756"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-45931-8_5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-45931-8_5","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.brighton.ac.uk/en/publications/89541a92-b6e9-404c-93df-7a635d158497","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078727644","display_name":"Vassilios G. Vassilakis","orcid":"https://orcid.org/0000-0003-4902-8226"},"institutions":[{"id":"https://openalex.org/I177463362","display_name":"University of West London","ror":"https://ror.org/03e5mzp60","country_code":"GB","type":"education","lineage":["https://openalex.org/I177463362"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Vassilios Vassilakis","raw_affiliation_strings":["School of Computing and Engineering, University of West London, London, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing and Engineering, University of West London, London, UK","institution_ids":["https://openalex.org/I177463362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090517118","display_name":"Emmanouil Panaousis","orcid":null},"institutions":[{"id":"https://openalex.org/I71637028","display_name":"University of Brighton","ror":"https://ror.org/04kp2b655","country_code":"GB","type":"education","lineage":["https://openalex.org/I71637028"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Emmanouil Panaousis","raw_affiliation_strings":["Secure and Dependable Software Systems Research Cluster, School of Computing, Engineering, and Mathematics, University of Brighton, Brighton, UK"],"affiliations":[{"raw_affiliation_string":"Secure and Dependable Software Systems Research Cluster, School of Computing, Engineering, and Mathematics, University of Brighton, Brighton, UK","institution_ids":["https://openalex.org/I71637028"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014613493","display_name":"Haralambos Mouratidis","orcid":"https://orcid.org/0000-0002-2599-0712"},"institutions":[{"id":"https://openalex.org/I71637028","display_name":"University of Brighton","ror":"https://ror.org/04kp2b655","country_code":"GB","type":"education","lineage":["https://openalex.org/I71637028"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Haralambos Mouratidis","raw_affiliation_strings":["Secure and Dependable Software Systems Research Cluster, School of Computing, Engineering, and Mathematics, University of Brighton, Brighton, UK"],"affiliations":[{"raw_affiliation_string":"Secure and Dependable Software Systems Research Cluster, School of Computing, Engineering, and Mathematics, University of Brighton, Brighton, UK","institution_ids":["https://openalex.org/I71637028"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5078727644"],"corresponding_institution_ids":["https://openalex.org/I177463362"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":3.7539,"has_fulltext":true,"cited_by_count":14,"citation_normalized_percentile":{"value":0.93307142,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"70","last_page":"84"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8138085603713989},{"id":"https://openalex.org/keywords/mobile-edge-computing","display_name":"Mobile edge computing","score":0.6044814586639404},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5397136807441711},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5295827388763428},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4550931453704834},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.44915854930877686},{"id":"https://openalex.org/keywords/standardization","display_name":"Standardization","score":0.44626376032829285},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.3256646394729614},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.27108320593833923},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2536065876483917},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.12755876779556274}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8138085603713989},{"id":"https://openalex.org/C2776061582","wikidata":"https://www.wikidata.org/wiki/Q25325231","display_name":"Mobile edge computing","level":3,"score":0.6044814586639404},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5397136807441711},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5295827388763428},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4550931453704834},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.44915854930877686},{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.44626376032829285},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.3256646394729614},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.27108320593833923},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2536065876483917},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.12755876779556274},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-319-45931-8_5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-45931-8_5","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.atira.dk:openaire/89541a92-b6e9-404c-93df-7a635d158497","is_oa":true,"landing_page_url":"https://research.brighton.ac.uk/en/publications/89541a92-b6e9-404c-93df-7a635d158497","pdf_url":null,"source":{"id":"https://openalex.org/S4306401758","display_name":"University of Brighton Repository (University of Brighton)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I71637028","host_organization_name":"University of Brighton","host_organization_lineage":["https://openalex.org/I71637028"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Vassilakis, V, Panaousis, E & Mouratidis, H 2016, Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments. in 10th WISTP International Conference on Information Security Theory and Practice.. vol. 9895, Lecture notes in computer science, Springer International Publishing, Heraklion, Crete, pp. 70-84, 10th WISTP International Conference on Information Security Theory and Practice., 17/09/16. https://doi.org/10.1007/978-3-319-45931-8_5","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:repository.uwl.ac.uk:2812","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402477","display_name":"UWL Repository (University of West London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177463362","host_organization_name":"University of West London","host_organization_lineage":["https://openalex.org/I177463362"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"},{"id":"pmh:oai:HAL:hal-01639606v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01639606","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.70-84, &#x27E8;10.1007/978-3-319-45931-8_5&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:openaire/89541a92-b6e9-404c-93df-7a635d158497","is_oa":true,"landing_page_url":"https://research.brighton.ac.uk/en/publications/89541a92-b6e9-404c-93df-7a635d158497","pdf_url":null,"source":{"id":"https://openalex.org/S4306401758","display_name":"University of Brighton Repository (University of Brighton)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I71637028","host_organization_name":"University of Brighton","host_organization_lineage":["https://openalex.org/I71637028"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Vassilakis, V, Panaousis, E & Mouratidis, H 2016, Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments. in 10th WISTP International Conference on Information Security Theory and Practice.. vol. 9895, Lecture notes in computer science, Springer International Publishing, Heraklion, Crete, pp. 70-84, 10th WISTP International Conference on Information Security Theory and Practice., 17/09/16. https://doi.org/10.1007/978-3-319-45931-8_5","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6200000047683716}],"awards":[{"id":"https://openalex.org/G7610491536","display_name":null,"funder_award_id":"671596","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"}],"funders":[{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":61,"referenced_works":["https://openalex.org/W71050201","https://openalex.org/W1518997209","https://openalex.org/W1520462871","https://openalex.org/W1529728259","https://openalex.org/W1538843860","https://openalex.org/W1585635625","https://openalex.org/W1597397489","https://openalex.org/W1605172130","https://openalex.org/W1788574667","https://openalex.org/W1892766306","https://openalex.org/W1969068463","https://openalex.org/W1975321924","https://openalex.org/W1994080576","https://openalex.org/W2019672983","https://openalex.org/W2022292029","https://openalex.org/W2028170982","https://openalex.org/W2029090942","https://openalex.org/W2029693536","https://openalex.org/W2039881954","https://openalex.org/W2041659077","https://openalex.org/W2043185944","https://openalex.org/W2050542575","https://openalex.org/W2052190282","https://openalex.org/W2054876181","https://openalex.org/W2058189720","https://openalex.org/W2070775894","https://openalex.org/W2075191163","https://openalex.org/W2075435357","https://openalex.org/W2078050139","https://openalex.org/W2084564831","https://openalex.org/W2089194229","https://openalex.org/W2101177960","https://openalex.org/W2103063389","https://openalex.org/W2103972037","https://openalex.org/W2108296824","https://openalex.org/W2109026747","https://openalex.org/W2115394282","https://openalex.org/W2118720406","https://openalex.org/W2141077315","https://openalex.org/W2142246654","https://openalex.org/W2152394933","https://openalex.org/W2154126105","https://openalex.org/W2169006963","https://openalex.org/W2182572409","https://openalex.org/W2225196063","https://openalex.org/W2261800831","https://openalex.org/W2279313530","https://openalex.org/W2290739658","https://openalex.org/W2322092270","https://openalex.org/W2334656836","https://openalex.org/W2376101370","https://openalex.org/W2397986719","https://openalex.org/W2465767253","https://openalex.org/W2474721701","https://openalex.org/W2476834934","https://openalex.org/W2486925709","https://openalex.org/W2506048546","https://openalex.org/W2523814156","https://openalex.org/W2539572905","https://openalex.org/W4247267706","https://openalex.org/W4302132416"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W2378767206","https://openalex.org/W1590307681","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703"],"abstract_inverted_index":{"Research":[0],"on":[1,42,185,193],"next-generation":[2],"5G":[3,19,35,89,162,177],"wireless":[4],"networks":[5],"is":[6,31,111,121,137],"currently":[7],"attracting":[8],"a":[9,77,85,100,144,150,169],"lot":[10],"of":[11,68,81,103,116,131,146,155,158,161,175,195],"attention":[12],"in":[13,88],"both":[14],"academia":[15],"and":[16,21,51,56,97,134,152,187,198],"industry.":[17],"While":[18],"development":[20,174],"standardization":[22],"activities":[23],"are":[24,37],"still":[25],"at":[26,128],"their":[27],"early":[28],"stage,":[29],"it":[30],"widely":[32],"acknowledged":[33],"that":[34,142],"systems":[36],"going":[38],"to":[39,113,124,148],"extensively":[40],"rely":[41],"dense":[43],"small":[44,82],"cell":[45,83],"deployments,":[46],"which":[47],"would":[48],"exploit":[49],"infrastructure":[50],"network":[52,59,62],"functions":[53],"virtualization":[54],"(NFV),":[55],"push":[57],"the":[58,66,93,108,114,122,129,139,173],"intelligence":[60],"towards":[61,172],"edges":[63],"by":[64],"embracing":[65],"concept":[67],"mobile":[69],"edge":[70],"computing":[71],"(MEC).":[72],"As":[73,105],"security":[74,126,156,178],"will":[75,181],"be":[76],"fundamental":[78],"enabling":[79],"factor":[80],"as":[84,107,168,190,192],"service":[86],"(SCaaS)":[87],"networks,":[90],"we":[91],"present":[92],"most":[94],"prominent":[95],"threats":[96],"vulnerabilities":[98],"against":[99],"broad":[101],"range":[102],"targets.":[104],"far":[106],"related":[109],"work":[110],"concerned,":[112],"best":[115],"our":[117],"knowledge,":[118],"this":[119],"paper":[120,141],"first":[123,140],"investigate":[125],"challenges":[127,157],"intersection":[130],"SCaaS,":[132],"NFV,":[133],"MEC.":[135],"It":[136],"also":[138],"proposes":[143],"set":[145],"criteria":[147],"facilitate":[149],"clear":[151],"effective":[153],"taxonomy":[154],"main":[159],"elements":[160],"networks.":[163],"Our":[164],"analysis":[165],"can":[166],"serve":[167],"staring":[170],"point":[171],"appropriate":[176],"solutions.":[179],"These":[180],"have":[182],"crucial":[183],"effect":[184],"legal":[186],"regulatory":[188],"frameworks":[189],"well":[191],"decisions":[194],"businesses,":[196],"governments,":[197],"end-users.":[199]},"counts_by_year":[{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
