{"id":"https://openalex.org/W7138986541","doi":"https://doi.org/10.1109/globecom59602.2025.11432499","title":"Enhancing 6G Network Resilience through HORSE\u2019s LLM Agent-Based Security Mechanisms","display_name":"Enhancing 6G Network Resilience through HORSE\u2019s LLM Agent-Based Security Mechanisms","publication_year":2025,"publication_date":"2025-12-08","ids":{"openalex":"https://openalex.org/W7138986541","doi":"https://doi.org/10.1109/globecom59602.2025.11432499"},"language":null,"primary_location":{"id":"doi:10.1109/globecom59602.2025.11432499","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11432499","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129825221","display_name":"M. Danousis","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"M. Danousis","raw_affiliation_strings":["Eight Bells Ltd,Nicosia,Cyprus"],"affiliations":[{"raw_affiliation_string":"Eight Bells Ltd,Nicosia,Cyprus","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5118648704","display_name":"Alice Piemonti","orcid":null},"institutions":[{"id":"https://openalex.org/I4210114026","display_name":"Martel","ror":"https://ror.org/01gk6p474","country_code":"CH","type":"company","lineage":["https://openalex.org/I4210114026"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"A. Piemonti","raw_affiliation_strings":["Martel Innovate,Switzerland"],"affiliations":[{"raw_affiliation_string":"Martel Innovate,Switzerland","institution_ids":["https://openalex.org/I4210114026"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121257206","display_name":"Fabrizio Granelli","orcid":null},"institutions":[{"id":"https://openalex.org/I193223587","display_name":"University of Trento","ror":"https://ror.org/05trd4x28","country_code":"IT","type":"education","lineage":["https://openalex.org/I193223587"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"F. Granelli","raw_affiliation_strings":["CNIT / University of Trento,Trento,Italy"],"affiliations":[{"raw_affiliation_string":"CNIT / University of Trento,Trento,Italy","institution_ids":["https://openalex.org/I193223587"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121708532","display_name":"Xavier Masip-Bruin","orcid":null},"institutions":[{"id":"https://openalex.org/I9617848","display_name":"Universitat Polit\u00e8cnica de Catalunya","ror":"https://ror.org/03mb6wj31","country_code":"ES","type":"education","lineage":["https://openalex.org/I9617848"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"X. Masip-Bruin","raw_affiliation_strings":["CRAAX / Universitat Polit&#x00E8;cnica de Catalunya,Vilanova i la Geltr&#x00FA;,Barcelona,Spain"],"affiliations":[{"raw_affiliation_string":"CRAAX / Universitat Polit&#x00E8;cnica de Catalunya,Vilanova i la Geltr&#x00FA;,Barcelona,Spain","institution_ids":["https://openalex.org/I9617848"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002172806","display_name":"Eva Rodr\u00edguez","orcid":"https://orcid.org/0000-0001-5904-7039"},"institutions":[{"id":"https://openalex.org/I9617848","display_name":"Universitat Polit\u00e8cnica de Catalunya","ror":"https://ror.org/03mb6wj31","country_code":"ES","type":"education","lineage":["https://openalex.org/I9617848"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"E. Rodriguez","raw_affiliation_strings":["CRAAX / Universitat Polit&#x00E8;cnica de Catalunya,Vilanova i la Geltr&#x00FA;,Barcelona,Spain"],"affiliations":[{"raw_affiliation_string":"CRAAX / Universitat Polit&#x00E8;cnica de Catalunya,Vilanova i la Geltr&#x00FA;,Barcelona,Spain","institution_ids":["https://openalex.org/I9617848"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089578957","display_name":"Alessandro Carrega","orcid":"https://orcid.org/0000-0002-5944-7582"},"institutions":[{"id":"https://openalex.org/I4210099310","display_name":"Consorzio Nazionale Interuniversitario per le Telecomunicazioni","ror":"https://ror.org/0182a5n39","country_code":"IT","type":"funder","lineage":["https://openalex.org/I4210099310"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"A. Carrega","raw_affiliation_strings":["Inter-University Consortium for Telecommunications,CNIT - National,Genoa,Italy"],"affiliations":[{"raw_affiliation_string":"Inter-University Consortium for Telecommunications,CNIT - National,Genoa,Italy","institution_ids":["https://openalex.org/I4210099310"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130005491","display_name":"C. Skianis","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"C. Skianis","raw_affiliation_strings":["Eight Bells Ltd,Nicosia,Cyprus"],"affiliations":[{"raw_affiliation_string":"Eight Bells Ltd,Nicosia,Cyprus","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129854629","display_name":"E. Kafetzakis","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"E. Kafetzakis","raw_affiliation_strings":["Eight Bells Ltd,Nicosia,Cyprus"],"affiliations":[{"raw_affiliation_string":"Eight Bells Ltd,Nicosia,Cyprus","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5130114719","display_name":"I. Giannoulakis","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"I. Giannoulakis","raw_affiliation_strings":["Eight Bells Ltd,Nicosia,Cyprus"],"affiliations":[{"raw_affiliation_string":"Eight Bells Ltd,Nicosia,Cyprus","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5129825221"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.7940032,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"799","last_page":"804"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.48339998722076416,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.48339998722076416,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.0737999975681305,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.03889999911189079,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.6377000212669373},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.6033999919891357},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.49480000138282776},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.4932999908924103},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.40470001101493835},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.39430001378059387},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.38530001044273376},{"id":"https://openalex.org/keywords/trusted-computing-base","display_name":"Trusted computing base","score":0.34470000863075256}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6909999847412109},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6662999987602234},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.6377000212669373},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.6033999919891357},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.49480000138282776},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.4932999908924103},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.40470001101493835},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.39430001378059387},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.38530001044273376},{"id":"https://openalex.org/C147346212","wikidata":"https://www.wikidata.org/wiki/Q5492632","display_name":"Trusted computing base","level":4,"score":0.34470000863075256},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3379000127315521},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.3138999938964844},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.313400000333786},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.3125},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.3084999918937683},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.2955999970436096},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.2946999967098236},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.2720000147819519},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.26809999346733093},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.25920000672340393},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.2563000023365021},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.25519999861717224}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom59602.2025.11432499","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11432499","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W3206591284","https://openalex.org/W4223613659","https://openalex.org/W4363672396","https://openalex.org/W4390244836","https://openalex.org/W4390783469","https://openalex.org/W4392353733","https://openalex.org/W4399338566","https://openalex.org/W4400645908","https://openalex.org/W4401426188","https://openalex.org/W4407163436","https://openalex.org/W4409221558","https://openalex.org/W4409221663"],"related_works":[],"abstract_inverted_index":{"The":[0],"HORSE":[1,33],"(Holistic,":[2],"Omnipresent,":[3],"Resilient":[4],"Services":[5],"for":[6,124,163,179],"future":[7],"6G":[8,169],"wireless":[9],"and":[10,20,38,68,90,106,134,145,160,182],"computing":[11],"Ecosystems)":[12],"framework":[13],"integrates":[14],"AI":[15],"to":[16,109,120,140],"address":[17],"the":[18,36,98,110,118,122,164],"complexity":[19],"vulnerabilities":[21],"of":[22,32,40,114,138,168],"next-generation":[23],"networks.":[24,170],"This":[25,44,152],"paper":[26],"focuses":[27],"on":[28,175],"an":[29,66],"LLM-agent-based":[30],"subsystem":[31,45],"that":[34],"automates":[35,154],"creation":[37],"enforcement":[39],"security":[41,166],"mitigation":[42,74,150],"actions.":[43],"utilizes":[46],"a":[47,62,81,125],"specialized":[48],"Knowledge":[49],"Base":[50],"enriched":[51],"with":[52,128],"threat-mitigation":[53],"pairs":[54],"from":[55],"trusted":[56],"sources":[57],"like":[58],"MITRE":[59],"ATT&CK,":[60],"through":[61],"collaborative":[63],"workflow":[64],"between":[65],"LLM":[67,86,93,177],"human":[69,158],"expertise.":[70],"LLMs":[71,130],"translate":[72],"high-level":[73],"actions":[75],"into":[76],"executable":[77],"Ansible":[78],"commands,":[79,99],"while":[80,100],"feedback-driven":[82],"workflow,":[83],"powered":[84],"by":[85],"agents,":[87],"ensures":[88],"accuracy":[89,147],"reliability.":[91],"One":[92],"agent":[94],"(the":[95,102],"\"translator\")":[96],"generates":[97],"another":[101],"\"executor\")":[103],"executes":[104],"them":[105],"provides":[107],"feedback":[108],"translator":[111,119],"in":[112,142,148,185],"case":[113],"unsuccessful":[115],"execution,":[116],"allowing":[117],"refine":[121],"commands":[123],"retry.":[126],"Experiments":[127],"open-source":[129],"(like":[131],"Llama":[132],"2":[133],"Falcon)":[135],"demonstrate":[136],"rates":[137],"up":[139],"73%":[141],"execution":[143],"success,":[144],"high":[146],"translating":[149],"intentions.":[151],"approach":[153],"threat":[155],"mitigation,":[156],"reduces":[157],"intervention,":[159],"scales":[161],"effectively":[162],"dynamic":[165],"demands":[167],"Future":[171],"work":[172],"will":[173],"focus":[174],"enhancing":[176],"capabilities":[178],"complex":[180],"environments":[181],"improving":[183],"adaptability":[184],"cybersecurity":[186],"operations.":[187]},"counts_by_year":[],"updated_date":"2026-03-20T20:54:20.808490","created_date":"2026-03-20T00:00:00"}
