{"id":"https://openalex.org/W7084069373","doi":"https://doi.org/10.1109/icc52391.2025.11162057","title":"AD-5GIoT: AI-Based Anomaly Detection System for 5G-IoT Networks","display_name":"AD-5GIoT: AI-Based Anomaly Detection System for 5G-IoT Networks","publication_year":2025,"publication_date":"2025-06-08","ids":{"openalex":"https://openalex.org/W7084069373","doi":"https://doi.org/10.1109/icc52391.2025.11162057"},"language":"en","primary_location":{"id":"doi:10.1109/icc52391.2025.11162057","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11162057","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Sandeep Pirbhulal","orcid":null},"institutions":[{"id":"https://openalex.org/I144648426","display_name":"Norwegian Computing Center","ror":"https://ror.org/02gm7te43","country_code":"NO","type":"nonprofit","lineage":["https://openalex.org/I144648426"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Sandeep Pirbhulal","raw_affiliation_strings":["Norwegian Computing Center,Department of Applied Research ICT (DART),Oslo,Norway,0314"],"affiliations":[{"raw_affiliation_string":"Norwegian Computing Center,Department of Applied Research ICT (DART),Oslo,Norway,0314","institution_ids":["https://openalex.org/I144648426"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Habtamu Abie","orcid":null},"institutions":[{"id":"https://openalex.org/I144648426","display_name":"Norwegian Computing Center","ror":"https://ror.org/02gm7te43","country_code":"NO","type":"nonprofit","lineage":["https://openalex.org/I144648426"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Habtamu Abie","raw_affiliation_strings":["Norwegian Computing Center,Department of Applied Research ICT (DART),Oslo,Norway,0314"],"affiliations":[{"raw_affiliation_string":"Norwegian Computing Center,Department of Applied Research ICT (DART),Oslo,Norway,0314","institution_ids":["https://openalex.org/I144648426"]}]},{"author_position":"last","author":{"id":null,"display_name":"Muhammad Muzammal","orcid":null},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Muhammad Muzammal","raw_affiliation_strings":["Computer and Information Sciences Northumbria University,Newcastle-upon-Tyne,United Kingdom,NE1 8ST"],"affiliations":[{"raw_affiliation_string":"Computer and Information Sciences Northumbria University,Newcastle-upon-Tyne,United Kingdom,NE1 8ST","institution_ids":["https://openalex.org/I32394136"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I144648426"],"apc_list":null,"apc_paid":null,"fwci":1.9415,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.9013732,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"3057","last_page":"3062"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T11310","display_name":"Connective tissue disorders research","score":0.1362999975681305,"subfield":{"id":"https://openalex.org/subfields/1311","display_name":"Genetics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T11310","display_name":"Connective tissue disorders research","score":0.1362999975681305,"subfield":{"id":"https://openalex.org/subfields/1311","display_name":"Genetics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T13273","display_name":"Knowledge Management in Higher Education","score":0.019099999219179153,"subfield":{"id":"https://openalex.org/subfields/3304","display_name":"Education"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12413","display_name":"Health and Medical Education","score":0.01640000008046627,"subfield":{"id":"https://openalex.org/subfields/3600","display_name":"General Health Professions"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7235999703407288},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5702999830245972},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4742000102996826},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.42329999804496765},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4214000105857849},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.41290000081062317},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.383899986743927},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.3707999885082245}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7235999703407288},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7135000228881836},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5702999830245972},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4754999876022339},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4742000102996826},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.42329999804496765},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4214000105857849},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.41290000081062317},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.40380001068115234},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39259999990463257},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.383899986743927},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3707999885082245},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.36320000886917114},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3449999988079071},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.3366999924182892},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2890999913215637},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.28839999437332153},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2777999937534332},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2696000039577484},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.262800008058548},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.25999999046325684},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.2563000023365021},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.25459998846054077}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc52391.2025.11162057","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11162057","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2007087405","https://openalex.org/W2810563447","https://openalex.org/W3116891228","https://openalex.org/W4226206258","https://openalex.org/W4297973913","https://openalex.org/W4303980519","https://openalex.org/W4324134785","https://openalex.org/W4360994061","https://openalex.org/W4366331238","https://openalex.org/W4387872076","https://openalex.org/W4393028251","https://openalex.org/W4399096410"],"related_works":[],"abstract_inverted_index":{"In":[0,55],"the":[1,13,96,104,118,121,189,193,200,203,209,212,227],"context":[2],"of":[3,98,120],"a":[4,157],"5G-IoT":[5,46,70,105,162],"communication":[6,106],"environment,":[7],"devices":[8],"and":[9,29,112,135,152,175,187],"users":[10],"interact":[11],"through":[12],"Internet,":[14],"exposing":[15],"them":[16,50],"to":[17,36,48],"numerous":[18],"anomalies":[19],"arising":[20],"from":[21],"diverse":[22],"cybersecurity":[23,97],"challenges":[24],"including":[25],"DDoS":[26],"attacks,":[27],"malware,":[28],"man-in-the-middle":[30],"attacks.":[31],"Consequently,":[32],"it":[33,222],"is":[34],"essential":[35],"develop":[37],"robust":[38],"anomaly":[39,114,163,242],"detection":[40,164],"(AD)":[41],"solutions":[42],"specifically":[43,73],"designed":[44,72],"for":[45,69,74,171,208,235],"applications":[47],"safeguard":[49],"against":[51],"these":[52],"cyber":[53],"threats.":[54],"this":[56],"study,":[57],"we":[58,124],"propose":[59],"an":[60,108,113],"AI-based":[61],"AD":[62,87,110],"system":[63,88,165,229],"that":[64,182,226],"utilizes":[65],"real-time":[66,145,239],"traffic":[67],"data":[68],"networks,":[71],"critical":[75],"sectors":[76],"such":[77],"as":[78],"healthcare,":[79],"smart":[80],"grid,":[81],"industry":[82],"4.0,":[83],"etc.":[84],"The":[85,161,179],"proposed":[86,122,228],"comprises":[89],"three":[90],"synchronized":[91],"components":[92,102],"aimed":[93],"at":[94,217],"enhancing":[95],"5G-enabled":[99],"systems.":[100],"These":[101,140],"include":[103],"infrastructure,":[107],"AI-enabled":[109],"engine,":[111],"dashboard.":[115],"To":[116],"evaluate":[117],"performance":[119],"system,":[123],"conducted":[125],"experiments":[126,141],"using":[127,168,188,230],"two":[128],"AI":[129],"models:":[130],"Graph":[131],"Neural":[132,137],"Network":[133,138],"(GNN)":[134],"Convolutional":[136],"(CNN).":[139],"were":[142],"performed":[143],"on":[144],"5G":[146,158,240],"data,":[147],"which":[148],"included":[149],"both":[150],"benign":[151,201],"malicious":[153,210],"traffic,":[154],"generated":[155],"over":[156],"wireless":[159],"network.":[160],"was":[166,197,205,214],"evaluated":[167],"feature":[169],"subsets,":[170],"<tex":[172,176,184],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[173,177,185],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$k=10$</tex>":[174,186],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$k=25$</tex>.":[178],"results":[180,234],"showed":[181],"with":[183],"GNN":[190,231],"learning":[191],"model,":[192],"overall":[194],"accuracy":[195],"achieved":[196],"99.19%.":[198],"For":[199],"case,":[202,211],"precision":[204,213],"98.86%,":[206],"while":[207],"even":[215],"higher":[216],"99.71%.":[218],"From":[219],"our":[220],"analysis,":[221],"can":[223],"be":[224],"concluded":[225],"demonstrates":[232],"promising":[233],"binary":[236],"classification":[237],"in":[238],"-IoT":[241],"detection.":[243]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
