{"id":"https://openalex.org/W4400727641","doi":"https://doi.org/10.1109/iwcmc61514.2024.10592385","title":"Synergistic Solution: IDS and Scheduler Harmony for Secure 5G Radio Resources","display_name":"Synergistic Solution: IDS and Scheduler Harmony for Secure 5G Radio Resources","publication_year":2024,"publication_date":"2024-05-27","ids":{"openalex":"https://openalex.org/W4400727641","doi":"https://doi.org/10.1109/iwcmc61514.2024.10592385"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc61514.2024.10592385","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc61514.2024.10592385","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030874737","display_name":"Saloua Hendaoui","orcid":"https://orcid.org/0000-0003-4188-1759"},"institutions":[{"id":"https://openalex.org/I199702508","display_name":"Al Jouf University","ror":"https://ror.org/02zsyt821","country_code":"SA","type":"education","lineage":["https://openalex.org/I199702508"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Saloua Hendaoui","raw_affiliation_strings":["Jouf University,College of Computer and Information Sciences,Department of Computer Science,Sakaka,KSA"],"affiliations":[{"raw_affiliation_string":"Jouf University,College of Computer and Information Sciences,Department of Computer Science,Sakaka,KSA","institution_ids":["https://openalex.org/I199702508"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085523963","display_name":"Fatma Hendaoui","orcid":"https://orcid.org/0000-0003-1225-8642"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fatma Hendaoui","raw_affiliation_strings":["University of Ha&#x2019;il,Applied College,Department of Computer Science,HA&#x2019;il,KSA"],"affiliations":[{"raw_affiliation_string":"University of Ha&#x2019;il,Applied College,Department of Computer Science,HA&#x2019;il,KSA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5030874737"],"corresponding_institution_ids":["https://openalex.org/I199702508"],"apc_list":null,"apc_paid":null,"fwci":0.3653,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58926249,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"679","last_page":"684"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9441999793052673,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9441999793052673,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9081000089645386,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9049000144004822,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6834753751754761},{"id":"https://openalex.org/keywords/harmony","display_name":"Harmony (color)","score":0.528363049030304},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5153774619102478},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44609126448631287},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35471242666244507}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6834753751754761},{"id":"https://openalex.org/C2776453491","wikidata":"https://www.wikidata.org/wiki/Q5659234","display_name":"Harmony (color)","level":2,"score":0.528363049030304},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5153774619102478},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44609126448631287},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35471242666244507},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc61514.2024.10592385","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc61514.2024.10592385","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W3023316635","https://openalex.org/W3033113800","https://openalex.org/W3105262431","https://openalex.org/W3118681468","https://openalex.org/W3134111902","https://openalex.org/W3137135908","https://openalex.org/W3179251479","https://openalex.org/W3180633835","https://openalex.org/W3204567362","https://openalex.org/W4206095692","https://openalex.org/W4297973913","https://openalex.org/W4309939034","https://openalex.org/W4310746777","https://openalex.org/W4313201398","https://openalex.org/W4323851591","https://openalex.org/W4386473332","https://openalex.org/W4387556984","https://openalex.org/W6847209443"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4321448422","https://openalex.org/W2382969832","https://openalex.org/W2348535019","https://openalex.org/W963778612","https://openalex.org/W2376836472","https://openalex.org/W2379879936","https://openalex.org/W2388675254","https://openalex.org/W620586615"],"abstract_inverted_index":{"The":[0,21,85],"diverse":[1],"range":[2],"of":[3,18,23,37,57,74,87,192,201,212,226,234,245],"applications":[4,238],"in":[5,47,71,135,168],"5G":[6,155],"networks":[7,195,248],"introduces":[8],"novel":[9,139],"security":[10,31,100,189,242],"challenges,":[11],"particularly":[12],"due":[13],"to":[14,29,69,109,153,182],"the":[15,44,61,72,123,162,188,216,232,241],"high":[16,220],"volume":[17],"transmitted":[19],"packets.":[20],"proliferation":[22],"devices":[24,92],"also":[25],"increases":[26],"their":[27,95],"vulnerability":[28],"various":[30],"threats.":[32,252],"Among":[33],"these,":[34],"Distributed":[35],"Denial":[36],"Service":[38],"(DDoS)":[39],"attacks":[40,52],"stand":[41],"out":[42],"as":[43,205],"most":[45],"common":[46],"5":[48,193,246],"G":[49,194,247],"environments.":[50],"Such":[51],"create":[53],"a":[54,138,143,147,183,224],"single":[55],"point":[56],"failure":[58],"by":[59],"overwhelming":[60],"central":[62],"base":[63],"station":[64],"with":[65,215],"malicious":[66],"traffic,":[67],"leading":[68],"degradation":[70],"quality":[73,233],"service":[75,235],"for":[76,236],"critical":[77],"applications,":[78],"especially":[79],"those":[80],"reliant":[81],"on":[82],"realtime":[83],"responsiveness.":[84],"inundation":[86],"suspicious":[88,116],"traffic":[89,117],"hampers":[90],"legitimate":[91,171],"from":[93],"fulfilling":[94],"tasks":[96],"effectively.":[97],"While":[98],"traditional":[99],"measures,":[101],"including":[102],"Intrusion":[103],"Detection":[104],"Systems":[105],"(IDS),":[106],"are":[107],"deployed":[108],"mitigate":[110],"these":[111],"threats,":[112],"they":[113],"often":[114],"detect":[115],"only":[118],"after":[119],"it":[120],"has":[121],"reached":[122],"scheduler":[124],"and":[125,146,172,178,190,207,223,239,243],"resource":[126],"allocation":[127],"process.":[128],"To":[129],"address":[130],"this":[131,136],"limitation,":[132],"we":[133],"propose":[134],"paper":[137],"architecture":[140,164],"which":[141],"integrates":[142],"filtering":[144,176],"block":[145],"Radio":[148],"Resource":[149],"Allocation":[150],"Block":[151],"(RRAB)":[152],"safeguard":[154],"radio":[156],"resources.":[157],"By":[158],"employing":[159],"unsupervised":[160],"learning,":[161],"proposed":[163],"exhibits":[165],"promising":[166],"results":[167],"distinguishing":[169],"between":[170],"illegitimate":[173],"devices.":[174],"Enhanced":[175],"mechanisms":[177],"prioritization":[179],"tools":[180],"contribute":[181],"comprehensive":[184,229],"mitigation":[185],"strategy,":[186],"bolstering":[187],"resilience":[191,244],"against":[196,249],"evolving":[197,250],"cyber":[198,251],"threats.The":[199],"implementation":[200],"clustering":[202],"models,":[203],"such":[204],"K-means":[206],"DBSCAN,":[208],"effectively":[209],"identifies":[210],"patterns":[211],"unauthorized":[213],"usage,":[214],"DBSCAN":[217],"model":[218],"achieving":[219],"homogeneity":[221],"(0.3161)":[222],"V-measure":[225],"0.2245.":[227],"This":[228],"approach":[230],"improves":[231],"delay-sensitive":[237],"bolsters":[240]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
