{"id":"https://openalex.org/W4376480844","doi":"https://doi.org/10.1109/wcnc55385.2023.10118732","title":"Feature Engineering and Machine Learning Pipeline for Detecting Radio Protocol-based Attacks","display_name":"Feature Engineering and Machine Learning Pipeline for Detecting Radio Protocol-based Attacks","publication_year":2023,"publication_date":"2023-03-01","ids":{"openalex":"https://openalex.org/W4376480844","doi":"https://doi.org/10.1109/wcnc55385.2023.10118732"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc55385.2023.10118732","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/wcnc55385.2023.10118732","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072224985","display_name":"Auwn Muhammad","orcid":null},"institutions":[{"id":"https://openalex.org/I1306339040","display_name":"Ericsson (Sweden)","ror":"https://ror.org/05a7rhx54","country_code":"SE","type":"company","lineage":["https://openalex.org/I1306339040"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Auwn Muhammad","raw_affiliation_strings":["Senior Data Scientist GAIA Ericsson,Stockholm,Sweden","Senior Data Scientist GAIA Ericsson, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"Senior Data Scientist GAIA Ericsson,Stockholm,Sweden","institution_ids":["https://openalex.org/I1306339040"]},{"raw_affiliation_string":"Senior Data Scientist GAIA Ericsson, Stockholm, Sweden","institution_ids":["https://openalex.org/I1306339040"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061840704","display_name":"Loay Abdelrazek","orcid":"https://orcid.org/0009-0003-2999-6999"},"institutions":[{"id":"https://openalex.org/I1306339040","display_name":"Ericsson (Sweden)","ror":"https://ror.org/05a7rhx54","country_code":"SE","type":"company","lineage":["https://openalex.org/I1306339040"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Loay Abdelrazek","raw_affiliation_strings":["Researcher Security Concepts Ericsson,Stockholm,Sweden","Researcher Security Concepts Ericsson, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"Researcher Security Concepts Ericsson,Stockholm,Sweden","institution_ids":["https://openalex.org/I1306339040"]},{"raw_affiliation_string":"Researcher Security Concepts Ericsson, Stockholm, Sweden","institution_ids":["https://openalex.org/I1306339040"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101850230","display_name":"Ikram Ullah","orcid":"https://orcid.org/0000-0002-2791-8773"},"institutions":[{"id":"https://openalex.org/I1306339040","display_name":"Ericsson (Sweden)","ror":"https://ror.org/05a7rhx54","country_code":"SE","type":"company","lineage":["https://openalex.org/I1306339040"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Ikram Ullah","raw_affiliation_strings":["Researcher SW Technology Ericsson,Stockholm,Sweden","Researcher SW Technology Ericsson, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"Researcher SW Technology Ericsson,Stockholm,Sweden","institution_ids":["https://openalex.org/I1306339040"]},{"raw_affiliation_string":"Researcher SW Technology Ericsson, Stockholm, Sweden","institution_ids":["https://openalex.org/I1306339040"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072224985"],"corresponding_institution_ids":["https://openalex.org/I1306339040"],"apc_list":null,"apc_paid":null,"fwci":0.3938,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.59436122,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"10","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7940757274627686},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7381680011749268},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.729219913482666},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5596719980239868},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.5364855527877808},{"id":"https://openalex.org/keywords/air-interface","display_name":"Air interface","score":0.4522349238395691},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4212472140789032},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.41922274231910706},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.35773733258247375},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3203551769256592},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.23687532544136047},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09085065126419067}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7940757274627686},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7381680011749268},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.729219913482666},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5596719980239868},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.5364855527877808},{"id":"https://openalex.org/C2776362087","wikidata":"https://www.wikidata.org/wiki/Q455112","display_name":"Air interface","level":3,"score":0.4522349238395691},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4212472140789032},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.41922274231910706},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.35773733258247375},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3203551769256592},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.23687532544136047},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09085065126419067},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc55385.2023.10118732","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/wcnc55385.2023.10118732","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1964726684","https://openalex.org/W2085027889","https://openalex.org/W2103448012","https://openalex.org/W2137898377","https://openalex.org/W2170102450","https://openalex.org/W2187089797","https://openalex.org/W2287724167","https://openalex.org/W2401686019","https://openalex.org/W2560021099","https://openalex.org/W2929535634","https://openalex.org/W3035125923","https://openalex.org/W3209426098","https://openalex.org/W4213009331","https://openalex.org/W6712994927","https://openalex.org/W7039235811"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W2765763546","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W4239662759","https://openalex.org/W2471811227","https://openalex.org/W2217591390","https://openalex.org/W2291202255"],"abstract_inverted_index":{"Air":[0],"interface":[1],"is":[2,39],"one":[3],"of":[4,15,18,36,52,64,85,122,155,160,162,166,172],"the":[5,13,50,89],"most":[6],"exposed":[7],"interfaces":[8],"in":[9,120,141,158],"cellular":[10],"networks":[11],"facing":[12],"possibility":[14],"a":[16,102],"variety":[17],"intentional":[19],"and":[20,46,60,101,116,125,140,164],"unintentional":[21],"attacks":[22,38,54,77,108,135,168],"that":[23,146],"can":[24],"be":[25],"caused":[26],"by":[27,97],"rogue,":[28],"compromised":[29],"or":[30],"misconfigured":[31],"devices.":[32],"Efficient":[33],"real-time":[34],"detection":[35],"such":[37,53,107],"an":[40],"indispensable":[41],"pre-step":[42],"for":[43,105],"proper":[44],"mitigation":[45],"response":[47],"to":[48,132],"minimize":[49],"impact":[51],"thus":[55],"keeping":[56],"RAN":[57,67],"operations":[58,63],"uninterrupted":[59],"ensuring":[61],"smooth":[62],"devices":[65],"using":[66],"services.In":[68],"this":[69],"paper,":[70],"we":[71,93],"take":[72],"two":[73],"control":[74,149],"plane":[75,150],"protocol-based":[76],"from":[78],"earlier":[79],"literature":[80],"which":[81],"aim":[82],"at":[83,136],"denial":[84],"service":[86],"(DoS)":[87],"over":[88],"air":[90],"interface.":[91],"Then":[92],"devise":[94],"features":[95,163],"used":[96],"machine":[98],"learning":[99],"algorithms":[100],"generic":[103,119],"pipeline":[104,117],"detecting":[106,167],"under":[109],"realistic":[110],"traffic":[111],"conditions.":[112],"Our":[113],"features,":[114],"methods":[115],"are":[118,130],"terms":[121,159],"radio":[123,143],"technology":[124],"attack":[126],"detection,":[127],"i.e.,":[128],"they":[129],"able":[131],"detect":[133],"DoS":[134],"different":[137,142,170],"protocol":[138],"layers":[139,171],"access":[144],"technologies":[145],"uses":[147],"similar":[148],"procedures.":[151],"We":[152],"show":[153],"performance":[154],"our":[156],"approach":[157],"robustness":[161],"accuracy":[165],"targeting":[169],"LTE":[173],"RAN.":[174]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-23T09:07:50.710637","created_date":"2025-10-10T00:00:00"}
