{"id":"https://openalex.org/W4402811472","doi":"https://doi.org/10.1109/csr61664.2024.10679434","title":"Emerging Trends in 5G Malicious Traffic Analysis: Enhancing Incremental Learning Intrusion Detection Strategies","display_name":"Emerging Trends in 5G Malicious Traffic Analysis: Enhancing Incremental Learning Intrusion Detection Strategies","publication_year":2024,"publication_date":"2024-09-02","ids":{"openalex":"https://openalex.org/W4402811472","doi":"https://doi.org/10.1109/csr61664.2024.10679434"},"language":"en","primary_location":{"id":"doi:10.1109/csr61664.2024.10679434","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr61664.2024.10679434","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100413108","display_name":"Zihao Wang","orcid":"https://orcid.org/0000-0003-4822-0486"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zihao Wang","raw_affiliation_strings":["Singapore Technologies Engineering Cybersecurity Strategic Technology Centre"],"affiliations":[{"raw_affiliation_string":"Singapore Technologies Engineering Cybersecurity Strategic Technology Centre","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059071970","display_name":"Kar Wai Fok","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kar Wai Fok","raw_affiliation_strings":["Singapore Technologies Engineering Cybersecurity Strategic Technology Centre"],"affiliations":[{"raw_affiliation_string":"Singapore Technologies Engineering Cybersecurity Strategic Technology Centre","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040321131","display_name":"Vrizlynn L. L. Thing","orcid":"https://orcid.org/0000-0003-4424-8596"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vrizlynn L. L. Thing","raw_affiliation_strings":["Singapore Technologies Engineering Cybersecurity Strategic Technology Centre"],"affiliations":[{"raw_affiliation_string":"Singapore Technologies Engineering Cybersecurity Strategic Technology Centre","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100413108"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7326,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.729322,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"114","last_page":"119"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6659489870071411},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6475784182548523},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.46708250045776367},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4032992422580719}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6659489870071411},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6475784182548523},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.46708250045776367},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4032992422580719}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr61664.2024.10679434","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr61664.2024.10679434","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2343448572","https://openalex.org/W2473930607","https://openalex.org/W2511212971","https://openalex.org/W2787940118","https://openalex.org/W2793130454","https://openalex.org/W2928842143","https://openalex.org/W2939745396","https://openalex.org/W2944046640","https://openalex.org/W2974442408","https://openalex.org/W3048779965","https://openalex.org/W3107568914","https://openalex.org/W3121886859","https://openalex.org/W3213111842","https://openalex.org/W4206912047","https://openalex.org/W4220985823","https://openalex.org/W4312693871","https://openalex.org/W4324007233","https://openalex.org/W6847209443"],"related_works":["https://openalex.org/W2392603527","https://openalex.org/W2390009783","https://openalex.org/W2348767155","https://openalex.org/W1513478798","https://openalex.org/W2388497169","https://openalex.org/W4283700121","https://openalex.org/W1496376327","https://openalex.org/W2357468538","https://openalex.org/W3120393658","https://openalex.org/W4300599821"],"abstract_inverted_index":{"The":[0,14,123],"popularity":[1],"of":[2,23,31,125],"5G":[3,24,36,42,86,121],"networks":[4,43],"poses":[5],"a":[6],"huge":[7],"challenge":[8],"for":[9,16,64,93,101,117],"malicious":[10,32,77],"traffic":[11,33,39,78,94,103,118],"detection":[12,79,104,119,135],"technology.":[13],"reason":[15],"this":[17,69],"is":[18,129],"that":[19,112],"as":[20],"the":[21,29,47,75,134,138,147],"use":[22],"technology":[25],"increases,":[26],"so":[27],"does":[28],"risk":[30],"activity":[34,40],"on":[35],"networks.":[37,87],"Malicious":[38],"in":[41,120,133],"not":[44],"only":[45],"has":[46],"potential":[48],"to":[49,55,85,97,114,142,145,150],"disrupt":[50],"communication":[51],"services,":[52],"but":[53],"also":[54],"compromise":[56],"sensitive":[57],"data.":[58],"This":[59],"can":[60],"have":[61],"serious":[62],"consequences":[63],"individuals":[65],"and":[66,73,82,131,137],"organizations.":[67],"In":[68],"paper,":[70],"we":[71,89,107],"analyze":[72],"discuss":[74],"latest":[76],"leveraging":[80],"AI":[81],"their":[83,99],"applicability":[84],"Next,":[88],"propose":[90],"seven":[91],"criteria":[92],"monitoring":[95],"datasets":[96],"confirm":[98],"suitability":[100],"future":[102],"studies.":[105],"Finally,":[106],"present":[108],"three":[109,148],"major":[110],"issues":[111],"need":[113],"be":[115,143],"addressed":[116],"environment.":[122],"concept":[124],"Incremental":[126],"Learning":[127],"techniques":[128],"proposed":[130],"applied":[132],"scenarios,":[136],"experimental":[139],"results":[140],"prove":[141],"able":[144],"solve":[146],"problems":[149],"some":[151],"extent.":[152]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
