<doi_batch xmlns="http://www.crossref.org/schema/4.4.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" version="4.4.0"><head><doi_batch_id>d9860bfa-e4a0-4968-96b8-e235ee9f79b0</doi_batch_id><timestamp>20250414080152883</timestamp><depositor><depositor_name>wseas:wseas</depositor_name><email_address>mdt@crossref.org</email_address></depositor><registrant>MDT Deposit</registrant></head><body><journal><journal_metadata language="en"><full_title>WSEAS TRANSACTIONS ON COMMUNICATIONS</full_title><issn media_type="electronic">2224-2864</issn><issn media_type="print">1109-2742</issn><archive_locations><archive name="Portico"/></archive_locations><doi_data><doi>10.37394/23204</doi><resource>http://wseas.org/wseas/cms.action?id=4021</resource></doi_data></journal_metadata><journal_issue><publication_date media_type="online"><month>3</month><day>18</day><year>2025</year></publication_date><publication_date media_type="print"><month>3</month><day>18</day><year>2025</year></publication_date><journal_volume><volume>24</volume><doi_data><doi>10.37394/23204.2025.24</doi><resource>https://wseas.com/journals/communications/2025.php</resource></doi_data></journal_volume></journal_issue><journal_article language="en"><titles><title>Contemporary Network Slicing Security</title></titles><contributors><person_name sequence="first" contributor_role="author"><given_name>Zoran</given_name><surname>Milicevic</surname><affiliation>Telecommunications and Information Technology, Directorate GS of SAF, 11000 Belgrade, REPUBLIC OF SERBIA</affiliation></person_name><person_name sequence="additional" contributor_role="author"><given_name>Zoran</given_name><surname>Bojkovic</surname><affiliation>University of Belgrade, Studentski trg 1, 11000 Belgrade, REPUBLIC OF SERBIA</affiliation></person_name></contributors><jats:abstract xmlns:jats="http://www.ncbi.nlm.nih.gov/JATS1"><jats:p>Security slicing in contemporary networks is a powerful tool that can serve operators to deliver a more secure, reliable, and efficient network extension. In order to ensure secure deployment and implementation, it is necessary to build a corresponding security framework that contains security threats, requirements, and recommendations. On the other hand, by segmenting the network, operators can allocate resources more effectively and provide a more customized and optimal experience for users. This work illustrates contemporary network slicing security. After an introductory presentation, an illustration of security considerations in contemporary network slicing security is provided. The next two sessions addressed for the influence of artificial intelligence and security closed-loop automation. Further, the role of future research consideration together with operated achievements are demonstrated. The final session referred to concluding remarks.</jats:p></jats:abstract><publication_date media_type="online"><month>4</month><day>14</day><year>2025</year></publication_date><publication_date media_type="print"><month>4</month><day>14</day><year>2025</year></publication_date><pages><first_page>7</first_page><last_page>10</last_page></pages><publisher_item><item_number item_number_type="article_number">2</item_number></publisher_item><ai:program xmlns:ai="http://www.crossref.org/AccessIndicators.xsd" name="AccessIndicators"><ai:free_to_read start_date="2025-04-14"/><ai:license_ref applies_to="am" start_date="2025-04-14">https://wseas.com/journals/communications/2025/a045104-002(2025).pdf</ai:license_ref></ai:program><archive_locations><archive name="Portico"/></archive_locations><doi_data><doi>10.37394/23204.2025.24.2</doi><resource>https://wseas.com/journals/communications/2025/a045104-002(2025).pdf</resource></doi_data><citation_list><citation key="ref0"><doi>10.1109/comst.2023.3312349</doi><unstructured_citation>C. De Alwis, P. Porambage, K. Dev, T. R. Gadekallu, M. Liyanage, A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions, IEEE Communications Surveys &amp; Tutorials, vol. 26, is. 1, 2024, pp. 534-570. https://doi.org/10.1109/COMST.2023.33123 49. </unstructured_citation></citation><citation key="ref1"><unstructured_citation>Z. Bojkovic, Z. Milicevic, D. Milovanovic, Next Generation of Cellular Networks, in Proceedings of the 15th WSEAS International Conference on Communications (Part of the 15th WSEAS CSCC Multiconference) and the 5th International Conference on Communications and Information Technology (CIT '11), pp. 233-239, Corfu Island, Greece, July 14-17, 2011. </unstructured_citation></citation><citation key="ref2"><doi>10.1109/access.2020.2975072</doi><unstructured_citation>L. U. Khan, I. Yaqoob, N. H. Tran, Z. Han, C. S. Hong, Network Slicing: Recent Advances, Taxonomy, Requirements, and Open Research Challenges, IEEE Access, vol. 8, 2020, pp. 36009-36028. Available at: https://doi.org/10.1109/ACCESS.2020.29750 72. </unstructured_citation></citation><citation key="ref3"><doi>10.1109/mnet.001.1900287</doi><unstructured_citation>W. Saad, M. Bennis, M. Chen, A Vision of 6G Wireless Systems: Applications, Trends, Technologies, and Open Research Problems, IEEE Networks, vol. 34, no. 3, 2020, pp.134- 142. https://doi.org/10.1109/MNET.001.1900287. </unstructured_citation></citation><citation key="ref4"><doi>10.1109/mnet.111.2100322</doi><unstructured_citation>H. Chergui, L. Blanco, L. A. Garrido, K. Ramantas, S. Kukliński, A. Ksentini, ZeroTouch AI-Driven Distributed Management for Energy-Efficient 6G Massive Network Slicing, IEEE Network, vo. 35, is. 6, 2021, pp. 43-49. https://doi.org/10.1109/MNET.111.2100322. </unstructured_citation></citation><citation key="ref5"><doi>10.1109/comst.2019.2933899</doi><unstructured_citation>R. Khan, P. Kumar, D.N.K. Jayakody, M. Liyanage, A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions, IEEE Communications Surveys and Tutorials, vol. 22, no. 1, 2020, pp.196-248. https://doi.org/10.1109/COMST.2019.29338 99. </unstructured_citation></citation><citation key="ref6"><unstructured_citation>3GPP, Study on management and orchestration of network slicing for next generation network, Technical Specification, 2017, [Online]. https://portal.3gpp.org/desktopmodules/Speci fications/SpecificationDetails.aspx?specificat ionId=3091 (February 15, 2025). </unstructured_citation></citation><citation key="ref7"><doi>10.1109/access.2018.2828102</doi><unstructured_citation>S. Wang, Y. Hu, N. Zhang, Y. Liu, A Survey on Service Migration in Mobile Edge Computing, IEEE Access, vol. 6, 2018, pp.23511-23528. https://doi.org/10.1109/ACCESS.2018.28281 02. </unstructured_citation></citation><citation key="ref8"><doi>10.1109/mnet.011.2000088</doi><unstructured_citation>Ch. Benzaid, T. Taleb, AI for Beyond 5G Networks: A Cyber-Security Defense of Offense Enabler, IEEE Networks, vol. 34, no. 6, 2020, pp.140-147. https://doi.org/10.1109/MNET.011.2000088. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>V. Chandola, A. Banerjee, V. Kumar, Anomaly Detection: A Survey, ACM Computing Surveys (CSUR), vol. 41, no. 3, 2009, pp.1-58. https://doi.org/10.1145/1541880.1541882.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>