{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:07:15Z","timestamp":1764785235887,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T00:00:00Z","timestamp":1697587200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T00:00:00Z","timestamp":1697587200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,18]]},"DOI":"10.1109\/6gnet58894.2023.10317758","type":"proceedings-article","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T19:08:41Z","timestamp":1700507321000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["On the Security of 6G Use Cases: AI\/ML-specific Threat Modeling of All-Senses Meeting"],"prefix":"10.1109","author":[{"given":"Leyli","family":"Kara\u00e7ay","sequence":"first","affiliation":[{"name":"Ericsson Research,Turkey"}]},{"given":"Zakaria","family":"Laaroussi","sequence":"additional","affiliation":[{"name":"Ericsson Research,Finland"}]},{"given":"Sonika","family":"Ujjwal","sequence":"additional","affiliation":[{"name":"Ericsson Research,Finland"}]},{"given":"Elif Ustundag","family":"Soykan","sequence":"additional","affiliation":[{"name":"Ericsson Product Security,Sweden"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49033.2022.9700673"},{"key":"ref2","article-title":"Targets and requirements for 6G - initial E2E architecture","volume-title":"European Unions Horizon 2020 research and innovation programme, report","author":"K","year":"2022"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299098"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3323020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s22176662"},{"key":"ref6","article-title":"Threat modeling: a summary of available methods","volume-title":"Carnegie Mellon University Software Engineering Institute Pittsburgh United \u2026, Tech. Rep.","author":"Shevchenko","year":"2018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3478513.3480490"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.52953\/yrll3571"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900272"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917291"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-021-03476-5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2993803"},{"journal-title":"NVIDIA","article-title":"NVIDIA Announces Cloud-AI Video-Streaming Platform to Better Connect Millions Working and Studying Remotely","year":"2020","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.7296288"},{"volume-title":"Mpai community","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369505"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3091722"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00061"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103127"},{"key":"ref20","article-title":"AI CYBERSECURITY CHALLENGES,Threat Landscape for Artificial Intelligence","volume-title":"European Union Agency for Cybersecurity, ENISA, report","author":"B","year":"2020"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ai.100-2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3270101.3270102"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527917"},{"journal-title":"Industry Specification Group (ISG) Securing Artificial Intelligence (SAI)","first-page":"2020","article-title":"Securing Artificial Intelligence (SAI)","key":"ref26"},{"journal-title":"Evaluation of threat modeling methodologies","year":"2019","author":"Selin","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC53001.2021.9631425"},{"journal-title":"Microsoft","article-title":"Microsoft AI Security Risk Assessment, Best Practices and Guidance to Secure AI Systems","year":"2021","key":"ref29"},{"volume-title":"Ai and privacy: Everything you need to know about trust and technol-ogy","year":"2022","author":"Casella","key":"ref30"},{"volume-title":"Meta blows safety bubble around users after reports of sexual harassment","year":"2022","author":"Boyd","key":"ref31"},{"key":"ref32","article-title":"On the effectiveness of mitigating data poisoning attacks with gradient shaping","volume":"abs\/2002.11497","author":"Hong","year":"2020","journal-title":"ArXiv"},{"key":"ref33","article-title":"Exploiting machine learning to subvert your spam filter","volume-title":"USENIX Workshop on Large-Scale Exploits and Emergent Threats","author":"Nelson","year":"2008"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.AI.100-2e2023.ipd"},{"volume-title":"Deep learning","year":"2016","author":"Goodfellow","key":"ref35"},{"volume-title":"Owasp api security project","year":"2023","author":"Foundation","key":"ref36"}],"event":{"name":"2023 2nd International Conference on 6G Networking (6GNet)","start":{"date-parts":[[2023,10,18]]},"location":"Paris, France","end":{"date-parts":[[2023,10,20]]}},"container-title":["2023 2nd International Conference on 6G Networking (6GNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10317624\/10317637\/10317758.pdf?arnumber=10317758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,11]],"date-time":"2024-04-11T04:20:44Z","timestamp":1712809244000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10317758\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,18]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/6gnet58894.2023.10317758","relation":{},"subject":[],"published":{"date-parts":[[2023,10,18]]}}}