{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T11:41:11Z","timestamp":1761824471747},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,17]],"date-time":"2023-12-17T00:00:00Z","timestamp":1702771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,17]],"date-time":"2023-12-17T00:00:00Z","timestamp":1702771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,17]]},"DOI":"10.1109\/ants59832.2023.10469094","type":"proceedings-article","created":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T19:04:37Z","timestamp":1711393477000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Uncovering Network Vulnerabilities and Conducting Digital Forensics Analysis for IoT Device Security in 6G"],"prefix":"10.1109","author":[{"given":"Shams Tabrez","family":"Siddiqui","sequence":"first","affiliation":[{"name":"Jazan University,Department of Computer Science,Saudi Arabia,45142"}]},{"given":"Mohammad","family":"Shahid Kamal","sequence":"additional","affiliation":[{"name":"Jazan University,Department of Computer Science,Saudi Arabia,45142"}]},{"given":"Khalid Ali","family":"Qidwai","sequence":"additional","affiliation":[{"name":"Jazan University,Department of Computer Science,Saudi Arabia,45142"}]},{"given":"Md","family":"Imran Alam","sequence":"additional","affiliation":[{"name":"Jazan University,Department of Computer and Network Engineering,Saudi Arabia,45142"}]},{"given":"Haneef","family":"Khan","sequence":"additional","affiliation":[{"name":"Jazan University,Department of Computer and Network Engineering,Saudi Arabia,45142"}]},{"given":"Malik Zaib","family":"Alam","sequence":"additional","affiliation":[{"name":"Jazan University,Department of Computer and Network Engineering,Saudi Arabia,45142"}]},{"given":"Ishan","family":"Budhiraja","sequence":"additional","affiliation":[{"name":"Bennett University,School of Computer Science Engineering and Technology,Greater Noida,India"}]},{"given":"Sandeep","family":"Chintham","sequence":"additional","affiliation":[{"name":"SR University,School of Computer Science and Artificial Intelligence,Warangal,Telangana,India"}]}],"member":"263","reference":[{"article-title":"A comprehensive study on artificial intelligence algorithms to implement safety using communication technologies","year":"2022","author":"Inam","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-7615-5_64"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTCST54752.2022.9782014"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.03.006"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-5292-0_40"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246092"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2962586"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-17104-z"},{"article-title":"Digital forensics in the age of smart environments: A survey of recent advancements and challenges","year":"2023","author":"Alenezi","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2023.029053"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2022.021507"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5220\/0006332705390545"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2016.57"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.03.005"},{"article-title":"Iotdots: A digital forensics frame-work for smart environments","year":"2018","author":"Babun","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal\/jzac012"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/app12020730"},{"key":"ref18","article-title":"Task Offloading and Resource Allocation using Deep Reinforcement Learning","volume-title":"PhD thesis, Universit\u00e9 d\u2019Ottawa\/University of Ottawa","author":"Zhang","year":"2020"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913648"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.07.002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.48084\/etasr.6091"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT51360.2021.9595902"}],"event":{"name":"2023 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","start":{"date-parts":[[2023,12,17]]},"location":"Jaipur, India","end":{"date-parts":[[2023,12,20]]}},"container-title":["2023 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10468574\/10468669\/10469094.pdf?arnumber=10469094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T21:52:47Z","timestamp":1711489967000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10469094\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,17]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/ants59832.2023.10469094","relation":{},"subject":[],"published":{"date-parts":[[2023,12,17]]}}}