{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T00:24:05Z","timestamp":1726273445786},"reference-count":7,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T00:00:00Z","timestamp":1722902400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T00:00:00Z","timestamp":1722902400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100005049","name":"Science and Engineering Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005049","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004489","name":"Mitacs","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004489","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,6]]},"DOI":"10.1109\/ccece59415.2024.10667216","type":"proceedings-article","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T17:42:46Z","timestamp":1726162966000},"page":"109-110","source":"Crossref","is-referenced-by-count":0,"title":["Developing \"Capture the Flag\" Challenges for 5G Cyber Security Training"],"prefix":"10.1109","author":[{"given":"Zhichuan","family":"Zhao","sequence":"first","affiliation":[{"name":"Algonquin College"}]},{"given":"Amina","family":"Shafo","sequence":"additional","affiliation":[{"name":"Algonquin College"}]},{"given":"Peiqi Wang","family":"Paige","sequence":"additional","affiliation":[{"name":"Algonquin College"}]},{"given":"Wynn","family":"Fenwick","sequence":"additional","affiliation":[{"name":"Cyber Security Architecture, TELUS"}]},{"given":"Wahab","family":"Almuhtadi","sequence":"additional","affiliation":[{"name":"Algonquin College"}]},{"given":"Jordan","family":"Melzer","sequence":"additional","affiliation":[{"name":"Broadband Access TELUS"}]}],"member":"263","reference":[{"volume-title":"What is 5G? emerging 5G Mobile Services and network requirements","author":"Yu","key":"ref1","doi-asserted-by":"crossref","DOI":"10.3390\/su9101848"},{"volume-title":"HITB GSEC","key":"ref2","article-title":"4G LTE man in the middle attacks with a hacked femtocell"},{"key":"ref3","article-title":"Securitygen telecom threats whitepaper 10 August V4"},{"article-title":"MITRE FiGHT: High-Level Overview MITRE Five-G Hierarchy of Threats (FiGHT)","year":"2023","author":"Mclean","key":"ref4"},{"volume-title":"Home","key":"ref5"},{"volume-title":"CTFd docs","key":"ref6"},{"volume-title":"Attacks on 5G infrastructure from users\u2019 devices","key":"ref7"}],"event":{"name":"2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)","start":{"date-parts":[[2024,8,6]]},"location":"Kingston, ON, Canada","end":{"date-parts":[[2024,8,9]]}},"container-title":["2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10667055\/10667056\/10667216.pdf?arnumber=10667216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T05:14:58Z","timestamp":1726204498000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10667216\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,6]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/ccece59415.2024.10667216","relation":{},"subject":[],"published":{"date-parts":[[2024,8,6]]}}}