{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:10:37Z","timestamp":1755925837138,"version":"3.44.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/coins65080.2025.11125746","type":"proceedings-article","created":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T23:57:49Z","timestamp":1755907069000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Exploiting DCI Leakage: A Stealthy 5G Uplink Jamming Attack Using Compromised UE"],"prefix":"10.1109","author":[{"given":"Rosolino","family":"Alaimo","sequence":"first","affiliation":[{"name":"University of Palermo,Palermo,Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ilenia","family":"Tinnirello","sequence":"additional","affiliation":[{"name":"University of Palermo,Palermo,Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Domenico","family":"Garlisi","sequence":"additional","affiliation":[{"name":"University of Palermo,Palermo,Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.001.2000069"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8814364"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3019724"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2016.7880885"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2907970"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.001.1900048"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2846040"},{"key":"ref9","article-title":"Undercover disruption: Stealth jamming attacks on 5g synchronization stages","volume-title":"Proceedings of ITASEC-2025","author":"Alaimo"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417437"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2569083"},{"key":"ref16","article-title":"Etsi ts 138 211: Nr; physical channels and modulation","volume-title":"Tech. Rep. 15.02.00, ETSI, 2015. Versione ETSI TS 138211 V15.02.00"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403769"},{"key":"ref20","article-title":"TS 38.300 - NR; NR and NG-RAN Overall Description","year":"2024"},{"key":"ref21","article-title":"Ts 38.321 \u2013 NR; medium access control (MAC) protocol specification","year":"2024"},{"key":"ref22","article-title":"Etsi ts 36.212:: Lte; multiplexing and channel coding","volume-title":"Tech. Rep. 15.2.1, ETSI, 2018. Versione ETSI TS 36.212 V15.2.1"},{"key":"ref23","article-title":"Ltesniffer","year":"2023"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107143"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA61755.2024.10710725"},{"key":"ref26","article-title":"Open5gs","year":"2024"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit60053.2024.10597086"},{"key":"ref30","article-title":"Etsi ts 138 331: Nr; radio resource control","journal-title":"Tech. Rep. 15.3.0, ETSI, 2018. Versione ETSI TS 138331 V15.3.0"},{"key":"ref31","article-title":"iperf3 user documentation"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref33","article-title":"Ts 138.214"}],"event":{"name":"2025 IEEE International Conference on Omni-layer Intelligent Systems (COINS)","location":"Madison, WI, USA","start":{"date-parts":[[2025,8,4]]},"end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Omni-layer Intelligent Systems (COINS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11125678\/11125719\/11125746.pdf?arnumber=11125746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T04:46:32Z","timestamp":1755924392000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11125746\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/coins65080.2025.11125746","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}