{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T04:16:49Z","timestamp":1744431409919,"version":"3.40.4"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:00Z","timestamp":1732492800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:00Z","timestamp":1732492800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100014438","name":"Business Finland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100014438","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,25]]},"DOI":"10.1109\/cscn63874.2024.10849699","type":"proceedings-article","created":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T18:36:30Z","timestamp":1738002990000},"page":"79-85","source":"Crossref","is-referenced-by-count":0,"title":["Disruptive Technological Directions for 6G Security"],"prefix":"10.1109","author":[{"given":"Ijaz","family":"Ahmad","sequence":"first","affiliation":[{"name":"VTT Technical Research Centre of Finland,Espoo,Finland"}]},{"given":"Jani","family":"Suomalainen","sequence":"additional","affiliation":[{"name":"VTT Technical Research Centre of Finland,Espoo,Finland"}]},{"given":"Shahriar","family":"Shahabuddin","sequence":"additional","affiliation":[{"name":"Oklahoma State University,USA"}]},{"given":"Pawani","family":"Porambage","sequence":"additional","affiliation":[{"name":"VTT Technical Research Centre of Finland,Espoo,Finland"}]},{"given":"Anni","family":"Karinsalo","sequence":"additional","affiliation":[{"name":"VTT Technical Research Centre of Finland,Espoo,Finland"}]},{"given":"Diana Pamela Moya","family":"Osorio","sequence":"additional","affiliation":[{"name":"ISY, Link&#x00F6;ping University,Communication Systems,Sweden"}]},{"given":"Marko","family":"H\u00f6yhty\u00e4","sequence":"additional","affiliation":[{"name":"Finnish National Defence University,Helsinki,Finland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3249835"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900333"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/0024-6301(95)91075-1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1111\/j.0737-6782.2004.00076.x"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736746"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916180"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/BMSB55706.2022.9828793"},{"key":"ref8","first-page":"9","article-title":"Hedera: A public hashgraph network & governing council","volume":"1","author":"Baird","year":"2019","journal-title":"White Paper"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000175"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2022.100404"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.009.2100736"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/cmu2.12594"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps45667.2019.9024627"},{"volume-title":"NIST releases first 3 finalized postquantum encryption standards","year":"2024","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72777-2_20"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SOLI60636.2023.10425346"},{"volume-title":"Post quantum cryptography - guidelines for telecom use cases, version 1.0","year":"2024","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1049\/cmu2.12759"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05233-z"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.006.00340"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.0001.2200001"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000218"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3344351"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2001187"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2023.3302833"},{"volume":"16","journal-title":"5G System; Network Data Analytics Services; ETSI TS 129520 V16.5.1","year":"2020","key":"ref26"},{"key":"ref27","article-title":"Artificial Intelligence and future directions for ETSI","volume":"34","author":"Frost","year":"2020"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3149272"},{"key":"ref29","article-title":"Digital twin network - requirements and architecture"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.21143"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2300029"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3423477"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TNB.2023.3285973"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MELECON53508.2022.9843087"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3315712"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3750493"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3051897"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924034"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-019-0355-6"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3206862"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ASMS\/SPSC55670.2022.9914764"}],"event":{"name":"2024 IEEE Conference on Standards for Communications and Networking (CSCN)","start":{"date-parts":[[2024,11,25]]},"location":"Belgrade, Serbia","end":{"date-parts":[[2024,11,27]]}},"container-title":["2024 IEEE Conference on Standards for Communications and Networking (CSCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10849679\/10849681\/10849699.pdf?arnumber=10849699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T17:51:43Z","timestamp":1744393903000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10849699\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,25]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/cscn63874.2024.10849699","relation":{},"subject":[],"published":{"date-parts":[[2024,11,25]]}}}