{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T21:09:46Z","timestamp":1762376986731},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T00:00:00Z","timestamp":1623110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T00:00:00Z","timestamp":1623110400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T00:00:00Z","timestamp":1623110400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,8]]},"DOI":"10.1109\/eucnc\/6gsummit51104.2021.9482536","type":"proceedings-article","created":{"date-parts":[[2021,7,28]],"date-time":"2021-07-28T20:32:03Z","timestamp":1627504323000},"source":"Crossref","is-referenced-by-count":15,"title":["5 Growth: Secure and Reliable Network Slicing for Verticals"],"prefix":"10.1109","author":[{"given":"Vitor A.","family":"Cunha","sequence":"first","affiliation":[]},{"given":"Nikolaos","family":"Maroulis","sequence":"additional","affiliation":[]},{"given":"Chrysa","family":"Papagianni","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Sacido","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Jimenez","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Ubaldi","sequence":"additional","affiliation":[]},{"given":"Molka","family":"Gharbaoui","sequence":"additional","affiliation":[]},{"given":"Chia- Yu","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Nikolaos","family":"Koursioumpas","sequence":"additional","affiliation":[]},{"given":"Konstantin","family":"Tomakh","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Corujo","sequence":"additional","affiliation":[]},{"given":"Joao P.","family":"Barraca","sequence":"additional","affiliation":[]},{"given":"Sokratis","family":"Barmpounakis","sequence":"additional","affiliation":[]},{"given":"Denys","family":"Kucherenko","sequence":"additional","affiliation":[]},{"given":"Alessio","family":"Giorgetti","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Boddi","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Valcarenghi","sequence":"additional","affiliation":[]},{"given":"Oleksii","family":"Kolodiazhnyi","sequence":"additional","affiliation":[]},{"given":"Aitor","family":"Zabala","sequence":"additional","affiliation":[]},{"given":"Josep Xavier","family":"Salvat","sequence":"additional","affiliation":[]},{"given":"Andres","family":"Garcia-Saavedra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406867"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC48522.2020.9200919"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.15439\/2017F228"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON51198.2020.9203184"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS.2019.8892909"},{"key":"ref6","volume-title":"5Growth RL code repository"},{"key":"ref7","volume-title":"5Growth WIM plugin code repository"},{"key":"ref8","volume-title":"Multus CNI code repository"},{"key":"ref9","first-page":"113","article-title":"Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains","volume-title":"Proceedings of the 6th International Conference on Information Warfare and Security","author":"Hutchins","year":"2011"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.190"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2104"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345431"}],"event":{"name":"2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit)","location":"Porto, Portugal","start":{"date-parts":[[2021,6,8]]},"end":{"date-parts":[[2021,6,11]]}},"container-title":["2021 Joint European Conference on Networks and Communications &amp; 6G Summit (EuCNC\/6G Summit)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9482408\/9482415\/09482536.pdf?arnumber=9482536","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T01:05:33Z","timestamp":1706058333000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9482536\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,8]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/eucnc\/6gsummit51104.2021.9482536","relation":{},"subject":[],"published":{"date-parts":[[2021,6,8]]}}}