{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:32:09Z","timestamp":1774967529999,"version":"3.50.1"},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T00:00:00Z","timestamp":1733616000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T00:00:00Z","timestamp":1733616000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,8]]},"DOI":"10.1109\/gcwkshp64532.2024.11101134","type":"proceedings-article","created":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T17:51:39Z","timestamp":1755021099000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["A DTN-based Security Deduction Method Using Attack-Driven Network State Transition"],"prefix":"10.1109","author":[{"given":"Li","family":"Su","sequence":"first","affiliation":[{"name":"China Mobile Research Institute,Beijing,China"}]},{"given":"Ke","family":"Wang","sequence":"additional","affiliation":[{"name":"China Mobile Research Institute,Beijing,China"}]},{"given":"Ru","family":"Yan","sequence":"additional","affiliation":[{"name":"China Mobile Research Institute,Beijing,China"}]},{"given":"Xiaojun","family":"Zhuang","sequence":"additional","affiliation":[{"name":"China Mobile Research Institute,Beijing,China"}]},{"given":"Yuwei","family":"Ma","sequence":"additional","affiliation":[{"name":"China Mobile Research Institute,Beijing,China"}]},{"given":"Haitao","family":"Du","sequence":"additional","affiliation":[{"name":"China Mobile Research Institute,Beijing,China"}]},{"given":"Chang","family":"Liu","sequence":"additional","affiliation":[{"name":"China Mobile Research Institute,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps52748.2021.9682031"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3267548"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-020-09517-0"},{"key":"ref4","article-title":"White Paper on 6G Networking","author":"Taleb","year":"2020","journal-title":"6G Research Visions"},{"issue":"9","key":"ref5","article-title":"Design and Research of Attack and Defense Platform Based in Real Network","volume":"8","author":"Jinsuo","year":"2022","journal-title":"Journal of Information Security Research"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932182"},{"key":"ref8","article-title":"Network security measurment based on dependency relationship graph and common vulnerability scoring system","author":"Jiaxin","year":"2019","journal-title":"Journal of Computer Applications"},{"key":"ref9","article-title":"5G Network Security Deduction Based on Digital Twin","author":"Yuwei","year":"2023","journal-title":"Computer Engineering and Applications"}],"event":{"name":"2024 IEEE Globecom Workshops (GC Wkshps)","location":"Cape Town, South Africa","start":{"date-parts":[[2024,12,8]]},"end":{"date-parts":[[2024,12,12]]}},"container-title":["2024 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11099626\/11099614\/11101134.pdf?arnumber=11101134","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T05:45:04Z","timestamp":1755063904000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11101134\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,8]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/gcwkshp64532.2024.11101134","relation":{},"subject":[],"published":{"date-parts":[[2024,12,8]]}}}