{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T21:36:57Z","timestamp":1774042617936,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100018693","name":"Horizon Europe","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/globecom59602.2025.11432499","type":"proceedings-article","created":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T20:04:01Z","timestamp":1773950641000},"page":"799-804","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing 6G Network Resilience through HORSE\u2019s LLM Agent-Based Security Mechanisms"],"prefix":"10.1109","author":[{"given":"M.","family":"Danousis","sequence":"first","affiliation":[{"name":"Eight Bells Ltd,Nicosia,Cyprus"}]},{"given":"A.","family":"Piemonti","sequence":"additional","affiliation":[{"name":"Martel Innovate,Switzerland"}]},{"given":"F.","family":"Granelli","sequence":"additional","affiliation":[{"name":"CNIT \/ University of Trento,Trento,Italy"}]},{"given":"X.","family":"Masip-Bruin","sequence":"additional","affiliation":[{"name":"CRAAX \/ Universitat Polit&#x00E8;cnica de Catalunya,Vilanova i la Geltr&#x00FA;,Barcelona,Spain"}]},{"given":"E.","family":"Rodriguez","sequence":"additional","affiliation":[{"name":"CRAAX \/ Universitat Polit&#x00E8;cnica de Catalunya,Vilanova i la Geltr&#x00FA;,Barcelona,Spain"}]},{"given":"A.","family":"Carrega","sequence":"additional","affiliation":[{"name":"Inter-University Consortium for Telecommunications,CNIT - National,Genoa,Italy"}]},{"given":"C.","family":"Skianis","sequence":"additional","affiliation":[{"name":"Eight Bells Ltd,Nicosia,Cyprus"}]},{"given":"E.","family":"Kafetzakis","sequence":"additional","affiliation":[{"name":"Eight Bells Ltd,Nicosia,Cyprus"}]},{"given":"I.","family":"Giannoulakis","sequence":"additional","affiliation":[{"name":"Eight Bells Ltd,Nicosia,Cyprus"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3427661"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/fi14040117"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3120143"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-025-00361-w"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2024.100211"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.4853709","article-title":"Generative ai and large language models for cyber security: All insights you need","author":"Ferrag","year":"2024"},{"key":"ref7","article-title":"Horse project"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s23083876"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD62243.2024.10942951"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3687300"},{"issue":"9","key":"ref11","first-page":"3267","article-title":"Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework","volume-title":"Sensors","volume":"21","author":"Georgiadou","year":"2021"},{"key":"ref12","first-page":"4","article-title":"Analysis Of Cyber Threat Detection And Emulation Using MITRE Attack Framework","volume-title":"2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","author":"Rajesh"},{"issue":"4","key":"ref13","first-page":"78","article-title":"Humans in the Loop: Cybersecurity Aspects in the Consumer IoT Context","volume-title":"IEEE Consumer Electronics Magazine","volume":"11","author":"Rohan","year":"2022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.54368\/qijmsrd.2.3.0011"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD62243.2024.10942816"},{"key":"ref16","article-title":"Self-Organized Agents: A LLM Multi-Agent Framework toward Ultra Large-Scale Code Generation and Optimization","author":"Ishibashi","year":"2024"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.13052\/jwe1540-9589.2263"},{"key":"ref18","first-page":"284","article-title":"A Review on Code Generation with LLMs: Application and Evaluation","volume-title":"2023 IEEE International Conference on Medical Artificial Intelligence (MedAI)","author":"Wang"},{"issue":"1","key":"ref19","first-page":"1050","article-title":"Creating Large Language Model Applications Utilizing LangChain: A Primer on Developing LLM Apps Fast","volume-title":"International Conference on Applied Engineering and Natural Sciences","volume":"1","author":"Topsakal"}],"event":{"name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","location":"Taipei, Taiwan","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,12]]}},"container-title":["GLOBECOM 2025 - 2025 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11431620\/11431622\/11432499.pdf?arnumber=11432499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:55:46Z","timestamp":1774036546000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11432499\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/globecom59602.2025.11432499","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}