{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:52:09Z","timestamp":1740102729178,"version":"3.37.3"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,6]],"date-time":"2024-01-06T00:00:00Z","timestamp":1704499200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,6]],"date-time":"2024-01-06T00:00:00Z","timestamp":1704499200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100005049","name":"Science and Engineering Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005049","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004489","name":"Mitacs","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004489","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,6]]},"DOI":"10.1109\/icce59016.2024.10444439","type":"proceedings-article","created":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T18:47:20Z","timestamp":1709146040000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Gamifying a 5G Core to Create a Capture the Flag Cyber Security Training Environment"],"prefix":"10.1109","author":[{"given":"Peiqi Paige","family":"Wang","sequence":"first","affiliation":[{"name":"Algonquin College"}]},{"given":"Amina","family":"Shafo","sequence":"additional","affiliation":[{"name":"Algonquin College"}]},{"given":"Longpeng Angus","family":"Xu","sequence":"additional","affiliation":[{"name":"Algonquin College"}]},{"given":"Zhichuan","family":"Zhao","sequence":"additional","affiliation":[{"name":"Algonquin College"}]},{"given":"Wahab","family":"Almuhtadi","sequence":"additional","affiliation":[{"name":"Algonquin College"}]},{"given":"Jordan","family":"Melzer","sequence":"additional","affiliation":[{"name":"Sr Engineer, Broadband Access TELUS"}]},{"given":"Wynn","family":"Fenwick","sequence":"additional","affiliation":[{"name":"Sr Consultant, Cyber Security Architecture, TELUS"}]}],"member":"263","reference":[{"key":"ref1","article-title":"What is 5G? emerging 5G Mobile Services and network requirements","author":"Yu","year":"2023","journal-title":"MDPI"},{"journal-title":"HITB GSEC","article-title":"4G LTE man in the middle attacks with a hacked femtocell","year":"2019","key":"ref2"},{"journal-title":"CTFd Docs","article-title":"CTFd docs","year":"2023","key":"ref3"},{"volume-title":"Securitygen telecom threats whitepaper 10 August V4","year":"2023","key":"ref4"},{"journal-title":"Trend Micro","article-title":"Attacks on 5G infrastructure from users\u2019 devices","year":"2023","key":"ref5"},{"key":"ref6","article-title":"p.174-177","author":"L\u00fcbeck","year":"1860","journal-title":"Lehrund handbuch der Deutschen Turnkunst, Woodbridge, CT Reading"},{"volume-title":"CTF: Alternative Training for Offensive Security","year":"2015","author":"Chen","key":"ref7"},{"volume-title":"National employment matrix_occ_15-1212","key":"ref8"},{"journal-title":"Encyclop\u00e6dia Britannica","article-title":"Jeopardy!","year":"2023","key":"ref10"},{"journal-title":"TechRxiv","article-title":"Security Analysis of Critical 5G Interfaces","year":"2023","key":"ref11"},{"volume-title":"Security analysis of critical 5G interfaces","year":"2023","author":"Mahyoub","key":"ref12"},{"journal-title":"MITRE","article-title":"FightTM","year":"2023","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103047"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/5gwf52925.2021.00050"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/noms56928.2023.10154283"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-022-11451-4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3151000"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/icetran59631.2023.10192225"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/pacet56979.2022.9976365"},{"journal-title":"free5GC","article-title":"Home","year":"2023","key":"ref21"}],"event":{"name":"2024 IEEE International Conference on Consumer Electronics (ICCE)","start":{"date-parts":[[2024,1,6]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2024,1,8]]}},"container-title":["2024 IEEE International Conference on Consumer Electronics (ICCE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10444098\/10444131\/10444439.pdf?arnumber=10444439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T21:28:26Z","timestamp":1710365306000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10444439\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icce59016.2024.10444439","relation":{},"subject":[],"published":{"date-parts":[[2024,1,6]]}}}