{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T06:57:02Z","timestamp":1763621822601,"version":"3.33.0"},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T00:00:00Z","timestamp":1729036800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T00:00:00Z","timestamp":1729036800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100010418","name":"Institute of Information & Communications Technology Planning & Evaluation","doi-asserted-by":"publisher","award":["2022-0-00162"],"award-info":[{"award-number":["2022-0-00162"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,16]]},"DOI":"10.1109\/ictc62082.2024.10826903","type":"proceedings-article","created":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T19:40:10Z","timestamp":1736883610000},"page":"2207-2209","source":"Crossref","is-referenced-by-count":1,"title":["Security Enhancement Technologies for 5G Private Networks in Smart Factories with Remote Access"],"prefix":"10.1109","author":[{"given":"Hyunjoo","family":"Lee","sequence":"first","affiliation":[{"name":"Future Mobile Communication Research Center, GERI (Gumi Electronics &#x0026; Information Technology Research Institute),Gumi,Korea"}]},{"given":"Mahnsuk","family":"Yoon","sequence":"additional","affiliation":[{"name":"Future Mobile Communication Research Center, GERI (Gumi Electronics &#x0026; Information Technology Research Institute),Gumi,Korea"}]},{"given":"Taeuk","family":"Park","sequence":"additional","affiliation":[{"name":"Future Mobile Communication Research Center, GERI (Gumi Electronics &#x0026; Information Technology Research Institute),Gumi,Korea"}]},{"given":"Sunghun","family":"Lee","sequence":"additional","affiliation":[{"name":"Intelligent Device Research Center, GERI (Gumi Electronics &#x0026; Information Technology Research Institute),Gumi,Korea"}]}],"member":"263","reference":[{"key":"ref1","first-page":"311","article-title":"The Industrial Internet of Things: Real-Time Monitoring and Anomaly Detection in Smart Manufacturing","volume":"57","author":"Xu","year":"2020","journal-title":"Journal of Manufacturing Systems"},{"key":"ref2","first-page":"107132","article-title":"Machine Learning-Based Anomaly Detection for Smart Factories","volume":"154","author":"Ullah","year":"2021","journal-title":"Computers & Industrial Engineering"},{"issue":"6","key":"ref3","first-page":"3206","article-title":"Context-Aware Access Control in Cyber-Physical Systems for Smart Manufacturing","volume":"15","author":"Chen","year":"2019","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"ref4","first-page":"102837","article-title":"Real-Time Security Monitoring in 5G Networks","volume":"58","author":"Choi","year":"2023","journal-title":"Journal of Information Security and Applications"},{"issue":"4","key":"ref5","first-page":"53","article-title":"5G Networks and Smart Manufacturing: Enhancing Security and Efficiency through Machine Learning","volume":"58","author":"Zhang","year":"2020","journal-title":"IEEE Communications Magazine"},{"key":"ref6","first-page":"21463","article-title":"Intrusion Detection in 5G Networks: A Machine Learning Approach for Smart Factory Security","volume":"9","author":"Shih","year":"2021","journal-title":"IEEE Access"},{"key":"ref7","first-page":"100287","article-title":"Security and Privacy in 5G-Enabled Industrial IoT: Challenges and Solutions","volume":"12","author":"Wani","year":"2020","journal-title":"Internet of Things"},{"key":"ref8","first-page":"112360","article-title":"A Comprehensive Security Framework for 5G Smart Factory Networks Based on Machine Learning","volume":"7","author":"Kim","year":"2019","journal-title":"IEEE Access"},{"issue":"8","key":"ref9","first-page":"5961","article-title":"Anomaly Detection in Industrial Control Systems Using Machine Learning: A Review","volume":"17","author":"Tan","year":"2021","journal-title":"IEEE Transactions on Industrial Informatics"}],"event":{"name":"2024 15th International Conference on Information and Communication Technology Convergence (ICTC)","start":{"date-parts":[[2024,10,16]]},"location":"Jeju Island, Korea, Republic of","end":{"date-parts":[[2024,10,18]]}},"container-title":["2024 15th International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10826571\/10826594\/10826903.pdf?arnumber=10826903","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T07:01:14Z","timestamp":1736924474000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10826903\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,16]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/ictc62082.2024.10826903","relation":{},"subject":[],"published":{"date-parts":[[2024,10,16]]}}}