{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:26:56Z","timestamp":1758274016746,"version":"3.44.0"},"reference-count":14,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004739","name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["Y202093"],"award-info":[{"award-number":["Y202093"]}],"id":[{"id":"10.13039\/501100004739","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62201540","62302472","62372425"],"award-info":[{"award-number":["62201540","62302472","62372425"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Network"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/mnet.2025.3579925","type":"journal-article","created":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T15:00:48Z","timestamp":1750086048000},"page":"74-80","source":"Crossref","is-referenced-by-count":1,"title":["ForenSiX: Automated Network Forensics and Diagnostics for Beyond-5G and 6G Networks Using Large Language Models"],"prefix":"10.1109","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-3817-5756","authenticated-orcid":false,"given":"Xuanbo","family":"Huang","sequence":"first","affiliation":[{"name":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2095-7523","authenticated-orcid":false,"given":"Kaiping","family":"Xue","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China"}]},{"given":"Lutong","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1674-8884","authenticated-orcid":false,"given":"Jiangping","family":"Han","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6979-4510","authenticated-orcid":false,"given":"Jian","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3839-5576","authenticated-orcid":false,"given":"David S. L.","family":"Wei","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, Fordham University, Bronx, NY, USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"The 6G architecture landscape\u2014European perspective","author":"Bahare","year":"2023","journal-title":"5G PPP Architecture Working Group"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3249835"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3364066"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243749"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops50388.2021.9473530"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC51166.2024.10622788"},{"key":"ref8","first-page":"3183","article-title":"Causal analysis for software-defined networking attacks","volume-title":"Proc. USENIX Security Symp. (USENIX Security)","author":"Ujcich"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3421306"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3420120"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3401159"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.006.2100438"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2023.3326003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.131.2200513"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2023.3326356"}],"container-title":["IEEE Network"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/65\/11164477\/11036790.pdf?arnumber=11036790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T17:35:23Z","timestamp":1758044123000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11036790\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":14,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/mnet.2025.3579925","relation":{},"ISSN":["0890-8044","1558-156X"],"issn-type":[{"type":"print","value":"0890-8044"},{"type":"electronic","value":"1558-156X"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}