{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T06:53:31Z","timestamp":1770274411171,"version":"3.49.0"},"reference-count":172,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"XcARet Project funded by the Research Council of Finland","award":["355114"],"award-info":[{"award-number":["355114"]}]},{"DOI":"10.13039\/501100006730","name":"German Federal Ministry for Education and Research through the Open6GHub Project","doi-asserted-by":"publisher","award":["16KISK004"],"award-info":[{"award-number":["16KISK004"]}],"id":[{"id":"10.13039\/501100006730","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/ojcoms.2024.3519725","type":"journal-article","created":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T19:54:13Z","timestamp":1734551653000},"page":"332-361","source":"Crossref","is-referenced-by-count":15,"title":["Security, Privacy, and Trust for Open Radio Access Networks in 6G"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7396-8424","authenticated-orcid":false,"given":"Pawani","family":"Porambage","sequence":"first","affiliation":[{"name":"VTT Technical Research Centre of Finland, Espoo, Finland"}]},{"given":"Maria","family":"Christopoulou","sequence":"additional","affiliation":[{"name":"National Centre of Scientific Research &#x201C;Demokritos,&#x201D;, Athens, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2086-2487","authenticated-orcid":false,"given":"Bin","family":"Han","sequence":"additional","affiliation":[{"name":"University of Kaiserslautern (RPTU), Kaiserslautern, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9874-0047","authenticated-orcid":false,"given":"Mohammad","family":"Asif Habibi","sequence":"additional","affiliation":[{"name":"University of Kaiserslautern (RPTU), Kaiserslautern, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1709-4862","authenticated-orcid":false,"given":"Hanna","family":"Bogucka","sequence":"additional","affiliation":[{"name":"Poznan University of Technology, Pozna&#x0144;, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9054-9416","authenticated-orcid":false,"given":"Pawel","family":"Kryszkiewicz","sequence":"additional","affiliation":[{"name":"Poznan University of Technology, Pozna&#x0144;, Poland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3398504"},{"key":"ref2","volume-title":"Hexa-X-II deliverable D1.2 6G use cases and requirements.","year":"2023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3239220"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3334610"},{"key":"ref5","volume-title":"Transforming Radio Access Networks Towards Open, Intelligent, Virtualized and Fully Interoperable RAN","year":"2024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.0005.2200070"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.003.2200879"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s24031038"},{"key":"ref9","article-title":"A comprehensive tutorial and survey of O-RAN: Exploring slicing-aware architecture, deployment options, use cases, and challenges","author":"Alam","year":"2024","journal-title":"arXiv:2405.03555"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2024.3430823"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102890"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103621"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3244674"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3146618"},{"key":"ref15","article-title":"A survey on explainable AI for 6G O-RAN: Architecture, use cases, challenges and research directions","author":"Brik","year":"2023","journal-title":"arXiv:2307.00319"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3412758"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3336180"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3336190"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2025.3526215"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2023-Spring57618.2023.10200477"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.07.003"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3078081"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-022-02341-w"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6957145"},{"key":"ref25","volume-title":"Open RAN technical priorities focus on security","year":"2023"},{"key":"ref26","volume-title":"Network Equipment Security Assurance Scheme (NESAS)","year":"2024"},{"key":"ref27","volume-title":"Empowering 5G Security with Expertise and Tools","year":"2024"},{"key":"ref28","volume-title":"Open RAN Principles","year":"2022"},{"key":"ref29","volume-title":"Open Radio Access Network Security Considerations","year":"2022"},{"key":"ref30","volume-title":"Security in open RAN","year":"2021"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit60053.2024.10597119"},{"key":"ref32","volume-title":"Going Green: Benchmarking the Energy Efficiency of Mobile","year":"2021"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC61514.2024.10592553"},{"key":"ref34","volume-title":"Working Group 1; Use Cases Analysis Report; V14.00","year":"2024"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3057679"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3274037"},{"key":"ref37","volume-title":"6G Standardization\u2014An Overview of Timeline and High-Level Technology Principles","year":"2024"},{"key":"ref38","volume-title":"Standardising StandardSetting for 6G","year":"2024"},{"key":"ref39","volume-title":"Next Generation Research Group; Research Report on O-RAN Towards 6G; V01.00","year":"2023"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2023.3294445"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/FNWF58287.2023.10520491"},{"key":"ref42","volume-title":"Next Generation Research Group; Research Report on Quantum Security; V01.00","year":"2023"},{"key":"ref43","volume-title":"Working Group 11; O-RAN Study on Certificate Management Framework; V02.00","year":"2024"},{"key":"ref44","volume-title":"Working Group 11; O-RAN OAuth 2.0 Security; V02.00","year":"2024"},{"key":"ref45","volume-title":"Working Group 11; O-RAN Study on Security for O-Cloud; V06.00","year":"2024"},{"key":"ref46","volume-title":"Working Group 11; O-RAN Study on O-RU Centralized User Management; V02.00","year":"2024"},{"key":"ref47","volume-title":"Working Group 11; O-RAN Study on Security for Security for Fronthaul CUS-Plane; V01.00","year":"2024"},{"key":"ref48","volume-title":"Working Group 11; O-RAN Security Requirements and Controls Specifications; V09.00","year":"2024"},{"key":"ref49","volume-title":"Working Group 11; O-RAN Security Test Specifications; V07.00","year":"2024"},{"key":"ref50","volume-title":"Working Group 11; O-RAN Study on Security for Shared O-RU; V05.00","year":"2024"},{"key":"ref51","volume-title":"Working Group 11; O-RAN Security Protocols Specifications; V09.00","year":"2024"},{"key":"ref52","volume-title":"Working Group 11; O-RAN Security Threat Modeling and Risk Assessment; V03.00","year":"2024"},{"key":"ref53","volume-title":"Working Group 11; O-RAN Study on Security for Service Management and Orchestration (SMO); V04.00","year":"2024"},{"key":"ref54","volume-title":"Working Group 11; O-RAN Study on Security for AI\/ML; V01.00","year":"2024"},{"key":"ref55","volume-title":"Working Group 11; O-RAN Study on Security for Application Lifecycle Management; V03.00","year":"2024"},{"key":"ref56","volume-title":"Working Group 11; O-RAN Study on Security Log Management; V04.00","year":"2024"},{"key":"ref57","volume-title":"Working Group 11; O-RAN Study on Security for Near Real Time RIC and xApps; V05.00","year":"2024"},{"key":"ref58","volume-title":"Working Group 11; O-RAN Study on Security for Non-RT-RIC; V01.00","year":"2024"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3165000"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.108.2100659"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3339172"},{"key":"ref62","volume-title":"Radio Control Manipulation Via Rogue xApps","year":"2024"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/WPMC59531.2023.10338835"},{"key":"ref64","volume-title":"O-RAN Work Group 11 (Security Work Group); O-RAN Security Threat Modeling and Risk Assessment","year":"2024"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.0001.2200047"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3274487"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470080"},{"key":"ref68","volume-title":"O-RAN Work Group 3 (Near-RT RIC and E2 Interface); E2 General Aspects and Principles (E2GAP)","year":"2024"},{"key":"ref69","volume-title":"O-RAN Work Group 2; A1 Interface: General Aspects and Principles","year":"2024"},{"key":"ref70","volume-title":"O-RAN Work Group 11 (Security Work Group); Study on Security for Near Real Time RIC and xApps","year":"2024"},{"key":"ref71","volume-title":"O-RAN Security Focus Group (SFG); Study on Security for Non-RT-RIC","year":"2022"},{"key":"ref72","volume-title":"O-RAN Work Group 2 (Non-RT RIC and A1 Interface); A1 Interface: Transport Protocol","year":"2024"},{"key":"ref73","volume-title":"O-RAN Work Group 2; Transport Protocols for R1 Services","year":"2024"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT53585.2022.9728862"},{"key":"ref75","volume-title":"Working Group 3; O-RAN Y1 Interface: General Aspects and Principles; V01.00","year":"2024"},{"key":"ref76","volume-title":"Working Group 3; O-RAN Y1 Interface: Type Definitions; V01.00","year":"2024"},{"key":"ref77","volume-title":"Working Group 3; O-RAN Y1 Interface: Application Protocol; V01.00","year":"2024"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3364840"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/FNWF55208.2022.00071"},{"key":"ref80","volume-title":"O-RAN Work Group 11 (Security Work Group); OAuth 2.0 Security","year":"2024"},{"key":"ref81","volume-title":"Zero Trust Architecture for Secure O-RAN: WG 11 for Security","year":"2024"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-162"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796744"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/WPMC59531.2023.10338980"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10228961"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2023-Spring57618.2023.10201067"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS57453.2023.10226043"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.002.2300317"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit60053.2024.10597131"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2200213"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110455"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3455089"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2300545"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3447472"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit60053.2024.10597007"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit60053.2024.10597083"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ICC51166.2024.10622345"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621223"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2200465"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS61880.2024.10620781"},{"key":"ref101","first-page":"1","article-title":"Towards an AI\/ML-driven SMO framework in O-RAN: Scenarios, solutions, and challenges","volume-title":"Proc. IEEE FNWF","author":"Habibi"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2024.3434419"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10437795"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3321401"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10437043"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3431286"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3431681"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3643833.3656118"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279036"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN60163.2024.10632857"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-023-00980-9"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10278993"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC57260.2024.10570951"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3359998"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR56187.2022.9983726"},{"key":"ref116","article-title":"Multiparty homomorphic encryption: From theory to practice","author":"Mouchet","year":"2020"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623139"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38557-5_20"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.3390\/app112110332"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0071"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3177630"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet59005.2023.10490052"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2024.3432689"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/3654522.3654589"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2020.10.001"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxad057"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.21474\/IJAR01\/12455"},{"key":"ref128","article-title":"Verifiable privacy-preserving computing","author":"Bontekoe","year":"2024","journal-title":"arXiv:2309.08248"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75245-3_18"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.3390\/e25111550"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2023.3246563"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64840-4_2"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2023.i4.166-186"},{"key":"ref134","article-title":"Security and trust in open RAN","author":"Kuure","year":"2024"},{"key":"ref135","article-title":"Ontologising trustworthy in the telecommunications domain","author":"Oliver","year":"2023","journal-title":"arXiv:2311.15839"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1002\/9781119695158"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109358"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2300419"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ICC51166.2024.10622553"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN59219.2023.10329620"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS61880.2024.10620803"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/BRAINS59668.2023.10316961"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.103.2100489"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3315374"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/tgcn.2024.3426108"},{"key":"ref146","volume-title":"Power consumption of common symmetric encryption algorithms on low-cost microchips","author":"Ohm","year":"2023"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3216645"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3312795"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN60470.2024.10494468"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3362271"},{"key":"ref151","article-title":"Large language models for cyber security: A systematic literature review","author":"Xu","year":"2024","journal-title":"arXiv:2405.04760"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3465447"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.006.00340"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3309051"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1049\/icp.2023.2361"},{"key":"ref156","article-title":"Counter denial of service for next-generation networks within the artificial intelligence and post-quantum era","author":"Darzi","year":"2024","journal-title":"arXiv:2408.04725"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS59465.2024.10449920"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3413047"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2024.3437248"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1145\/3629141"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit58263.2023.10188316"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10437125"},{"key":"ref163","article-title":"Transferability in machine learning: From phenomena to black-box attacks using adversarial samples","author":"Papernot","year":"2016","journal-title":"arXiv:1605.07277"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.02.007"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP53844.2022.00049"},{"key":"ref166","article-title":"Analysis and detectability of offline data poisoning attacks on linear dynamical systems","author":"Russo","year":"2023","journal-title":"arXiv:2211.08804"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps50303.2020.9367572"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100569"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.001.2300812"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM54355.2022.00053"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4201"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/6GSUMMIT49458.2020.9083885"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/10829557\/10807044.pdf?arnumber=10807044","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T17:45:12Z","timestamp":1744911912000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10807044\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":172,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2024.3519725","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}