{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:22:05Z","timestamp":1730294525115,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,23]]},"DOI":"10.1109\/saci58269.2023.10158610","type":"proceedings-article","created":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T13:26:49Z","timestamp":1687872409000},"page":"000165-000170","source":"Crossref","is-referenced-by-count":2,"title":["5G in Europe: Security and Challenges"],"prefix":"10.1109","author":[{"given":"Esmeralda","family":"Kadena","sequence":"first","affiliation":[{"name":"Obuda University,B&#x00E1;nki Don&#x00E1;t Faculty of Mechanical and Safety Engineering,Budapest,Hungary"}]},{"given":"Silvana","family":"Qose","sequence":"additional","affiliation":[{"name":"Obuda University,B&#x00E1;nki Don&#x00E1;t Faculty of Mechanical and Safety Engineering,Budapest,Hungary"}]},{"given":"Zoltan","family":"Rajnai","sequence":"additional","affiliation":[{"name":"Obuda University,B&#x00E1;nki Don&#x00E1;t Faculty of Mechanical and Safety Engineering,Budapest,Hungary"}]}],"member":"263","reference":[{"journal-title":"White Paper Evolution of 5G Cyber Threats and Security Solutions","article-title":"INSPIRE-5Gplus EU","year":"2022","key":"ref13"},{"journal-title":"ENISA THREAT LANDSCAPE FOR 5G NETWORKS","article-title":"European Union Agency for Cybersecurity (ENISA)","year":"2019","key":"ref12"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.12700\/APH.19.5.2022.5.2"},{"journal-title":"Privacy and security aspects of 5G technology","year":"2022","key":"ref14"},{"journal-title":"Regulation on critical parts of the communication network Traficom","year":"2022","key":"ref31"},{"journal-title":"Etusivu Traficom","year":"2022","key":"ref30"},{"journal-title":"ADVANTAGES OF 5G AND HOW WILL BENEFIT IOT","year":"2019","key":"ref11"},{"year":"2022","key":"ref10","article-title":"T-Mobile for Business"},{"journal-title":"M&#x00E4;&#x00E4;r&#x00E4;ys viestint&#x00E4;verkon kriittisist&#x00E4; osista -Regulation on critical elements of the communication network","year":"2020","key":"ref32"},{"key":"ref2","article-title":"The Innovation Winter Is Coming: How the U.S.-China Trade War Endangers the World","volume":"57","author":"houser","year":"2020","journal-title":"San Diego Law Review"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.32479\/irmm.8206"},{"journal-title":"European Comission","article-title":"NIS Cooperation Group, Cybersecurity of 5G Networks: EU Toolbox of Risk Mitigating Measures","year":"2021","key":"ref17"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.12700\/APH.19.11.2022.11.9"},{"journal-title":"NIS Directive &#x2014; ENISA","year":"2020","key":"ref19"},{"journal-title":"5G Security","article-title":"Positive Technologies","year":"2020","key":"ref18"},{"journal-title":"Technische Richtlinie BSI TR-03163 Sicherheit in TK-Infrastrukturen","article-title":"Bundesamt f&#x00FC;r Sicherheit in der Informationstechnik","year":"2022","key":"ref24"},{"journal-title":"Fact-based & Trustworthy EU 5G Toolbox Implementation","article-title":"Huawei Cyber Security Transparency Center","year":"2021","key":"ref23"},{"key":"ref26","first-page":"28","article-title":"Bundesamt f&#x00FC;r Sicherheit in der Informationstechnik","year":"2022","journal-title":"BSI -Zertifizierung nach NESAS CCS-GI"},{"journal-title":"Network Equipment Security Assurance Scheme-Overview","year":"2021","author":"moran","key":"ref25"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/hec.4143"},{"key":"ref22","first-page":"48","article-title":"Infrastructural Model for the Healthcare System based on Emerging Technologies","volume":"15","author":"vukmirovi?","year":"2018","journal-title":"Acta Polytechnica Hungarica"},{"journal-title":"What Is 5G Network Architecture? | Digi International","year":"2021","author":"remmert","key":"ref21"},{"journal-title":"Bundesrat Zweites Gesetz zur Erh&#x00F6;hung der Sicherheit informationstechnischer Systeme","first-page":"1122","year":"2021","key":"ref28"},{"journal-title":"Katalog von Sicherheitsanforderungen f&#x00FC;r das Betreiben von Telekommunikationsund Datenverarbeitungssystemen sowie f&#x00FC;r die Verarbeitung personenbezogener Daten -Liste der kritischen Funktionen nach &#x00A7; 109 Abs 6 Satz 1 Nr 2 TKG f&#x00FC;r &#x00F6;ffentliche Telekommu","article-title":"Bundesamt f&#x00FC;r Sicherheit in der Informationstechnik","year":"2021","key":"ref27"},{"journal-title":"CYBER TALKS -5G -Cyberwatch Finland","year":"2022","key":"ref29"},{"journal-title":"Feature Article 5G Introduces New Benefits Cybersecurity Risks Homeland Security","year":"2020","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.12700\/APH.18.8.2021.8.5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.12700\/APH.16.7.2019.7.7"},{"journal-title":"Huawei 5G and China as a Security Threat","year":"2019","author":"kaska","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3415726"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.12700\/APH.18.7.2021.7.12"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1177\/1329878X20952165"}],"event":{"name":"2023 IEEE 17th International Symposium on Applied Computational Intelligence and Informatics (SACI)","start":{"date-parts":[[2023,5,23]]},"location":"Timisoara, Romania","end":{"date-parts":[[2023,5,26]]}},"container-title":["2023 IEEE 17th International Symposium on Applied Computational Intelligence and Informatics (SACI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10158523\/10158534\/10158610.pdf?arnumber=10158610","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T13:33:48Z","timestamp":1689600828000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10158610\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,23]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/saci58269.2023.10158610","relation":{},"subject":[],"published":{"date-parts":[[2023,5,23]]}}}