{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T10:07:04Z","timestamp":1758190024268,"version":"3.44.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T00:00:00Z","timestamp":1748476800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T00:00:00Z","timestamp":1748476800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,29]]},"DOI":"10.1109\/sera65747.2025.11154640","type":"proceedings-article","created":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T17:31:58Z","timestamp":1758043918000},"page":"269-274","source":"Crossref","is-referenced-by-count":0,"title":["Concept of AI-Based Automatic Unauthorized Communication Prevention Function in DACS-Based PBNM Scheme"],"prefix":"10.1109","author":[{"given":"Kazuya","family":"Odagiri","sequence":"first","affiliation":[{"name":"Sugiyama Jogakuen University,Aichi,Japan"}]},{"given":"Shogo","family":"Shimizu","sequence":"additional","affiliation":[{"name":"Gakushuin Women&#x2019;s College,Tokyo,Japan"}]},{"given":"Naohiro","family":"Ishii","sequence":"additional","affiliation":[{"name":"Advanced Institute of Industrial Technology,Tokyo,Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1974.1092259"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2753"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3060"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3460"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3703"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2748"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2749"},{"article-title":"COPS Usage for Policy Provisioning (COPSPR)","volume-title":"IETF RFC 3084","author":"Chan","key":"ref8"},{"volume-title":"CIM Core Model V2.5 LDAP Mapping Specification","year":"2002","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2253"},{"volume-title":"CIM Schema: Version 2.30.0","year":"2011","key":"ref11"},{"volume-title":"ETSI ES 282 003: Telecoms and Internet converged Services and protocols for Advanced Network (TISPAN); Resource and Admission Control Subsystem (RACS); Functional Architecture","year":"2006","key":"ref12"},{"volume-title":"ETSI ETSI ES 283 026: Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN); Resource and Admission Control; Protocol for QoS reservation information exchange between the Service Policy Decision Function (SPDF) and the Access-Resource and Admission Control Function (A-RACF) in the Resource and Protocol specification","year":"2006","key":"ref13"},{"issue":"4","key":"ref14","first-page":"851","volume-title":"Secure DACS Scheme, \u201cJournal of Network and Computer Applications","volume":"31","author":"Odagiri","year":"2008"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2991\/ijndc.2013.1.4.7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2015.31"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/BCD57833.2023.10466347"}],"event":{"name":"2025 IEEE\/ACIS 23rd International Conference on Software Engineering Research, Management and Applications (SERA)","start":{"date-parts":[[2025,5,29]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2025,5,31]]}},"container-title":["2025 IEEE\/ACIS 23rd International Conference on Software Engineering Research, Management and Applications (SERA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11154458\/11154479\/11154640.pdf?arnumber=11154640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T05:34:55Z","timestamp":1758087295000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11154640\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,29]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/sera65747.2025.11154640","relation":{},"subject":[],"published":{"date-parts":[[2025,5,29]]}}}