{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T18:16:51Z","timestamp":1777486611729,"version":"3.51.4"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T00:00:00Z","timestamp":1764979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T00:00:00Z","timestamp":1764979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100019370","name":"Foundation for Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100019370","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,6]]},"DOI":"10.1109\/icecer65523.2025.11401311","type":"proceedings-article","created":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T20:54:33Z","timestamp":1772052873000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Q-OPSEC: An Architecture Proposal for Adaptive AI Middleware for Quantum Cryptography"],"prefix":"10.1109","author":[{"given":"Darlan","family":"Noetzold","sequence":"first","affiliation":[{"name":"University of Salamanca,Expert Systems and Applications Laboratory,Salamanca,Spain"}]},{"given":"Jorge L. V.","family":"Barbosa","sequence":"additional","affiliation":[{"name":"University of Vale do Rio dos Sinos (UNISINOS),PPGCC,S&#x00E3;o Leopoldo,Brazil"}]},{"given":"Juan F. P.","family":"Santana","sequence":"additional","affiliation":[{"name":"University of Salamanca,Expert Systems and Applications Laboratory,Salamanca,Spain"}]},{"given":"Valderi R. Q.","family":"Leithardt","sequence":"additional","affiliation":[{"name":"Instituto Universit&#x00E1;rio de Lisboa (ISCTE-IUL),ISTAR-IUL,Lisboa,Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1137\/s0097539795293172"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.12.004"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ce2ct64011.2025.10939125"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2003.1160055"},{"issue":"2","key":"ref5","first-page":"1","article-title":"Self-adaptive Software: Land-scape and Research Challenges","volume-title":"ACM Transactions on Autonomous and Adaptive Systems","volume":"4","author":"Salehie","year":"2009"},{"key":"ref6","article-title":"Performance Analysis and Industry Deployment of Post-Quantum Cryptogra-phy","author":"Demir","year":"2025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-99474-6_13"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/cscs66924.2025.00059"},{"key":"ref9","first-page":"175","article-title":"Quantum Cryptography: Public Key Distribution and Coin Tossing","volume-title":"Proc. IEEE International Conference on Computers, Systems and Signal Processing","author":"Bennett"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.67.661"},{"issue":"4","key":"ref11","first-page":"65","article-title":"NIST Releases First 3 Finalized Post-Quantum Encryption Standards","volume-title":"IEEE Security & Privacy","volume":"22","author":"Smith","year":"2024"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103234"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-023-00684-x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-84427-8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-022-3509-6"},{"key":"ref16","article-title":"AI Driven Self-Healing Cybersecurity Systems with Agentic AI for Adaptive Threat Response and Resilience","volume-title":"The Local Meeting for Open Challenges in Autonomous Systems","author":"Alidoost Nia","year":"2023"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/milcom55135.2022.10017647"},{"key":"ref18","article-title":"Trends in 2025 for Security and Justice","author":"Bhat","year":"2025"}],"event":{"name":"2025 International Conference on Electrical and Computer Engineering Researches (ICECER)","location":"Antananarivo, Madagascar","start":{"date-parts":[[2025,12,6]]},"end":{"date-parts":[[2025,12,8]]}},"container-title":["2025 International Conference on Electrical and Computer Engineering Researches (ICECER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400705\/11400706\/11401311.pdf?arnumber=11401311","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T07:12:20Z","timestamp":1772089940000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11401311\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icecer65523.2025.11401311","relation":{},"subject":[],"published":{"date-parts":[[2025,12,6]]}}}