{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T16:09:34Z","timestamp":1775146174350,"version":"3.50.1"},"reference-count":146,"publisher":"Association for Computing Machinery (ACM)","issue":"8","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2026,6,30]]},"abstract":"<jats:p>The vision for 6G aims to enhance network capabilities, supporting an intelligent digital ecosystem where artificial intelligence (AI) is a key. However, the expansion of 6G raises critical security and privacy concerns due to the increased integration of IoT devices, edge computing, and AI. This survey provides a comprehensive overview of 6G protocols with a focus on security and privacy, identifying risks that have not been experienced in preceding 5G systems, and presenting mitigation strategies. While many vulnerabilities from earlier generations persist, the introduction of AI\/ML introduces novel risks like model inversion and malicious manipulation of AI. Vulnerabilities in emerging personal IoT networks and autonomous vehicles are also underscored, where falsified command signaling or privacy leakage can pose safety and ethical concerns. The survey also discusses the transition toward lattice-based, post-quantum encryption standards, and identifies limitations in current security frameworks and calls for new, dynamic approaches tailored to 6G\u2019s complexity. Close collaboration among stakeholders, including governments, industry, and researchers, is indispensable to developing robust standards, secure architectures, and risk assessment frameworks that address AI, quantum threats, and privacy at scale.<\/jats:p>","DOI":"10.1145\/3785467","type":"journal-article","created":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T11:31:47Z","timestamp":1766057507000},"page":"1-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["From 5G to 6G: A Survey on Security, Privacy, and Standardization Pathways"],"prefix":"10.1145","volume":"58","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8988-269X","authenticated-orcid":false,"given":"Mengmeng","family":"Yang","sequence":"first","affiliation":[{"name":"Data61, CSIRO","place":["Clayton, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2944-4647","authenticated-orcid":false,"given":"Youyang","family":"Qu","sequence":"additional","affiliation":[{"name":"Data61, Data61, CSIRO","place":["Clayton, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5405-3704","authenticated-orcid":false,"given":"Thilina","family":"Ranbaduge","sequence":"additional","affiliation":[{"name":"Data61, CSIRO","place":["Eveleigh, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3855-3378","authenticated-orcid":false,"given":"Chandra","family":"Thapa","sequence":"additional","affiliation":[{"name":"Data61, CSIRO","place":["Marsfield, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4076-5553","authenticated-orcid":false,"given":"Nazatul Haque","family":"Sultan","sequence":"additional","affiliation":[{"name":"Data61, CSIRO","place":["Eveleigh, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3690-0321","authenticated-orcid":false,"given":"Ming","family":"Ding","sequence":"additional","affiliation":[{"name":"Data61, CSIRO","place":["Eveleigh, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9564-2847","authenticated-orcid":false,"given":"Hajime","family":"Suzuki","sequence":"additional","affiliation":[{"name":"Distributed System and Security, Data61, CSIRO","place":["Sydney, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4933-594X","authenticated-orcid":false,"given":"Wei","family":"Ni","sequence":"additional","affiliation":[{"name":"Data61, CSIRO","place":["Eveleigh, Australia"]},{"name":"Edith Cowan University","place":["Eveleigh, Australia"]},{"name":"University of New South Wales","place":["Eveleigh, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9695-7947","authenticated-orcid":false,"given":"Sharif","family":"Abuadbba","sequence":"additional","affiliation":[{"name":"Data61, CSIRO","place":["Sydney, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8552-1301","authenticated-orcid":false,"given":"David","family":"Smith","sequence":"additional","affiliation":[{"name":"Data61, CSIRO","place":["Eveleigh, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8454-0607","authenticated-orcid":false,"given":"Paul","family":"Tyler","sequence":"additional","affiliation":[{"name":"Data61, CSIRO","place":["Eveleigh, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1917-6466","authenticated-orcid":false,"given":"Josef","family":"Pieprzyk","sequence":"additional","affiliation":[{"name":"Data61, CSIRO","place":["Eveleigh, Australia"]},{"name":"Institue of Computer Science, Polish Academy of Sciences","place":["Eveleigh, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7698-6214","authenticated-orcid":false,"given":"Thierry","family":"Rakotoarivelo","sequence":"additional","affiliation":[{"name":"Data61, CSIRO","place":["Eveleigh, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4616-8770","authenticated-orcid":false,"given":"Xinlong","family":"Guan","sequence":"additional","affiliation":[{"name":"Data61, CSIRO","place":["Eveleigh, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3840-3706","authenticated-orcid":false,"given":"Sirine","family":"Mrabet","sequence":"additional","affiliation":[{"name":"Data61, CSIRO","place":["Eveleigh, Australia"]}]}],"member":"320","published-online":{"date-parts":[[2026,2,2]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"2017. Annual activity report. (2017). Retrieved from https:\/\/www.enisa.europa.eu\/publications\/corporate-documents\/enisa-annual-activity-report-2017"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.101.2000014"},{"key":"e_1_3_2_4_2","unstructured":"2022. Ericsson in multi-million GBP 6G research program investment in the UK. (2022). Retrieved from https:\/\/www.ericsson.com\/en\/press-releases\/3\/2022\/ericsson-in-multi-million-gbp-6g-research-program-investment-in-the-uk"},{"key":"e_1_3_2_5_2","unstructured":"2022. Industry safety. Retrieved from https:\/\/securityintelligence.com\/news\/us-congress-approves-american-cybersecurity-act\/"},{"key":"e_1_3_2_6_2","unstructured":"2022. InterDigital awarded five horizon europe 6G flagship projects targeting revolutionary technology advancement and experimental infrastructures. (2022). InterDigital Awarded Five Horizon Europe 6G Flagship Projects Targeting Revolutionary Technology Advancement and Experimental Infrastructures"},{"key":"e_1_3_2_7_2","unstructured":"2022. Nokia to lead German 6G lighthouse project. (2022). Retrieved from https:\/\/www.nokia.com\/about-us\/news\/releases\/2022\/07\/11\/nokia-to-lead-german-6g-lighthouse-project\/"},{"key":"e_1_3_2_8_2","unstructured":"2022. Nokia to lead the next phase of Europe\u2019s 6G flagship project. (2022). Retrieved from https:\/\/www.nokia.com\/about-us\/news\/releases\/2022\/10\/07\/nokia-to-lead-the-next-phase-of-europes-6g-flagship-project\/"},{"key":"e_1_3_2_9_2","unstructured":"2022. Nokia to open new 5G and 6G research and development center in Portugal. (2022). Retrieved from https:\/\/www.nokia.com\/about-us\/news\/releases\/2022\/11\/28\/nokia-to-open-new-5g-and-6g-research-and-development-center-in-portugal\/"},{"key":"e_1_3_2_10_2","unstructured":"2022. Statement on 5G\/Open RAN information sharing and telecommunications resilience and security. (2022). Retrieved from https:\/\/minister.homeaffairs.gov.au\/ClareONeil\/Pages\/joint-statement-5gopen-ran-between-us-australia.aspx"},{"key":"e_1_3_2_11_2","unstructured":"2022. UK\/Republic of Korea open RAN R&D collaboration. (2022). Retrieved from https:\/\/www.gov.uk\/guidance\/ukrepublic-of-korea-open-ran-rd-collaboration"},{"key":"e_1_3_2_12_2","unstructured":"2022. What is a Zero-day Attack? - Definition and Explanation. Retrieved from https:\/\/www.kaspersky.com.au\/resource-center\/definitions\/zero-day-exploitAccessed: 2022-12-13."},{"key":"e_1_3_2_13_2","unstructured":"2022. The Zeus Trojan \u2013 What It Is and How to Remove and Prevent it. Accessed: 2022-12-13. Retrieved from https:\/\/www.avast.com\/c-zeus"},{"key":"e_1_3_2_14_2","unstructured":"2023. Directive on measures for a high common level of cybersecurity across the Union (NIS2 Directive). (2023). Retrieved from https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive"},{"key":"e_1_3_2_15_2","unstructured":"2023. Interoperable EU risk management toolbox. (2023). Retrieved from https:\/\/www.enisa.europa.eu\/publications\/interoperable-eu-risk-management-toolbox"},{"key":"e_1_3_2_16_2","unstructured":"2023. New EU project DETERMINISTIC6G to develop critical parts of next generation 6G networks. (2023). Retrieved from https:\/\/www.ericsson.com\/en\/press-releases\/3\/2023\/new-eu-project-deterministic6g-to-develop-critical-parts-of-next-generation-6g-networks"},{"key":"e_1_3_2_17_2","unstructured":"2023. The smart networks and services joint undertaking. (2023). Retrieved from https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/smart-networks-and-services-joint-undertaking"},{"key":"e_1_3_2_18_2","unstructured":"2023. TISRIM. (2023). https:\/\/www.list.lu\/en\/technology-porfolio\/technology\/tisrim\/"},{"key":"e_1_3_2_19_2","unstructured":"2024. GSMA network equipment security assurance scheme (NESAS). (2024). Retrieved from https:\/\/www.gsma.com\/security\/network-equipment-security-assurance-scheme\/"},{"key":"e_1_3_2_20_2","unstructured":"2024. International telecommunication union (ITU). (2024). Retrieved from https:\/\/en.wikipedia.org\/wiki\/International_Telecommunication_Union"},{"key":"e_1_3_2_21_2","unstructured":"2024. The united nations. (2024). Retrieved from https:\/\/en.wikipedia.org\/wiki\/United_Nations"},{"key":"e_1_3_2_22_2","unstructured":"6G.Next. [n.d.]. 6G Native Extensions for XR Technologies. Retrieved from https:\/\/6gnext.de\/"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22051969"},{"issue":"1","key":"e_1_3_2_24_2","first-page":"11","article-title":"Advanced encryption standard (AES) algorithm to encrypt and decrypt data","volume":"16","author":"Abdullah Ako Muhamad","year":"2017","unstructured":"Ako Muhamad Abdullah et\u00a0al. 2017. Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography and Network Security 16, 1 (2017), 11.","journal-title":"Cryptography and Network Security"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2891891"},{"key":"e_1_3_2_26_2","doi-asserted-by":"crossref","first-page":"2163","DOI":"10.1109\/EMBC46164.2021.9630592","volume-title":"2021 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC)","author":"Aminifar Amin","year":"2021","unstructured":"Amin Aminifar, Fazle Rabbi, Violet Ka I. Pun, and Yngve Lamo. 2021. Monitoring motor activity data for detecting patients\u2019 depression using data augmentation and privacy-preserving distributed learning. In 2021 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC). IEEE, 2163\u20132169. Retrieved from https:\/\/ieeexplore.ieee.org\/document\/9630592"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.03.004"},{"key":"e_1_3_2_28_2","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.345","volume-title":"2017 IEEE Trustcom\/BigDataSE\/ICESS","author":"Arfaoui Ghada","year":"2017","unstructured":"Ghada Arfaoui, Jose Manuel Sanchez Vilchez, and Jean-Philippe Wary. 2017. Security and resilience in 5G: Current challenges and future directions. In 2017 IEEE Trustcom\/BigDataSE\/ICESS. IEEE, 1010\u20131015."},{"key":"e_1_3_2_29_2","doi-asserted-by":"crossref","first-page":"101759","DOI":"10.1016\/j.cose.2020.101759","article-title":"FoNAC-an automated fog node audit and certification scheme","volume":"93","author":"Aslam Mudassar","year":"2020","unstructured":"Mudassar Aslam, Bushra Mohsin, Abdul Nasir, and Shahid Raza. 2020. FoNAC-an automated fog node audit and certification scheme. Computers & Security 93 (June2020), 101759. Retrieved from https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404820300432","journal-title":"Computers & Security"},{"key":"e_1_3_2_30_2","article-title":"Crystals-kyber","author":"Avanzi Roberto","year":"2017","unstructured":"Roberto Avanzi, Joppe Bos, L\u00e9o Ducas, Eike Kiltz, Tancrede Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, and Damien Stehl\u00e9. 2017. Crystals-kyber. NIST, Tech. Rep (2017).","journal-title":"NIST, Tech. Rep"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75354-2_27"},{"key":"e_1_3_2_32_2","doi-asserted-by":"crossref","DOI":"10.1016\/j.jestch.2021.09.011","article-title":"A survey on DoS\/DDoS attacks mathematical modelling for traditional, SDN and virtual networks","author":"Balarezo Juan Fernando","year":"2022","unstructured":"Juan Fernando Balarezo, Song Wang, Karina Gomez Chavez, Akram Al-Hourani, and Sithamparanathan Kandeepan. 2022. A survey on DoS\/DDoS attacks mathematical modelling for traditional, SDN and virtual networks. Engineering Science and Technology, an International Journal (July2022). Retrieved from https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2215098621001944","journal-title":"Engineering Science and Technology, an International Journal"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900273"},{"key":"e_1_3_2_34_2","article-title":"A discretization attack","author":"Bernstein Daniel J.","year":"2020","unstructured":"Daniel J. Bernstein. 2020. A discretization attack. Cryptology ePrint Archive (2020).","journal-title":"Cryptology ePrint Archive"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363229"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3341398"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674984"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833649"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322251"},{"key":"e_1_3_2_40_2","unstructured":"I. Chen M. Steele and C. Teague. 2023. Using 5G\u2019s non-3GPP inter-working function to support heterogeneous networking in aeronautical mobile telemetry. International Foundation for Telemetering."},{"key":"e_1_3_2_41_2","volume-title":"POTENTIAL THREAT VECTORS TO 5G INFRASTRUCTURE\u2019","year":"2021","unstructured":"CISA, NSA, and DNI. 2021. POTENTIAL THREAT VECTORS TO 5G INFRASTRUCTURE\u2019. CISA. Retrieved from https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/potential-threat-vectors-5G-infrastructure_508_v2_0%20%281%29.pdf"},{"key":"e_1_3_2_42_2","unstructured":"European Commission. 2023. INtelligent Security and PervasIve tRust for 5G and Beyond (INSPIRE-5Gplus). Accessed: 2024-09-17. Retrieved from https:\/\/cordis.europa.eu\/project\/id\/871808"},{"key":"e_1_3_2_43_2","unstructured":"European Commission. 2024. EU Toolbox on 5G Security. Accessed: 2024-09-17. Retrieved from https:\/\/digital-strategy.ec.europa.eu\/en\/library\/eu-toolbox-5g-security"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.2759\/048142"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.5555\/2823944"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.5555\/3524938.3525144"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18178-8_30"},{"key":"e_1_3_2_48_2","unstructured":"Department for Digital Culture Media & Sport. 2022. UK to accelerate research on 5G and 6G technology as part of \u00a3110 million telecoms R and D package. Retrieved from https:\/\/www.gov.uk\/government\/news\/uk-to-accelerate-research-on-5g-and-6g-technology-as-part-of-110-million-telecoms-r-and-d-package"},{"key":"e_1_3_2_49_2","unstructured":"NTT DOCOMO Fujitsu and NEC. 2024. DOCOMO NTT NEC and Fujitsu Develop Top-level Sub-terahertz 6G Device Capable of Ultra-high-speed 100 Gbps Transmission. Accessed: 2024-09-17. Retrieved from https:\/\/www.fujitsu.com\/global\/about\/resources\/news\/press-releases\/2024\/0411.html"},{"key":"e_1_3_2_50_2","volume-title":"ENISA Interoperable EU Risk Management Framework","year":"2021","unstructured":"ENISA. 2021. ENISA Interoperable EU Risk Management Framework. ENISA. Retrieved from https:\/\/www.enisa.europa.eu\/publications\/interoperable-eu-risk-management-framework"},{"key":"e_1_3_2_51_2","volume-title":"IT SECURITY RISK MANAGEMENT METHODOLOGY V1.2","year":"2021","unstructured":"ENISA. 2021. IT SECURITY RISK MANAGEMENT METHODOLOGY V1.2. ENISA. Retrieved from https:\/\/ec.europa.eu\/info\/publications\/security-standards-applying-all-european-commission-information-systems_en"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.021.1900614"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.017"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1111\/dech.12680"},{"issue":"1","key":"e_1_3_2_55_2","first-page":"39","article-title":"The birthday paradox","volume":"1","author":"Ghosh Jonaki","year":"2012","unstructured":"Jonaki Ghosh. 2012. The birthday paradox. At Right Angles 1, 1 (2012), 39\u201342.","journal-title":"At Right Angles"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369505"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1080\/13600834.2019.1573501"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2025.3555212"},{"key":"e_1_3_2_59_2","volume-title":"SERIMA: A NEW RISK ANALYSIS PLATFORM FOR TELECOMMUNICATIONS OPERATORS","author":"(ILR) Luxembourg Regulatory Institute","year":"2020","unstructured":"Luxembourg Regulatory Institute (ILR). 2020. SERIMA: A NEW RISK ANALYSIS PLATFORM FOR TELECOMMUNICATIONS OPERATORS. ILR. Retrieved from https:\/\/www.list.lu\/en\/news\/a-new-risk-analysis-platform-for-telecommunications-operators\/"},{"key":"e_1_3_2_60_2","unstructured":"IMT-2030 (6G) Promotion Group. 2021. White Paper on 6G Vision and Candidate Technologies. Retrieved from http:\/\/www.caict.ac.cn\/kxyj\/qwfb\/ztbg\/202106\/P020210604552573543918.pdf"},{"key":"e_1_3_2_61_2","unstructured":"Infocomm Media Development Authority Singapore. 2022. Advancing Singapore\u2019s 6G future and talent IMDA partners SUTD to launch the first 6G R&D lab in Southeast Asia. Retrieved from https:\/\/www.imda.gov.sg\/Content-and-News\/Press-Releases-and-Speeches\/Press-Releases\/2022\/Advancing-Singapores-6G-future-and-talent---IMDA-partners-SUTD-to-launch-the-first-6G-Research-and-Development-lab-in-Southeast-Asia"},{"key":"e_1_3_2_62_2","volume-title":"Guide for Conducting Risk Assessments (NIST SP 800-30r1)","author":"Initiative Joint Task Force Transformation","year":"2012","unstructured":"Joint Task Force Transformation Initiative. 2012. Guide for Conducting Risk Assessments (NIST SP 800-30r1). Technical Report. NIST."},{"issue":"3","key":"e_1_3_2_63_2","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MCOMSTD.011.2000065","article-title":"Toward 6G security: Technology trends, threats, and solutions","volume":"5","author":"Je DongHyun","year":"2021","unstructured":"DongHyun Je, Jungsoo Jung, and Sunghyun Choi. 2021. Toward 6G security: Technology trends, threats, and solutions. IEEE Communications Standards Magazine 5, 3 (2021), 64\u201371.","journal-title":"IEEE Communications Standards Magazine"},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2017.8260283"},{"issue":"2","key":"e_1_3_2_65_2","first-page":"1","article-title":"5G core network security issues and attack classification from network protocol perspective.","volume":"10","author":"Kim Hwankuk","year":"2020","unstructured":"Hwankuk Kim. 2020. 5G core network security issues and attack classification from network protocol perspective. J. Internet Serv. Inf. Secur. 10, 2 (2020), 1\u201315.","journal-title":"J. Internet Serv. Inf. Secur."},{"key":"e_1_3_2_66_2","first-page":"79","volume-title":"Security of Industrial Control Systems and Cyber Physical Systems: First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21\u201322, 2015 Revised Selected Papers 1","author":"Kyl\u00e4np\u00e4\u00e4 Markku","year":"2016","unstructured":"Markku Kyl\u00e4np\u00e4\u00e4 and Aarne Rantala. 2016. Remote attestation for embedded systems. In Security of Industrial Control Systems and Cyber Physical Systems: First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21\u201322, 2015 Revised Selected Papers 1. Springer, 79\u201392."},{"key":"e_1_3_2_67_2","volume-title":"Open RAN Risk Analysis","author":"K\u00f6psell Stefan","year":"2022","unstructured":"Stefan K\u00f6psell, Andrey Ruzhanskiy, Andreas Hecker, et\u00a0al. 2022. Open RAN Risk Analysis. Technical Report. 5GRANR."},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49033.2022.9700673"},{"key":"e_1_3_2_69_2","unstructured":"Nokia Bell Labs. 2024. Security Trust and Privacy in 6G. Accessed: Nov. 2025. Retrieved from https:\/\/www.nokia.com\/bell-labs\/research\/6g-networks\/6g-technologies\/security-and-trust\/"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3071928"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3232845"},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2024.3394252"},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3362147"},{"issue":"1","key":"e_1_3_2_75_2","first-page":"71","article-title":"AES-128 cipher: Minimum area, low cost FPGA implementation","volume":"37","author":"Liberatori M. C.","year":"2007","unstructured":"M. C. Liberatori and Juan Carlos Bonadero. 2007. AES-128 cipher: Minimum area, low cost FPGA implementation. Latin American Applied Research 37, 1 (2007), 71\u201377.","journal-title":"Latin American Applied Research"},{"issue":"1","key":"e_1_3_2_76_2","first-page":"425","article-title":"Reinforcement learning-based physical cross-layer security and privacy in 6G","volume":"25","author":"Lu Xiaozhen","year":"2022","unstructured":"Xiaozhen Lu, Liang Xiao, Pengmin Li, Xiangyang Ji, Chenren Xu, Shui Yu, and Weihua Zhuang. 2022. Reinforcement learning-based physical cross-layer security and privacy in 6G. IEEE Communications Surveys & Tutorials 25, 1 (2022), 425\u2013466.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_3_2_77_2","article-title":"Crystals-dilithium","author":"Lyubashevsky Vadim","year":"2020","unstructured":"Vadim Lyubashevsky, L\u00e9o Ducas, Eike Kiltz, Tancr\u00e8de Lepoint, Peter Schwabe, Gregor Seiler, Damien Stehl\u00e9, and Shi Bai. 2020. Crystals-dilithium. Algorithm Specifications and Supporting Documentation (2020).","journal-title":"Algorithm Specifications and Supporting Documentation"},{"key":"e_1_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNEA.2019.00042"},{"key":"e_1_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.07.020"},{"key":"e_1_3_2_80_2","article-title":"Security and privacy on 6G network edge: A survey","author":"Mao Bomin","year":"2023","unstructured":"Bomin Mao, Jiajia Liu, Yingying Wu, and Nei Kato. 2023. Security and privacy on 6G network edge: A survey. IEEE Communications Surveys & Tutorials (2023).","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_3_2_81_2","unstructured":"Ministry of Internal Affairs and Communication Japan. 2020. Beyond 5G Promotion Strategy Roundtable Recommendations. Retrieved from https:\/\/www.soumu.go.jp\/main_sosiki\/joho_tsusin\/eng\/presentation\/pdf\/Beyond_5G_Promotion_Strategy_Roundtable_Recommendations.pdf"},{"key":"e_1_3_2_82_2","unstructured":"Ministry of Science and ICT Korea. [n.d.]. 2021 Action Plan for Digital New Deal. Retrieved from https:\/\/english.msit.go.kr\/eng\/bbs\/view.do?sCode=eng&mId=4&mPid=2&pageIndex=&bbsSeqNo=42&nttSeqNo=483&searchOpt=ALL&searchTxt=6g"},{"key":"e_1_3_2_83_2","unstructured":"Preben Mogensen and Harish Viswanathan. 2020. Communications in the 6G era. Retrieved from https:\/\/www.bell-labs.com\/institute\/white-papers\/communications-6g-era-white-paper\/"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2021.9010001"},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090404"},{"key":"e_1_3_2_86_2","article-title":"Security and privacy for reconfigurable intelligent surface in 6G: A review of prospective applications and challenges","author":"Naeem Faisal","year":"2023","unstructured":"Faisal Naeem, Mansoor Ali, Georges Kaddoum, Chongwen Huang, and Chau Yuen. 2023. Security and privacy for reconfigurable intelligent surface in 6G: A review of prospective applications and challenges. IEEE Open Journal of the Communications Society (2023).","journal-title":"IEEE Open Journal of the Communications Society"},{"issue":"12","key":"e_1_3_2_87_2","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/S1361-3723(20)30130-5","article-title":"Credential stuffing: New tools and stolen data drive continued attacks","volume":"2020","author":"Nathan Mike","year":"2020","unstructured":"Mike Nathan. 2020. Credential stuffing: New tools and stolen data drive continued attacks. Computer Fraud & Security 2020, 12 (2020), 18\u201319. Retrieved from https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S1361372320301305","journal-title":"Computer Fraud & Security"},{"key":"e_1_3_2_88_2","unstructured":"Next G. Alliance. 2022. 6G Market Development: A North American perspective. Retrieved from https:\/\/www.nextgalliance.org\/wp-content\/uploads\/dlm_uploads\/2022\/07\/NGA-Perspective-Brochure-V6.pdf"},{"key":"e_1_3_2_89_2","unstructured":"Next G. Alliance. 2022. Trust Security and Resilience for 6G Systems. Retrieved from https:\/\/nextgalliance.org\/white_papers\/trust-security-and-resilience-for-6g-systems\/"},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3108618"},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1145\/2897795.2897800"},{"key":"e_1_3_2_92_2","unstructured":"NTT DoCoMo. 2020. 5G Evolution and 6G. Retrieved from https:\/\/www.docomo.ne.jp\/english\/binary\/pdf\/corporate\/technology\/whitepaper_6g\/DOCOMO_6G_White_PaperEN_20200124.pdf"},{"key":"e_1_3_2_93_2","volume-title":"5G-ENSURE Deliverable D2.1 \u201cUse Cases\u201d","author":"N\u00e4slund Mats","year":"2016","unstructured":"Mats N\u00e4slund, Stephen Phillips, et\u00a0al. 2016. 5G-ENSURE Deliverable D2.1 \u201cUse Cases\u201d. Technical Report. European Commission (EU)."},{"key":"e_1_3_2_94_2","unstructured":"U.S. Department of Defense. 2022. Three New Projects for DoD\u2019s Innovate Beyond 5G Program. Accessed: 2024-09-17. Retrieved from https:\/\/www.defense.gov\/News\/Releases\/Release\/Article\/3114220\/three-new-projects-for-dods-innovate-beyond-5g-program\/"},{"key":"e_1_3_2_95_2","volume-title":"FutureG: The Department of Defense 6G Strategy and Roadmap","author":"(DoD) U.S. Department of Defense","year":"2022","unstructured":"U.S. Department of Defense (DoD). 2022. FutureG: The Department of Defense 6G Strategy and Roadmap. Technical Report. U.S. Department of Defense. Retrieved from https:\/\/www.cto.mil\/wp-content\/uploads\/2022\/04\/DoD_FutureG_Strategy.pdf"},{"key":"e_1_3_2_96_2","unstructured":"Academy of Finland. 2024. 6G Flagship Programme. Retrieved from https:\/\/www.aka.fi\/en\/research-funding\/programmes-and-other-funding-schemes\/flagship-programme\/6g-flagship\/. Accessed: 2024-09-17."},{"key":"e_1_3_2_97_2","volume-title":"Framework for Secure and Trustworthy Networks: Addressing 5G and Beyond","author":"Standards National Institute of","year":"2023","unstructured":"National Institute of Standards and Technology (NIST). 2023. Framework for Secure and Trustworthy Networks: Addressing 5G and Beyond. Technical Report NIST Special Publication 800-207. National Institute of Standards and Technology. Retrieved from https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-207\/final"},{"key":"e_1_3_2_98_2","unstructured":"University of Texas at Austin. 2021. New 6G Research Center Unites Industry Leaders and UT Wireless Experts. Retrieved from https:\/\/news.utexas.edu\/2021\/07\/07\/new-6g-research-center-unites-industry-leaders-and-ut-wireless-experts\/Accessed: 2024-09-17."},{"key":"e_1_3_2_99_2","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1109\/ICIN.2015.7073820","volume-title":"2015 18th International Conference on Intelligence in Next Generation Networks","author":"Osanaiye Opeyemi A.","year":"2015","unstructured":"Opeyemi A. Osanaiye. 2015. Short paper: IP spoofing detection for preventing DDoS attack in cloud computing. In 2015 18th International Conference on Intelligence in Next Generation Networks. IEEE, 139\u2013141. Retrieved from https:\/\/ieeexplore.ieee.org\/document\/7073820"},{"key":"e_1_3_2_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3143098"},{"key":"e_1_3_2_101_2","volume-title":"HTTP\/2 in Action","author":"Pollard Barry","year":"2019","unstructured":"Barry Pollard. 2019. HTTP\/2 in Action. Simon and Schuster."},{"key":"e_1_3_2_102_2","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482609","volume-title":"2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit)","author":"Porambage Pawani","year":"2021","unstructured":"Pawani Porambage, G\u00fcrkan G\u00fcr, Diana Pamela Moya Osorio, Madhusanka Livanage, and Mika Ylianttila. 2021. 6G security challenges and potential solutions. In 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit). IEEE, 622\u2013627."},{"key":"e_1_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3078081"},{"key":"e_1_3_2_104_2","article-title":"6G security challenges and potential solutions","author":"Porambage P.","year":"2021","unstructured":"P. Porambage, G. Gur, D. P. M. Osorio, M. Liyanage, and M. Ylianttila. 2021. 6G security challenges and potential solutions. Joint European Conference on Networks and Communications & 6G Summit (June2021). Retrieved from https:\/\/ieeexplore.ieee.org\/document\/9482609","journal-title":"Joint European Conference on Networks and Communications & 6G Summit"},{"key":"e_1_3_2_105_2","article-title":"Falcon","author":"Prest Thomas","year":"2020","unstructured":"Thomas Prest, Pierre-Alain Fouque, Jeffrey Hoffstein, Paul Kirchner, Vadim Lyubashevsky, Thomas Pornin, Thomas Ricosset, Gregor Seiler, William Whyte, and Zhenfei Zhang. 2020. Falcon. Post-Quantum Cryptography Project of NIST (2020).","journal-title":"Post-Quantum Cryptography Project of NIST"},{"key":"e_1_3_2_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1800112"},{"key":"e_1_3_2_107_2","unstructured":"Qualcomm. 2022. Why and what you need to know about 6G in 2022. Retrieved from https:\/\/www.qualcomm.com\/content\/dam\/qcomm-martech\/dm-assets\/documents\/web-why-and-what-you-need-to-know-about-6G-in-2022.pdf"},{"key":"e_1_3_2_108_2","article-title":"Qualcomm\u2019s 6G Research Collaborations and Trustworthy Wireless AI","author":"Technologies Inc. Qualcomm","year":"2023","unstructured":"Inc. Qualcomm Technologies. 2023. Qualcomm\u2019s 6G Research Collaborations and Trustworthy Wireless AI. Retrieved fromhttps:\/\/www.qualcomm.com\/research\/6g. Accessed: Nov. 2025.","journal-title":"https:\/\/www.qualcomm.com\/research\/6g"},{"key":"e_1_3_2_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/DESSERT.2018.8409116"},{"key":"e_1_3_2_110_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109515"},{"key":"e_1_3_2_111_2","unstructured":"Jonathan Reed. 2024. US Congress approves Strengthening American Cybersecurity Act. Retrieved from https:\/\/environment.ec.europa.eu\/topics\/industrial-emissions-and-safety\/industrial-accidents_en"},{"key":"e_1_3_2_112_2","unstructured":"Ericsson Research. 2024. 6G Security: Drivers and Needs. Retrieved from https:\/\/www.ericsson.com\/en\/reports-and-papers\/white-papers\/6g-security-drivers-and-needsAccessed: Nov. 2025."},{"key":"e_1_3_2_113_2","unstructured":"Samsung Research. 2019. Samsung Research Establishes Advanced Communications Research Center (ACRC). Accessed: 2024-09-17. Retrieved from https:\/\/www.samsung.com\/global\/research\/"},{"key":"e_1_3_2_114_2","unstructured":"Samsung Research. 2021. Towards 6G: Security Technology Trends Threats and Solutions. Accessed: Nov. 2025. Retrieved from https:\/\/research.samsung.com\/blog\/Towards-6G-Security-Technology-Trends-Threats-and-Solutions"},{"key":"e_1_3_2_115_2","unstructured":"Samsung Research. 2022. Samsung Research Announces Creation of New 6G Research Group in the UK. Accessed: 2024-09-17. Retrieved from https:\/\/www.samsung.com\/global\/research\/"},{"key":"e_1_3_2_116_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2021.100013"},{"key":"e_1_3_2_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2316816"},{"key":"e_1_3_2_118_2","first-page":"01","volume-title":"2021 4th International Symposium on Advanced Electrical and Communication Technologies (ISAECT)","author":"Roseti Cesare","year":"2021","unstructured":"Cesare Roseti. 2021. Integration of a non-3GPP satellite interface in a 5G multiple access configuration. In 2021 4th International Symposium on Advanced Electrical and Communication Technologies (ISAECT). IEEE, 01\u201306. Retrieved from https:\/\/ieeexplore.ieee.org\/document\/9668502"},{"key":"e_1_3_2_119_2","unstructured":"Samsung Research. 2020. The Next Hyper-Connected Experience for All. Retrieved from https:\/\/cdn.codeground.org\/nsr\/downloads\/researchareas\/20201201_6G_Vision_web.pdf"},{"key":"e_1_3_2_120_2","doi-asserted-by":"crossref","DOI":"10.1002\/9781119714712","volume-title":"From GSM to LTE-Advanced Pro and 5G, Fourth Edition","author":"Sauter Martin","year":"2021","unstructured":"Martin Sauter. 2021. From GSM to LTE-Advanced Pro and 5G, Fourth Edition. Wiley."},{"issue":"2","key":"e_1_3_2_121_2","first-page":"10","article-title":"On the cost of factoring RSA-1024","volume":"6","author":"Shamir Adi","year":"2003","unstructured":"Adi Shamir and Eran Tromer. 2003. On the cost of factoring RSA-1024. RSA CryptoBytes 6, 2 (2003), 10\u201319.","journal-title":"RSA CryptoBytes"},{"key":"e_1_3_2_122_2","first-page":"1","volume-title":"2021 International Conference on Forensics, Analytics, Big Data, Security (FABS)","volume":"1","author":"Shirwaikar Rudresh Deepak","year":"2021","unstructured":"Rudresh Deepak Shirwaikar, Abu Mohammed Faisal, Amandeep Singh, and Disha D. Shanbhag. 2021. A review on Privacy and Security in 6G Networks. In 2021 International Conference on Forensics, Analytics, Big Data, Security (FABS), Vol. 1. IEEE, 1\u20136."},{"key":"e_1_3_2_123_2","unstructured":"Moshe Ben Simon. [n.d.]. Offensive Defense: Using Deception Against Ransomware Attacks. Accessed: 2022-12-13. Retrieved from https:\/\/www.fortinet.com\/blog\/industry-trends\/offensive-defense-using-deception-against-ransomware-attacks"},{"key":"e_1_3_2_124_2","doi-asserted-by":"crossref","DOI":"10.1002\/9781119550921","volume-title":"5G Radio Access Network Architecture","author":"Sirotkin Sasha","year":"2021","unstructured":"Sasha Sirotkin (Ed.). 2021. 5G Radio Access Network Architecture. Wiley."},{"key":"e_1_3_2_125_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2022.3205145"},{"key":"e_1_3_2_126_2","article-title":"Investigating brute force attack patterns in IoT network","volume":"2019","author":"Stiawan Deris","year":"2019","unstructured":"Deris Stiawan, Mohd Idris, Reza Firsandaya Malik, Siti Nurmaini, Nizar Alsharif, Rahmat Budiarto, et\u00a0al. 2019. Investigating brute force attack patterns in IoT network. Journal of Electrical and Computer Engineering 2019 (2019). Retrieved from https:\/\/www.hindawi.com\/journals\/jece\/2019\/4568368\/","journal-title":"Journal of Electrical and Computer Engineering"},{"key":"e_1_3_2_127_2","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482474","volume-title":"2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit)","author":"Strinati Emilio Calvanese","year":"2021","unstructured":"Emilio Calvanese Strinati, George C Alexandropoulos, Vincenzo Sciancalepore, et\u00a0al. 2021. Wireless environment as a service enabled by reconfigurable intelligent surfaces: The RISE-6G perspective. In 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit). IEEE, 562\u2013567. Retrieved from https:\/\/ieeexplore.ieee.org\/document\/9482474"},{"key":"e_1_3_2_128_2","unstructured":"National Telecommunications and Information Administration (NTIA). 2021. National Strategy to Secure 5G Implementation Plan. Accessed: 2024-09-17. Retrieved from https:\/\/www.ntia.gov\/files\/ntia\/publications\/2021-1-12_115445_national_strategy_to_secure_5g_implementation_plan_and_annexes_a_f_final.pdf"},{"key":"e_1_3_2_129_2","unstructured":"TSDSI. [n.d.]. Telecommunications Standards Development Society India. Retrieved from https:\/\/tsdsi.in"},{"key":"e_1_3_2_130_2","unstructured":"Mikko Uusitalo. 2022. European 6G Flagship Hexa-X update. Retrieved from https:\/\/hexa-x.eu\/wp-content\/uploads\/2022\/06\/Mikko-Uusitalo-1570805677-final.pdf"},{"key":"e_1_3_2_131_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3361451"},{"key":"e_1_3_2_132_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102552"},{"key":"e_1_3_2_133_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.07.003"},{"key":"e_1_3_2_134_2","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.dcan.2020.07.003","article-title":"Security and privacy in 6G networks: New areas and new challenges","author":"Wang M.","year":"2020","unstructured":"M. Wang, T. Zhu, T. Zhang, J. Zhang, S. Yu, and W. Zhou. 2020. Security and privacy in 6G networks: New areas and new challenges. Digital Communications and Networks (July2020), 281\u2013291. Retrieved from https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2352864820302431","journal-title":"Digital Communications and Networks"},{"key":"e_1_3_2_135_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2024.3391318"},{"key":"e_1_3_2_136_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3156571"},{"key":"e_1_3_2_137_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3319492"},{"key":"e_1_3_2_138_2","unstructured":"Gustav Wikstr\u00f6m et\u00a0al. 2022. 6G - Connecting a Cyber-Physical World. Retrieved from https:\/\/www.ericsson.com\/en\/reports-and-papers\/white-papers\/a-research-outlook-towards-6g"},{"key":"e_1_3_2_139_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1560-8"},{"key":"e_1_3_2_140_2","volume-title":"6G White Paper: Research Challenges for Trust, Security and Privacy","author":"Ylianttila M.","year":"2020","unstructured":"M. Ylianttila (Ed.). 2020. 6G White Paper: Research Challenges for Trust, Security and Privacy. 6G Flagship. arXiv:2004.11665. Retrieved from https:\/\/arxiv.org\/abs\/2004.11665"},{"key":"e_1_3_2_141_2","unstructured":"Mika Ylianttila Raimo Kantola Andrei Gurtov et\u00a0al. 2020. 6G white paper: Research challenges for trust security and privacy. arXiv:2004.11665. Retrieved from https:\/\/arxiv.org\/abs\/2004.11665"},{"key":"e_1_3_2_142_2","unstructured":"Takeuchi Yoshiaki. 2022. Roadmap for the Realization of Beyond 5G. Retrieved from https:\/\/www.soumu.go.jp\/main_sosiki\/joho_tsusin\/eng\/presentation\/pdf\/Roadmap_for_the_Realization_of_Beyond_5G.pdf"},{"key":"e_1_3_2_143_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2024.3499342"},{"key":"e_1_3_2_144_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3046438"},{"key":"e_1_3_2_145_2","doi-asserted-by":"crossref","first-page":"1880","DOI":"10.1109\/INFCOM.2011.5934990","volume-title":"2011 Proceedings IEEE INFOCOM","author":"Zeng Kai","year":"2011","unstructured":"Kai Zeng, Kannan Govindan, Daniel Wu, and Prasant Mohapatra. 2011. Identity-based attack detection in mobile wireless networks. In 2011 Proceedings IEEE INFOCOM. IEEE, 1880\u20131888. Retrieved from https:\/\/ieeexplore.ieee.org\/document\/5934990"},{"key":"e_1_3_2_146_2","doi-asserted-by":"publisher","DOI":"10.1145\/3589335.3651490"},{"key":"e_1_3_2_147_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3025032"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3785467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T10:29:59Z","timestamp":1770028199000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3785467"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,2]]},"references-count":146,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2026,6,30]]}},"alternative-id":["10.1145\/3785467"],"URL":"https:\/\/doi.org\/10.1145\/3785467","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,2]]},"assertion":[{"value":"2024-09-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-12-09","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-02-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}