{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T06:25:33Z","timestamp":1766471133497,"version":"3.48.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.23919\/cnsm67658.2025.11297448","type":"proceedings-article","created":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T18:40:10Z","timestamp":1766428810000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Design of Resilient Mobile Core Network Architecture Inspired by Soft Guarantee Behavior"],"prefix":"10.23919","author":[{"given":"Masayuki","family":"Kurata","sequence":"first","affiliation":[{"name":"KDDI Research, Inc,Saitama,Japan"}]},{"given":"Ryu","family":"Watanabe","sequence":"additional","affiliation":[{"name":"KDDI Research, Inc,Saitama,Japan"}]},{"given":"Masaki","family":"Suzuki","sequence":"additional","affiliation":[{"name":"KDDI Research, Inc,Saitama,Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2024.107982"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3327647"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281441"},{"year":"2022","key":"ref4","article-title":"Outline About Communication Failure on July 2, 2022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft60951.2024.10588904"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900252"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8056973"},{"key":"ref8","article-title":"Security architecture and procedures for 5G System"},{"key":"ref9","article-title":"Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA)"},{"key":"ref10","article-title":"System architecture for the 5G System (5GS)"},{"year":"2025","key":"ref11","article-title":"povo2.0"},{"key":"ref12","article-title":"free5GC"},{"key":"ref13","article-title":"Ueransim"},{"key":"ref14","article-title":"Procedures for the 5G System (5GS)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00041"},{"key":"ref16","article-title":"Characterizing and modeling control-plane traffic for mobile core network","author":"Meng","year":"2022","journal-title":"arXiv preprint arXiv:2212.13248"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2009.5355157"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2016EBP3411"}],"event":{"name":"2025 21st International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2025,10,27]]},"location":"Bologna, Italy","end":{"date-parts":[[2025,10,31]]}},"container-title":["2025 21st International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11297200\/11297407\/11297448.pdf?arnumber=11297448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T06:23:24Z","timestamp":1766471004000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11297448\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":18,"URL":"https:\/\/doi.org\/10.23919\/cnsm67658.2025.11297448","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]}}}