{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T10:08:47Z","timestamp":1777543727021,"version":"3.51.4"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,29]]},"DOI":"10.23919\/cycon58705.2023.10182173","type":"proceedings-article","created":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T18:28:49Z","timestamp":1689791329000},"page":"161-180","source":"Crossref","is-referenced-by-count":3,"title":["Modeling 5G Threat Scenarios for Critical Infrastructure Protection"],"prefix":"10.23919","author":[{"given":"Gerrit","family":"Holtrup","sequence":"first","affiliation":[{"name":"Kudelski IoT Security,Cheseaux-sur-Lausanne,Switzerland"}]},{"given":"William","family":"Blonay","sequence":"additional","affiliation":[{"name":"NATO CCDCOE,Tallinn,Estonia"}]},{"given":"Martin","family":"Strohmeier","sequence":"additional","affiliation":[{"name":"armasuisse Science and Technology,Thun,Switzerland"}]},{"given":"Alain","family":"Mermoud","sequence":"additional","affiliation":[{"name":"armasuisse Science and Technology,Thun,Switzerland"}]},{"given":"Jean-Pascal","family":"Chavanne","sequence":"additional","affiliation":[{"name":"Federal Department of Justice and Police,Bern,Switzerland"}]},{"given":"Vincent","family":"Lenders","sequence":"additional","affiliation":[{"name":"armasuisse Science and Technology,Thun,Switzerland"}]}],"member":"263","reference":[{"key":"ref13","article-title":"TS 38.304. User equipment (UE) procedures in idle mode and in RRC inactive state, V17.2.0","year":"2022","journal-title":"3GPP"},{"key":"ref12","article-title":"TS 37.340 Multi connectivity, overall description, stage-2, V17.1.0","year":"2022","journal-title":"3GPP"},{"key":"ref15","article-title":"NG.132. Report 5G Mobile Roaming Revisited (5GMRR) Phase 1, Version 2.0","year":"2022"},{"key":"ref14","article-title":"TS 24.501. Non-access-stratum (NAS) protocol for 5G system (5GS); stage 3, V17.8.0","year":"2022","journal-title":"3GPP"},{"key":"ref11","article-title":"The threats to our products","volume":"33","author":"kohnfelder","year":"1999","journal-title":"Microsoft Interface Microsoft Corporation"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(09)70008-X"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899254"},{"key":"ref1","article-title":"TS 33.501. Security architecture and procedures for 5G systems, V17.7.0","year":"2022","journal-title":"3GPP"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102478"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/eIT53891.2022.9813965"},{"key":"ref9","article-title":"Research Report: Military Movement Risks From 5G Networks","author":"oeselg","year":"2022"},{"key":"ref4","article-title":"TS 23.501. System architecture for the 5G system (5GS), V17.6.0","year":"2022","journal-title":"3GPP"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243846"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-022-05193-8"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/MIKON54314.2022.9924818"}],"event":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","location":"Tallinn, Estonia","start":{"date-parts":[[2023,5,30]]},"end":{"date-parts":[[2023,6,2]]}},"container-title":["2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10181240\/10181347\/10182173.pdf?arnumber=10182173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T19:02:07Z","timestamp":1702321327000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10182173\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,29]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/cycon58705.2023.10182173","relation":{},"subject":[],"published":{"date-parts":[[2023,5,29]]}}}