{"id":"https://openalex.org/W7117873821","doi":"https://doi.org/10.1109/milcom64451.2025.11310292","title":"Flexible Testbed for Cyber Electromagnetic Activities with 5G Networks","display_name":"Flexible Testbed for Cyber Electromagnetic Activities with 5G Networks","publication_year":2025,"publication_date":"2025-10-06","ids":{"openalex":"https://openalex.org/W7117873821","doi":"https://doi.org/10.1109/milcom64451.2025.11310292"},"language":null,"primary_location":{"id":"doi:10.1109/milcom64451.2025.11310292","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom64451.2025.11310292","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121733106","display_name":"Octavio Galindo","orcid":null},"institutions":[{"id":"https://openalex.org/I164936912","display_name":"The University of Texas at El Paso","ror":"https://ror.org/04d5vba33","country_code":"US","type":"education","lineage":["https://openalex.org/I164936912"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Octavio Galindo","raw_affiliation_strings":["University of Texas at El Paso,Electrical and Computer Engineering,El Paso,Texas,USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at El Paso,Electrical and Computer Engineering,El Paso,Texas,USA","institution_ids":["https://openalex.org/I164936912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011227283","display_name":"Kevin J. Valdez","orcid":null},"institutions":[{"id":"https://openalex.org/I164936912","display_name":"The University of Texas at El Paso","ror":"https://ror.org/04d5vba33","country_code":"US","type":"education","lineage":["https://openalex.org/I164936912"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kevin J. Valdez","raw_affiliation_strings":["University of Texas at El Paso,Electrical and Computer Engineering,El Paso,Texas,USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at El Paso,Electrical and Computer Engineering,El Paso,Texas,USA","institution_ids":["https://openalex.org/I164936912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121711157","display_name":"Martha Torres Lozano","orcid":null},"institutions":[{"id":"https://openalex.org/I164936912","display_name":"The University of Texas at El Paso","ror":"https://ror.org/04d5vba33","country_code":"US","type":"education","lineage":["https://openalex.org/I164936912"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Martha Torres Lozano","raw_affiliation_strings":["University of Texas at El Paso,Electrical and Computer Engineering,El Paso,Texas,USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at El Paso,Electrical and Computer Engineering,El Paso,Texas,USA","institution_ids":["https://openalex.org/I164936912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121742393","display_name":"Andres Vicario Cisneros","orcid":null},"institutions":[{"id":"https://openalex.org/I164936912","display_name":"The University of Texas at El Paso","ror":"https://ror.org/04d5vba33","country_code":"US","type":"education","lineage":["https://openalex.org/I164936912"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andres Vicario Cisneros","raw_affiliation_strings":["University of Texas at El Paso,Electrical and Computer Engineering,El Paso,Texas,USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at El Paso,Electrical and Computer Engineering,El Paso,Texas,USA","institution_ids":["https://openalex.org/I164936912"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074135892","display_name":"Virgilio Gonz\u00e1lez","orcid":"https://orcid.org/0000-0003-1042-4811"},"institutions":[{"id":"https://openalex.org/I164936912","display_name":"The University of Texas at El Paso","ror":"https://ror.org/04d5vba33","country_code":"US","type":"education","lineage":["https://openalex.org/I164936912"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Virgilio Gonzalez","raw_affiliation_strings":["University of Texas at El Paso,Electrical and Computer Engineering,El Paso,Texas,USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at El Paso,Electrical and Computer Engineering,El Paso,Texas,USA","institution_ids":["https://openalex.org/I164936912"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5121733106"],"corresponding_institution_ids":["https://openalex.org/I164936912"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.73228705,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"132","last_page":"137"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13121","display_name":"Radio Wave Propagation Studies","score":0.0803999975323677,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13121","display_name":"Radio Wave Propagation Studies","score":0.0803999975323677,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13905","display_name":"Telecommunications and Broadcasting Technologies","score":0.047200001776218414,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.030899999663233757,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.7498999834060669},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6560999751091003},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.6240000128746033},{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.5674999952316284},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5060999989509583},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4271000027656555},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.37119999527931213},{"id":"https://openalex.org/keywords/electromagnetic-environment","display_name":"Electromagnetic environment","score":0.3578999936580658},{"id":"https://openalex.org/keywords/electronic-warfare","display_name":"Electronic warfare","score":0.33739998936653137}],"concepts":[{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.7498999834060669},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6560999751091003},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6492000222206116},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.6240000128746033},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.5674999952316284},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5060999989509583},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.4693000018596649},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4521999955177307},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4271000027656555},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.37119999527931213},{"id":"https://openalex.org/C64183698","wikidata":"https://www.wikidata.org/wiki/Q4530886","display_name":"Electromagnetic environment","level":2,"score":0.3578999936580658},{"id":"https://openalex.org/C133082901","wikidata":"https://www.wikidata.org/wiki/Q272826","display_name":"Electronic warfare","level":3,"score":0.33739998936653137},{"id":"https://openalex.org/C118530786","wikidata":"https://www.wikidata.org/wiki/Q1134732","display_name":"Instrumentation (computer programming)","level":2,"score":0.3343000113964081},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.3176000118255615},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.30790001153945923},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.3025999963283539},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.299699991941452},{"id":"https://openalex.org/C14589660","wikidata":"https://www.wikidata.org/wiki/Q64122","display_name":"Electromagnetic pulse","level":2,"score":0.29679998755455017},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.29660001397132874},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.2892000079154968},{"id":"https://openalex.org/C207267971","wikidata":"https://www.wikidata.org/wiki/Q120208","display_name":"Emerging technologies","level":2,"score":0.28450000286102295},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.272599995136261},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.26420000195503235},{"id":"https://openalex.org/C67363961","wikidata":"https://www.wikidata.org/wiki/Q5268834","display_name":"Information and Communications Technology","level":2,"score":0.25999999046325684},{"id":"https://openalex.org/C2781023928","wikidata":"https://www.wikidata.org/wiki/Q1348131","display_name":"Modern warfare","level":2,"score":0.2563000023365021},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.2517000138759613},{"id":"https://openalex.org/C138331895","wikidata":"https://www.wikidata.org/wiki/Q11650","display_name":"Electronics","level":2,"score":0.2515000104904175}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom64451.2025.11310292","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom64451.2025.11310292","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2902983161","https://openalex.org/W4311705696","https://openalex.org/W4390606841","https://openalex.org/W4391807441","https://openalex.org/W4403210665","https://openalex.org/W4403210959","https://openalex.org/W4407949763"],"related_works":[],"abstract_inverted_index":{"Modern":[0],"C5I\u2014encompassing":[1],"Command,":[2],"Control,":[3],"Communication,":[4],"Computer,":[5],"Cyber,":[6],"and":[7,36,49,60,68,75,80,85,108,127,134,139,147,155],"Intelligence\u2014serves":[8],"as":[9,39,41],"a":[10,27],"foundational":[11],"pillar":[12],"in":[13,77,95,137],"field":[14],"operations.":[15],"The":[16],"rapid":[17],"growth":[18],"of":[19,22,29,103,122],"the":[20,101,109,119,140],"Internet":[21],"Things":[23],"(IoT)":[24],"has":[25],"interconnected":[26],"myriad":[28],"devices,":[30],"all":[31],"reliant":[32],"on":[33,100],"Position,":[34],"Navigation,":[35],"Timing":[37],"signals":[38],"well":[40],"pervasive":[42],"wireless":[43],"networks":[44],"that":[45],"span":[46],"both":[47,66],"public":[48],"private":[50],"links.":[51],"Recent":[52],"global":[53],"conflicts":[54],"have":[55],"highlighted":[56],"how":[57],"Electronic":[58],"Warfare":[59],"Signal":[61],"Intelligence":[62],"can":[63],"significantly":[64],"disrupt":[65],"military":[67],"civilian":[69],"systems.":[70],"To":[71],"effectively":[72],"support":[73],"research":[74],"education":[76],"emerging":[78],"technologies":[79],"associated":[81],"services,":[82],"enhanced":[83],"instrumentation":[84],"emulation":[86],"capabilities":[87],"are":[88],"essential.":[89],"These":[90],"systems":[91],"must":[92],"facilitate":[93],"studies":[94],"cybersecurity;":[96],"this":[97],"paper":[98],"focuses":[99],"concept":[102],"Cyber":[104,115],"Electromagnetic":[105,116],"Activities":[106,117],"(CEMA)":[107],"proposed":[110],"testbed":[111],"for":[112],"its":[113],"evaluation.":[114],"represent":[118],"synchronized":[120],"integration":[121],"cyberspace":[123,138],"operations,":[124],"electronic":[125],"warfare,":[126],"spectrum":[128],"management":[129],"operations":[130],"to":[131],"seize,":[132],"retain,":[133],"exploit":[135],"advantages":[136],"electromagnetic":[141,151],"domain,":[142],"while":[143],"denying":[144],"adversary":[145],"access":[146],"safeguarding":[148],"friendly":[149],"system":[150],"phenomena,":[152],"protocol":[153],"efficiency,":[154],"advanced":[156],"Future":[157],"Generation":[158],"Network":[159],"functionalities.":[160]},"counts_by_year":[],"updated_date":"2026-01-02T23:11:23.791532","created_date":"2026-01-01T00:00:00"}
