{"id":"https://openalex.org/W4283810984","doi":"https://doi.org/10.23919/cycon55549.2022.9810903","title":"Emergence of 5G Networks and Implications for Cyber Conflict","display_name":"Emergence of 5G Networks and Implications for Cyber Conflict","publication_year":2022,"publication_date":"2022-05-31","ids":{"openalex":"https://openalex.org/W4283810984","doi":"https://doi.org/10.23919/cycon55549.2022.9810903"},"language":"en","primary_location":{"id":"doi:10.23919/cycon55549.2022.9810903","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon55549.2022.9810903","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068667600","display_name":"Keir Giles","orcid":"https://orcid.org/0000-0001-7260-8646"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Keir Giles","raw_affiliation_strings":["Conflict Studies Research Centre,Northamptonshire,United Kingdom","Conflict Studies Research Centre, Northamptonshire, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Conflict Studies Research Centre,Northamptonshire,United Kingdom","institution_ids":[]},{"raw_affiliation_string":"Conflict Studies Research Centre, Northamptonshire, United Kingdom","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102899951","display_name":"Kim Hartmann","orcid":"https://orcid.org/0000-0003-0761-3873"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kim Hartmann","raw_affiliation_strings":["Conflict Studies Research Centre,Northamptonshire,United Kingdom","Conflict Studies Research Centre, Northamptonshire, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Conflict Studies Research Centre,Northamptonshire,United Kingdom","institution_ids":[]},{"raw_affiliation_string":"Conflict Studies Research Centre, Northamptonshire, United Kingdom","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5068667600"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.8083,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.77556812,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"405","last_page":"419"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.5049999952316284,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.5049999952316284,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6088511943817139},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3627921938896179}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6088511943817139},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3627921938896179}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/cycon55549.2022.9810903","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon55549.2022.9810903","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"The":[0,136],"internet":[1],"of":[2,12,86,100,107,133,157,167,179,233,299],"things":[3],"(IoT),":[4],"autonomous":[5],"driving,":[6],"or":[7,78],"Industry":[8],"4.0":[9],"\u2013":[10],"regardless":[11],"the":[13,84,94,120,127,131,152,163,238,243,263,297,315],"application":[14],"scenario":[15],"envisioned,":[16],"next-decade":[17],"technologies":[18],"reliant":[19],"on":[20,25,32,154,250,279],"connectivity":[21],"will":[22,256,294],"be":[23,217],"based":[24],"5G":[26,101,134,148,168,186,234,280],"infrastructure":[27,204],"and":[28,37,68,89,97,114,159,162,226,262,277,306],"become":[29],"increasingly":[30],"dependent":[31],"virtualizations":[33],"to":[34,47,62,70,92,110,130,151,216,265,271,285,312],"provide":[35,48],"adequate":[36],"adaptable":[38],"network":[39,42,55,76,235,251,290],"services.":[40],"Virtualized":[41],"functions":[43,64],"(VNFs)":[44],"are":[45,90,145,171,214],"used":[46],"services":[49,160,199],"through":[50],"software":[51,63,258],"that":[52,144,185,213],"replaces":[53],"dedicated":[54],"devices.":[56],"This":[57,220],"shift":[58],"from":[59],"physical":[60],"devices":[61],"allows":[65],"easier":[66],"response":[67],"adaptation":[69],"environmental":[71],"conditions":[72],"(e.g.":[73],"changes":[74],"in":[75],"traffic":[77],"infrastructure).":[79],"As":[80],"such,":[81],"they":[82],"build":[83],"core":[85,141],"modern":[87],"networks":[88,187],"crucial":[91,211],"achieving":[93],"low":[95],"latency":[96],"high":[98],"speed":[99],"networks.":[102,135,149],"However,":[103],"this":[104],"makes":[105],"VNFs":[106],"particular":[108],"interest":[109],"cyber":[111],"criminals,":[112],"hacktivists,":[113],"state-sponsored":[115,124],"hackers.":[116],"In":[117,253],"October":[118],"2019,":[119],"EU":[121],"Commission":[122],"identified":[123,140,209,304],"attackers":[125],"as":[126,201,210],"major":[128],"threat":[129],"security":[132,142,182,236,261],"EU\u2019s":[137],"risk":[138],"assessment":[139],"requirements":[143],"different":[146],"for":[147,175,310],"Due":[150],"reliance":[153],"software,":[155],"types":[156],"devices,":[158],"connected":[161],"heavily":[164,218],"interconnected":[165],"nature":[166],"networks,":[169],"there":[170],"more":[172,191],"entry":[173],"points":[174],"attackers.":[176],"Nokia\u2019s":[177],"head":[178],"product":[180],"management":[181],"has":[183,245],"said":[184],"have":[188,206,229],"200":[189],"times":[190],"attack":[192],"vectors":[193],"than":[194],"their":[195],"4G":[196],"predecessors.":[197],"Network":[198],"such":[200],"VIMs":[202],"(virtualized":[203],"managers)":[205],"already":[207],"been":[208],"assets":[212],"expected":[215],"attacked.":[219],"article":[221],"investigates":[222,270],"how":[223,311],"selected":[224],"NATO":[225],"Western":[227],"allies":[228,274],"addressed":[230],"these":[231],"issues":[232],"over":[237],"past":[239],"two":[240],"years,":[241],"while":[242],"pandemic":[244],"further":[246],"highlighted":[247],"societal":[248],"dependency":[249],"infrastructure.":[252],"particular,":[254],"it":[255],"consider":[257,296],"supply":[259],"chain":[260],"approach":[264],"foreign":[266],"vendor":[267],"integration.":[268],"It":[269,293],"what":[272],"extent":[273],"share":[275],"views":[276],"practices":[278],"security,":[281],"which":[282],"is":[283],"necessary":[284],"ensure":[286],"a":[287],"united,":[288],"secure":[289],"across":[291],"borders.":[292],"also":[295],"implications":[298],"adversary":[300],"activities":[301],"directed":[302],"against":[303],"weaknesses":[305],"offer":[307],"essential":[308],"principles":[309],"cope":[313],"with":[314],"emerging":[316],"threats.":[317]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
