{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:06:15Z","timestamp":1771697175514,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,19]]},"DOI":"10.1109\/iwcmc58020.2023.10183210","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:20:43Z","timestamp":1689960043000},"page":"216-223","source":"Crossref","is-referenced-by-count":11,"title":["A Survey on Securing 6G Wireless Communications based Optimization Techniques"],"prefix":"10.1109","author":[{"given":"Ammar K.","family":"Abasi","sequence":"first","affiliation":[{"name":"Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI),UAE"}]},{"given":"Moayad","family":"Aloqaily","sequence":"additional","affiliation":[{"name":"Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI),UAE"}]},{"given":"Bassem","family":"Ouni","sequence":"additional","affiliation":[{"name":"Technology Innovation Institute (TII),Abu Dhabi,UAE"}]},{"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[{"name":"Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI),UAE"}]},{"given":"Merouane","family":"Debbah","sequence":"additional","affiliation":[{"name":"Technology Innovation Institute (TII),Abu Dhabi,UAE"}]},{"given":"Fakhri","family":"Karray","sequence":"additional","affiliation":[{"name":"Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI),UAE"}]}],"member":"263","reference":[{"key":"ref1","article-title":"How big are global data flows?","year":"2023","journal-title":"wdr2021"},{"key":"ref2","article-title":"Mobile data traffic forecast says seven-times growth in six years","year":"2023","journal-title":"tellusventure"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2797214"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCE48695.2019.00138"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3032896"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3047674"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500409"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/app121910057"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03708-x"},{"key":"ref10","article-title":"To-wards smart city security: Violence and weaponized violence detection using dcnn","author":"Aremu","year":"2022","journal-title":"arXiv preprint arXiv:2207.12850"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103212"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/su141912185"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.11.027"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3161838"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3152739"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-4244-9_5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2022-Spring54318.2022.9860450"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Fall52928.2021.9625294"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/icc45041.2023.10279491"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49033.2022.9700728"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3057074"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.07.003"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103141"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101121"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2023.3262242"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51644.2023.10059840"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001681"}],"event":{"name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","location":"Marrakesh, Morocco","start":{"date-parts":[[2023,6,19]]},"end":{"date-parts":[[2023,6,23]]}},"container-title":["2023 International Wireless Communications and Mobile Computing (IWCMC)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/10182387\/10182368\/10183210.pdf?arnumber=10183210","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,11]],"date-time":"2024-04-11T04:37:59Z","timestamp":1712810279000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/10183210\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,19]]},"references-count":27,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/iwcmc58020.2023.10183210","relation":{},"subject":[],"published":{"date-parts":[[2023,6,19]]}}}