{"id":2089,"date":"2023-09-28T13:07:02","date_gmt":"2023-09-28T13:07:02","guid":{"rendered":"https:\/\/k3ylabs.com\/?p=2089"},"modified":"2023-09-28T13:52:12","modified_gmt":"2023-09-28T13:52:12","slug":"k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks","status":"publish","type":"post","link":"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\/","title":{"rendered":"K3Y Ltd authors a paper on \u201cGenerating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks\u201d"},"content":{"rendered":"<div id=\"pl-2089\"  class=\"panel-layout\" ><div id=\"pg-2089-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-2089-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-2089-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>K3Y Ltd is proud to announce that the paper entitled <em><strong>\"Generating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks\"<\/strong><\/em> has been published by AEU - International Journal of Electronics and Communications: <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1434841123003874?via%3Dihub\">https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1434841123003874?via%3Dihub<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>The authors (<a href=\"https:\/\/www.linkedin.com\/in\/georgios-a\/\">George Amponis<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/panagiotisrg\/\">Panagiotis Radoglou Grammatikis<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/thomas-lagkas-39484a18\/\">Thomas Lagkas<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/savvas-ouzounidis-95319137\/\">\u03a3\u03ac\u03b2\u03b2\u03b1\u03c2 \u039f\u03c5\u03b6\u03bf\u03c5\u03bd\u03af\u03b4\u03b7\u03c2<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/maria-zevgara\/\">Maria Zevgara<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/john-moscholios-a7ba845\/\">Ioannis Moscholios<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/sotirios-goudos-01b4b3158\/\">Sotirios Goudos<\/a> and <a href=\"https:\/\/www.linkedin.com\/in\/panagiotis-sarigiannidis-7636901a\/\">Panagiotis Sarigiannidis)<\/a> investigate the potential of 5G attacks targeting individual subscriber PDU sessions in a persistent manner, accounting for handovers.<\/p>\n<p>&nbsp;<\/p>\n<p>This work was implemented in the context of <a href=\"https:\/\/sancus-project.eu\/\">SANCUS<\/a> Project.<\/p>\n<p>&nbsp;<\/p>\n<p>There is also a pre-print version of the paper available in Research Gate: <a href=\"https:\/\/www.researchgate.net\/publication\/374037169_Generating_full-stack_5G_security_datasets_IP-layer_and_core_network_persistent_PDU_session_attacks\">https:\/\/www.researchgate.net\/publication\/374037169_Generating_full-stack_5G_security_datasets_IP-layer_and_core_network_persistent_PDU_session_attacks<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>K3Y Ltd is proud to announce that the paper entitled &#8220;Generating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks&#8221; has been published by AEU &#8211; International Journal of Electronics and Communications: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1434841123003874?via%3Dihub &nbsp; The authors (George Amponis, Panagiotis Radoglou Grammatikis, Thomas Lagkas, Savvas Ouzounidis, Maria Zevgara, Ioannis Moscholios, Sotirios Goudos and&hellip; <a class=\"more-link\" href=\"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\/\">\u03a3\u03c5\u03bd\u03b5\u03c7\u03af\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03b6\u03b5\u03c4\u03b5 \u03c4\u03bf <span class=\"screen-reader-text\">K3Y Ltd authors a paper on \u201cGenerating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks\u201d<\/span><\/a><\/p>","protected":false},"author":4,"featured_media":2090,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[8],"class_list":["post-2089","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>K3Y Ltd authors a paper on \u201cGenerating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks\u201d - k3y<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"el_GR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"K3Y Ltd authors a paper on \u201cGenerating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks\u201d - k3y\" \/>\n<meta property=\"og:description\" content=\"K3Y Ltd is proud to announce that the paper entitled &quot;Generating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks&quot; has been published by AEU - International Journal of Electronics and Communications: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1434841123003874?via%3Dihub &nbsp; The authors (George Amponis, Panagiotis Radoglou Grammatikis, Thomas Lagkas, Savvas Ouzounidis, Maria Zevgara, Ioannis Moscholios, Sotirios Goudos and&hellip; \u03a3\u03c5\u03bd\u03b5\u03c7\u03af\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03b6\u03b5\u03c4\u03b5 \u03c4\u03bf K3Y Ltd authors a paper on \u201cGenerating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"k3y\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-28T13:07:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-28T13:52:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/k3ylabs.com\/wp-content\/uploads\/2023\/09\/Generating-full-stack-5G-security-datasets-IP-layer-and-core-network-persistent-PDU-session-attacks-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1884\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"k3y news\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u03a3\u03c5\u03bd\u03c4\u03ac\u03c7\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc\" \/>\n\t<meta name=\"twitter:data1\" content=\"k3y news\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0395\u03ba\u03c4\u03b9\u03bc\u03ce\u03bc\u03b5\u03bd\u03bf\u03c2 \u03c7\u03c1\u03cc\u03bd\u03bf\u03c2 \u03b1\u03bd\u03ac\u03b3\u03bd\u03c9\u03c3\u03b7\u03c2\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 \u03bb\u03b5\u03c0\u03c4\u03cc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\\\/\"},\"author\":{\"name\":\"k3y news\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/9c622781378c531311096a78feb83f04\"},\"headline\":\"K3Y Ltd authors a paper on \u201cGenerating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks\u201d\",\"datePublished\":\"2023-09-28T13:07:02+00:00\",\"dateModified\":\"2023-09-28T13:52:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\\\/\"},\"wordCount\":149,\"image\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Generating-full-stack-5G-security-datasets-IP-layer-and-core-network-persistent-PDU-session-attacks-scaled.jpg\",\"keywords\":[\"News\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"el\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\\\/\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\\\/\",\"name\":\"K3Y Ltd authors a paper on \u201cGenerating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks\u201d - k3y\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Generating-full-stack-5G-security-datasets-IP-layer-and-core-network-persistent-PDU-session-attacks-scaled.jpg\",\"datePublished\":\"2023-09-28T13:07:02+00:00\",\"dateModified\":\"2023-09-28T13:52:12+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/9c622781378c531311096a78feb83f04\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\\\/#breadcrumb\"},\"inLanguage\":\"el\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"el\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Generating-full-stack-5G-security-datasets-IP-layer-and-core-network-persistent-PDU-session-attacks-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Generating-full-stack-5G-security-datasets-IP-layer-and-core-network-persistent-PDU-session-attacks-scaled.jpg\",\"width\":2560,\"height\":1884},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/k3ylabs.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"K3Y Ltd authors a paper on \u201cGenerating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#website\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/\",\"name\":\"k3y\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/k3ylabs.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"el\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/9c622781378c531311096a78feb83f04\",\"name\":\"k3y news\",\"sameAs\":[\"https:\\\/\\\/deasytal.com\\\/\"],\"url\":\"https:\\\/\\\/k3ylabs.com\\\/el\\\/author\\\/k3y\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"K3Y Ltd authors a paper on \u201cGenerating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks\u201d - k3y","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\/","og_locale":"el_GR","og_type":"article","og_title":"K3Y Ltd authors a paper on \u201cGenerating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks\u201d - k3y","og_description":"K3Y Ltd is proud to announce that the paper entitled \"Generating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks\" has been published by AEU - International Journal of Electronics and Communications: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1434841123003874?via%3Dihub &nbsp; The authors (George Amponis, Panagiotis Radoglou Grammatikis, Thomas Lagkas, Savvas Ouzounidis, Maria Zevgara, Ioannis Moscholios, Sotirios Goudos and&hellip; \u03a3\u03c5\u03bd\u03b5\u03c7\u03af\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03b6\u03b5\u03c4\u03b5 \u03c4\u03bf K3Y Ltd authors a paper on \u201cGenerating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks\u201d","og_url":"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\/","og_site_name":"k3y","article_published_time":"2023-09-28T13:07:02+00:00","article_modified_time":"2023-09-28T13:52:12+00:00","og_image":[{"width":2560,"height":1884,"url":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2023\/09\/Generating-full-stack-5G-security-datasets-IP-layer-and-core-network-persistent-PDU-session-attacks-scaled.jpg","type":"image\/jpeg"}],"author":"k3y news","twitter_card":"summary_large_image","twitter_misc":{"\u03a3\u03c5\u03bd\u03c4\u03ac\u03c7\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc":"k3y news","\u0395\u03ba\u03c4\u03b9\u03bc\u03ce\u03bc\u03b5\u03bd\u03bf\u03c2 \u03c7\u03c1\u03cc\u03bd\u03bf\u03c2 \u03b1\u03bd\u03ac\u03b3\u03bd\u03c9\u03c3\u03b7\u03c2":"1 \u03bb\u03b5\u03c0\u03c4\u03cc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\/#article","isPartOf":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\/"},"author":{"name":"k3y news","@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/9c622781378c531311096a78feb83f04"},"headline":"K3Y Ltd authors a paper on \u201cGenerating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks\u201d","datePublished":"2023-09-28T13:07:02+00:00","dateModified":"2023-09-28T13:52:12+00:00","mainEntityOfPage":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\/"},"wordCount":149,"image":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2023\/09\/Generating-full-stack-5G-security-datasets-IP-layer-and-core-network-persistent-PDU-session-attacks-scaled.jpg","keywords":["News"],"articleSection":["Blog"],"inLanguage":"el"},{"@type":"WebPage","@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\/","url":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\/","name":"K3Y Ltd authors a paper on \u201cGenerating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks\u201d - k3y","isPartOf":{"@id":"https:\/\/k3ylabs.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\/#primaryimage"},"image":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2023\/09\/Generating-full-stack-5G-security-datasets-IP-layer-and-core-network-persistent-PDU-session-attacks-scaled.jpg","datePublished":"2023-09-28T13:07:02+00:00","dateModified":"2023-09-28T13:52:12+00:00","author":{"@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/9c622781378c531311096a78feb83f04"},"breadcrumb":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\/#breadcrumb"},"inLanguage":"el","potentialAction":[{"@type":"ReadAction","target":["https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"el","@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\/#primaryimage","url":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2023\/09\/Generating-full-stack-5G-security-datasets-IP-layer-and-core-network-persistent-PDU-session-attacks-scaled.jpg","contentUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2023\/09\/Generating-full-stack-5G-security-datasets-IP-layer-and-core-network-persistent-PDU-session-attacks-scaled.jpg","width":2560,"height":1884},{"@type":"BreadcrumbList","@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-generating-full-stack-5g-security-datasets-ip-layer-and-core-network-persistent-pdu-session-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/k3ylabs.com\/"},{"@type":"ListItem","position":2,"name":"K3Y Ltd authors a paper on \u201cGenerating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks\u201d"}]},{"@type":"WebSite","@id":"https:\/\/k3ylabs.com\/#website","url":"https:\/\/k3ylabs.com\/","name":"k3y","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/k3ylabs.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"el"},{"@type":"Person","@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/9c622781378c531311096a78feb83f04","name":"k3y news","sameAs":["https:\/\/deasytal.com\/"],"url":"https:\/\/k3ylabs.com\/el\/author\/k3y\/"}]}},"_links":{"self":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/2089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/comments?post=2089"}],"version-history":[{"count":4,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/2089\/revisions"}],"predecessor-version":[{"id":2094,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/2089\/revisions\/2094"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/media\/2090"}],"wp:attachment":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/media?parent=2089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/categories?post=2089"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/tags?post=2089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}