ITU's 160 anniversary

Connecting the world and beyond

WTDC 2025

SG17 - List of Editors (Study Period 2025-2028)

Export:   
ITEM and TITLE EDITOR
CRAMM Roadmap

SG17 Cyber Security Reference Architectures, Models and Methodologies Strategy and Roadmap


N. Kishor NARANG
Editor

Email: design[at]narnix.com
Arnaud TADDEI
Editor

Email: arnaud.taddei[at]broadcom.com
Security Compendium

ICT Security Compendium


Sandor MAZGON
Editor

Email: sandor.mazgon[at]ties.itu.int
Security standards roadmap

ICT Security standards roadmap


Yiwen WANG
Editor

Email: wangyiwen[at]caict.ac.cn
SG17 implementation of PP-22 Res

SG17 activities and achievements in support of the most recent Resolutions of the ITU PP


Juhee KI
Editor

Email: eye[at]iitp.kr
SG17 implementation of WTSA Res

SG17 activities and achievements in support of the most recent Resolutions of the WTSA


Juhee KI
Editor

Email: eye[at]iitp.kr
TR.PKIC-man-ib

Technical Report: Technical guidelines for Web PKI certificate validation and fine-grained configuration for Internet browser


Yu FU
Editor

Email: fuy186[at]chinaunicom.cn
Penghui LIU
Editor

Email: liuph[at]pcl.ac.cn
Xiang LIU
Editor

Email: liux15[at]pcl.ac.cn
Rongwei YANG
Editor

Email: yangrw[at]pcl.ac.cn
X.5Gsec-asra

Guidelines and Technical Requirements for 5G Network Asset Security Risk Analysis


Qin QIU
Editor

Email: qiuqin[at]chinamobile.com
Daoli SU
Editor

Email: sudl[at]chinatelecom.cn
Tian TIAN
Editor

Email: tian.tian1[at]zte.com.cn
Jing WANG
Editor

Email: wang.jing17[at]zte.com.cn
X.5Gsec-FMSC

Security requirements and guidelines for fixed, mobile and satellite convergence of IMT-2020 networks and beyond


Jingpeng BAI
Editor

Email: baijp[at]chinatelecom.cn
Jun SHEN
Editor

Email: shenjun6[at]chinatelecom.cn
Zecheng XIE
Editor

Email: xiezc18[at]chinaunicom.cn
Zhonghuai XIE
Editor

Email: xiezh55[at]chinaunicom.cn
X.5Gsec-scio

Framework of security capability intelligent orchestration system for IMT-2020 network


Jingpeng BAI
Editor

Email: baijp[at]chinatelecom.cn
Zecheng XIE
Editor

Email: xiezc18[at]chinaunicom.cn
Zhonghuai XIE
Editor

Email: xiezh55[at]chinaunicom.cn
Leyi ZHANG
Editor

Email: leyi.zhang[at]zte.com.cn
X.509Amd.2

The Directory: Public-key and attribute certificate frameworks


Erik ANDERSEN
Editor

Email: era[at]x500.eu
X.510 Amd.1

The Directory - Protocol specifications for secure operations


Erik ANDERSEN
Editor

Email: era[at]x500.eu
X.1053 rev

Information security controls based on ITU-T X.1051 for small and medium-sized telecommunication organizations


Changoh KIM
Editor

Email: peterx.1053[at]gmail.com
Thaib MUSTAFA
Editor

Email: thaibmus[at]tab.com.my
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
X.1058 rev

Information security, cybersecurity and privacy protection — Code of practice for personally identifiable information protection


Changoh KIM
Editor

Email: peterx.1053[at]gmail.com
Jinghua MIN
Editor

Email: minjinghua[at]cecgw.cn
Thaib MUSTAFA
Editor

Email: thaibmus[at]tab.com.my
Zoe Sungchae PARK
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
X.1060 rev

Framework for the creation and operation of a cyber defence/security centre


Arnaud TADDEI
Editor

Email: arnaud.taddei[at]broadcom.com
Shigenori TAKEI
Editor

Email: Shigenori.Takei[at]scsksecurity.co.jp
X.1062

Framework for Security Human Capability Development


Lee HWEE HSIUNG
Editor

Email: hh.lee[at]cybersecurity.my
Khairul KAMARUDIN
Editor

Email: khairul.ekhwan[at]mtsfb.org.my
Thaib MUSTAFA
Editor

Email: thaibmus[at]tab.com.my
Norkhadhra NAWAWI
Editor

Email: norkhadhra[at]fnsvalue.co.kr
X.1128

Security features to assess mobile terminal security


Samir ABDELGAWAD
Editor

Email: sgaber[at]tra.gov.eg
Zhiyuan HU
Editor

Email: huzhiyuan[at]vivo.com
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
X.1129

Security guidelines for mobile terminal integrity protection


Samir ABDELGAWAD
Editor

Email: sgaber[at]tra.gov.eg
Zhiyuan HU
Editor

Email: huzhiyuan[at]vivo.com
Weidong WANG
Editor

Email: wangweidong[at]chinawllc.com
X.1130

Technical guidelines for fraud detection of malicious applications in mobile devices


Xiaoyuan BAI
Editor

Email: xiaoyuan.bxy[at]antgroup.com
Zhiyuan HU
Editor

Email: huzhiyuan[at]vivo.com
Hazirah MD NAWI
Editor

Email: hazirah[at]mcmc.gov.my
Jin PENG
Editor

Email: jim.pj[at]antgroup.com
Weidong WANG
Editor

Email: wangweidong[at]chinawllc.com
Wenbiao ZHAO
Editor

Email: wenbiao.zwb[at]antgroup.com
X.1238

Guidelines for countering spam over rich communication service (RCS) messaging


Huamin JIN
Editor

Email: jhm[at]gsta.com;
Shuai WANG
Editor

Email: wangs[at]gsta.com
Haodi ZHANG
Editor

Email: zhanghaodi[at]chinatelecom.cn
Yanbin ZHANG
Editor

Email: zhangyanbin[at]caict.ac.cn
X.1250

Baseline capabilities for enhanced identity management and interoperability


Abbie BARBIR
Editor

Email: barbira[at]cvshealth.com
Sylvan TRAN
Editor

Email: s.t[at]lshd.us
X.1254 rev

Entity authentication assurance framework


Abbie BARBIR
Editor

Email: barbira[at]cvshealth.com
Sylvan TRAN
Editor

Email: s.t[at]lshd.us
X.1280 rev

Framework for out-of-band mutual authentication using mobile devices


Il Jin JUNG
Editor

Email: jiljin[at]estorm.co.kr
Taeil LEE
Editor

Email: tail[at]estorm.co.kr
Heejun SHIN
Editor

Email: heejun[at]estorm.co.kr
Jonghyun WOO
Editor

Email: jhwoo[at]dualauth.com
X.1281.Amd1

APIs for interoperability of identity management systems


Abbie BARBIR
Editor

Email: barbira[at]cvshealth.com
X.1400 rev

Terms and definitions for distributed ledger technology


Jae Nam KO
Editor

Email: jnko[at]sch.ac.kr
Zoe Sungchae PARK
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
X.1457

Security threats and requirements for information recommendation service


Zhiyuan HU
Editor

Email: huzhiyuan[at]vivo.com
Junzhi YAN
Editor

Email: yanjunzhi[at]chinamobile.com
Yunwei ZHAO
Editor

Email: zhaoyw[at]cert.org.cn
X.1631

Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for cloud services


Nan MENG
Editor

Email: mengnan[at]caict.ac.cn
Koji NAKAO
Editor

Email: ko-nakao[at]nict.go.jp
X.1649

Security guidelines for multi-cloud


Wei LIU
Editor

Email: liuw147[at]chinaunicom.cn
Nan MENG
Editor

Email: mengnan[at]caict.ac.cn
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
Lei XU
Editor

Email: xulei56[at]chinaunicom.cn
Yi ZHANG
Editor

Email: enidzhang2019[at]163.com
X.1753

Guidelines for data security using machine learning in big data infrastructure


Mi CAO
Editor

Email: caom11[at]chinaunicom.cn
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
Laifu WANG
Editor

Email: wanglaifu[at]chinatelecom.cn
Lei XU
Editor

Email: xulei56[at]chinaunicom.cn
X.AA-LLM

Guidelines for Preventing and Mitigating Adversarial Attacks on LLMs in Metaverse and Digital Twin Environments


Aurindam BHATTACHARYA
Editor

Email: aurindam[at]cdot.in
Navin MANASWI
Editor

Email: manaswi.navin[at]gmail.com
Manivannan MUNIYANDI
Editor

Email: mani[at]iitm.ac.in
Raghav PURWAR
Editor

Email: rpurwar.96[at]gov.in
Namrata SINGH
Editor

Email: namrata.singh51[at]gov.in
R. S. SINGH
Editor

Email: ddgsd.tec[at]gov.in
X.aamd-sec

Security guidelines for categorized data in advanced air mobility (AAM)


Changhun JUNG
Editor

Email: changhun[at]hyundai.com
Sang-Woo LEE
Editor

Email: ttomlee[at]etri.re.kr
Yousik LEE
Editor

Email: yousik.lee[at]sch.ac.kr
Seungwook PARK
Editor

Email: seungwook.park[at]hyundai.com
X.aas

Information security, cybersecurity and privacy protection — Age assurance systems — Part 1: Framework


El-Sayed Ali Gomaa EL-SAYED ALI
Editor

Email: eali[at]cra.gov.qa
Honey MAKOLA
Editor

Email: hmakola[at]icasa.org.za
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
X.accsadlt

Access security authentication based on DLT


Seung Ju JEON
Editor

Email: jkme098[at]fnsvalue.co.kr
Ariff Olan KHOLID
Editor

Email: ariffolan[at]fnsvalue.co.kr
Radhilufti MADEHI
Editor

Email: radhi[at]fnsvalue.co.kr
Norkhadhra NAWAWI
Editor

Email: norkhadhra[at]fnsvalue.co.kr
X.af-sec

Evaluation methodologies for anonymization techniques using face images in autonomous vehicles


Sang-Woo LEE
Editor

Email: ttomlee[at]etri.re.kr
Yousik LEE
Editor

Email: yousik.lee[at]sch.ac.kr
Jae Hoon NAH
Editor

Email: jhnah[at]etri.re.kr
X.AI-App_policy

Reference architecture for AI-assisted analysis of consistency between App's data usage behaviour and its privacy policy


Wentao CHEN
Editor

Email: chenwentao[at]caict.ac.cn
Zhiyuan HU
Editor

Email: huzhiyuan[at]vivo.com
Weidong WANG
Editor

Email: wangweidong[at]chinawllc.com
Yunwei ZHAO
Editor

Email: zhaoyw[at]cert.org.cn
X.AI-gcd

Guidelines for Artificial Intelligence-generated content detection


Shiqi LI
Editor

Email: lishiqi.li[at]alibaba-inc.com
Yong SUN
Editor

Email: sy359975[at]alibaba-inc.com
Jishen ZENG
Editor

Email: jishen.zjs[at]alibaba-inc.com
X.APIrsd

Technical requirements for public API runtime security risk detection


Jie CHEN
Editor

Email: chenj135[at]chinatelecom.cn
Shuai WANG
Editor

Email: wangshuai8[at]chinatelecom.cn
Haodi ZHANG
Editor

Email: zhanghaodi[at]chinatelecom.cn
X.arch-design

Design principles and best practices for security architectures


N. Kishor NARANG
Editor

Email: design[at]narnix.com
Arnaud TADDEI
Editor

Email: arnaud.taddei[at]broadcom.com
X.asm-cc

Requirements of attack surface management for cloud computing


Maofei CHEN
Editor

Email: chenmf6[at]chinatelecom.cn
Fangfang DAI
Editor

Email: daifangfang[at]caict.ac.cn
Dongxin LIU
Editor

Email: liudongxin[at]chinatelecom.cn
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
Laifu WANG
Editor

Email: wanglaifu[at]chinatelecom.cn
X.bvm

Requirements for biometric variability management


Jason KIM
Editor

Email: jasonkim_korea[at]naver.com
Eunjeong PARK
Editor

Email: eunjeong.ej[at]gmail.com
Han TAEHWA
Editor

Email: taehwa.han[at]gmail.com
X.C2M2

Cybersecurity capability maturity model for telecommunication organisations


Jainendra BAHADUR
Editor

Email: dyscecyber-nscs[at]gov.in
Divya SHARMA
Editor

Email: divya.sharma87[at]gov.in
X.cdc-csirt

Relationship between Cyber Defence/Security Center and Computer Security Incident Response Team


Arnaud TADDEI
Editor

Email: arnaud.taddei[at]broadcom.com
X.ckrp

Framework of cryptographic key resource pool for cloud computing


Ming HE
Editor

Email: heming8[at]chinatelecom.cn
Gang LIU
Editor

Email: gang.3.liu[at]nokia.com
Jun SHEN
Editor

Email: shenjun6[at]chinatelecom.cn
X.cov-sec

Security guidelines for countermeasures against covert channels in connected vehicles


Sang-Woo LEE
Editor

Email: ttomlee[at]etri.re.kr
Seungwook PARK
Editor

Email: seungwook.park[at]hyundai.com
X.cramms

Framework for cyber security reference architectures, models and methodologies strategy and roadmap (CRAMMS)


N. Kishor NARANG
Editor

Email: design[at]narnix.com
Zoe Sungchae PARK
Editor

Email: zoesc.park[at]sch.ac.kr
Arnaud TADDEI
Editor

Email: arnaud.taddei[at]broadcom.com
Chen ZHANG
Editor

Email: zhangchen[at]cmdi.chinamobile.com
X.cs-ra

Cyber security reference architecture


N. Kishor NARANG
Editor

Email: design[at]narnix.com
Zoe Sungchae PARK
Editor

Email: zoesc.park[at]sch.ac.kr
Preetika SINGH
Editor

Email: preetika.singh87[at]gov.in
Pushpendra Kumar SINGH
Editor

Email: pushpendraks.its[at]gov.in
X.DLT-dgi

Security requirements of DLT gateway for interoperability


Jung Yeon HWANG
Editor

Email: jyhwang[at]sungshin.ac.kr
Xiongwei JIA
Editor

Email: jiaxw9[at]chinaunicom.cn
Migyeong KIM
Editor

Email: mg.kim[at]dreamsecurity.com
Kim YOUNGJIN
Editor

Email: kimyngjin[at]gmail.com
X.dlt-share

Security requirements for data application software based on DLT to achieve statistics


Hang DONG
Editor

Email: donghang[at]chinamobile.com
Shenglan LIU
Editor

Email: liushenglan[at]cmdi.chinamobile.com
Chen ZHANG
Editor

Email: zhangchen[at]cmdi.chinamobile.com
Feng ZHANG
Editor

Email: zhangfeng[at]chinamobile.com
X.dpki

Decentralized Public-key infrastructure


Erik ANDERSEN
Editor

Email: era[at]x500.eu
X.dtns

Guidelines of using digital twin of network for network security


HaiTao DU
Editor

Email: duhaitao[at]chinamobile.com
Li SU
Editor

Email: suli[at]chinamobile.com
Ke WANG
Editor

Email: wangkeyj[at]chinamobile.com
Junjie XIA
Editor

Email: xiajj2[at]chinaunicom.cn
X.ececu-sec

Security requirements for externally connected electronic control units of connected vehicles


Nan LAN
Editor

Email: lannan[at]caeri.com.cn
Yufeng LI
Editor

Email: liyufeng_shu[at]shu.edu.cn
Wei XU
Editor

Email: xuwei[at]caeri.com.cn
Shichun YANG
Editor

Email: yangshichun[at]buaa.edu.cn
Yi ZHANG
Editor

Email: enidzhang2019[at]163.com
X.evpnc-sec

Security guidelines for electric vehicle plug and charge (PnC) services using vehicle identity (VID)


Byoung-Moon CHIN
Editor

Email: bmchin[at]tta.or.kr
Zoe Sungchae PARK
Editor

Email: zoesc.park[at]sch.ac.kr
Kiho YEO
Editor

Email: beware523[at]paran.com
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
X.fod-sec

Security guidelines for a feature on demand (FoD) service in a connected vehicle environment


Jiyong HAN
Editor

Email: jiyong.han[at]hyundai.com
Changhun JUNG
Editor

Email: changhun[at]hyundai.com
Seungwook PARK
Editor

Email: seungwook.park[at]hyundai.com
X.fr-msp

Functional Requirements of Microsegmentation Platform in a cloud-based environment


Huamin JIN
Editor

Email: jinhm.gd[at]chinatelecom.cn
Shuai WANG
Editor

Email: wangshuai8[at]chinatelecom.cn
Haodi ZHANG
Editor

Email: zhanghaodi[at]chinatelecom.cn
X.fr-vsasi

Functional requirements for visualization service of network security assets and security incidents based on digital twin


Feng GAO
Editor

Email: gaofeng149[at]chinaunicom.cn
Mengxiang HAN
Editor

Email: hanmx12[at]chinaunicom.cn
Ke WANG
Editor

Email: wangkeyj[at]chinamobile.com
Junjie XIA
Editor

Email: xiajj2[at]chinaunicom.cn
X.gapci

Guidelines on Anti-DDoS protection for cloud infrastructure


Lin CHEN
Editor

Email: chenlin6[at]caict.ac.cn
Hang DONG
Editor

Email: donghang[at]chinamobile.com
Nan MENG
Editor

Email: mengnan[at]caict.ac.cn
Yue SHI
Editor

Email: shiyue1[at]caict.ac.cn
X.gcspcc

Guidelines of developing of cybersecurity simulation platform based on cloud computing


Lu CHEN
Editor

Email: chenl225[at]chinaunicom.cn
Wei LIU
Editor

Email: liuw147[at]chinaunicom.cn
Nan MENG
Editor

Email: mengnan[at]caict.ac.cn
Shuai WANG
Editor

Email: wangshuai8[at]chinatelecom.cn
Lei XU
Editor

Email: xulei56[at]chinaunicom.cn
X.gdso-cs

Guidelines of development, security and operations (DevSecOps) for cloud service


Maofei CHEN
Editor

Email: chenmf6[at]chinatelecom.cn
Xianjun LONG
Editor

Email: longxj[at]chinatelecom.cn
Laifu WANG
Editor

Email: wanglaifu[at]chinatelecom.cn
X.GenAI-FT

Security guidelines for fine-tuning generative AI model


Xiaoyuan BAI
Editor

Email: xiaoyuan.bxy[at]antgroup.com
Wentao CHEN
Editor

Email: chenwentao[at]caict.ac.cn
Zhiyuan HU
Editor

Email: huzhiyuan[at]vivo.com
Weidong WANG
Editor

Email: wangweidong[at]chinawllc.com
Yunwei ZHAO
Editor

Email: zhaoyw[at]cert.org.cn
X.gnssa-iot

Guidelines of implementing network security situational awareness for IoT systems


Maofei CHEN
Editor

Email: chenmf6[at]chinatelecom.cn
Zhaoji LIN
Editor

Email: lin.zhaoji[at]foxmail.com
Dongxin LIU
Editor

Email: liudongxin[at]chinatelecom.cn
Laifu WANG
Editor

Email: wanglaifu[at]chinatelecom.cn
X.gpmr

Guidelines and security measures for prevention and mitigation of ransomware


Mufan CUI
Editor

Email: cuimf[at]cert.org.cn
Feng GAO
Editor

Email: gaofeng149[at]chinaunicom.cn
Zhihui HAN
Editor

Email: hzh[at]cert.org.cn
Minfeng QIU
Editor

Email: qiuminfeng[at]chinamobile.com
Wenlei WANG
Editor

Email: wwl[at]cert.org.cn
X.gsm-cdc

Guidelines on Security Metrics for CDC


Hiroshi TAKECHI
Editor

Email: hiro[at]takechi.org
X.ias

Functional requirements for the integrated authentication service of telecommunication operators


Hang DONG
Editor

Email: donghang[at]chinamobile.com
Chen ZHANG
Editor

Email: zhangchen[at]cmdi.chinamobile.com
Yunfa ZHU
Editor

Email: 19802024070[at]139.com
X.icd-schemas

Vendor agnostic security data schemas for integrated cyber defence solutions


Arnaud TADDEI
Editor

Email: arnaud.taddei[at]broadcom.com
X.idse

Evaluation methodology for in-vehicle intrusion detection systems


Weiwei GONG
Editor

Email: gongweiwei[at]360.cn
Huamin JIN
Editor

Email: jhm[at]gsta.com;
Laifu WANG
Editor

Email: wanglaifu[at]chinatelecom.cn
Minrui YAN
Editor

Email: yanminrui1[at]huawei.com
Yi ZHANG
Editor

Email: enidzhang2019[at]163.com
X.ig-dw

Implementation guidelines for digital watermarking


Shiqi LI
Editor

Email: lishiqi.li[at]alibaba-inc.com
Weiwei SUN
Editor

Email: sunweiwei.sww[at]alibaba-inc.com
Yong SUN
Editor

Email: sy359975[at]alibaba-inc.com
X.iot-dt

Technical requirements for verification of IoT data security


Wenyu DONG
Editor

Email: dongwenyu[at]chinamobile.com
Junzhi YAN
Editor

Email: yanjunzhi[at]chinamobile.com
Feng ZHANG
Editor

Email: zhangfeng[at]chinamobile.com
X.IoT-RF-Auth

Security framework for radio frequency characteristics-based IoT device authentication


Na CAO
Editor

Email: xt-caona[at]jx.sgcc.com.cn
Rixuan QIU
Editor

Email: xt-qiurx[at]jx.sgcc.com.cn
X.ivkm-sec

Security requirements and guidelines for the in-vehicle key management


Jiyong HAN
Editor

Email: jiyong.han[at]hyundai.com
Sang-Woo LEE
Editor

Email: ttomlee[at]etri.re.kr
Yousik LEE
Editor

Email: yousik.lee[at]sch.ac.kr
Seungwook PARK
Editor

Email: seungwook.park[at]hyundai.com
X.mbaas-cs-sec

Security requirements and framework of collaboration service for multiple blockchain as a service platforms


Xiongwei JIA
Editor

Email: jiaxw9[at]chinaunicom.cn
Keng LI
Editor

Email: kli[at]fiberhome.com
Yimin LIU
Editor

Email: liuym[at]chinaunicom.cn
Qiuli MEI
Editor

Email: meiqiuli2010[at]163.com
Kyeong Hee OH
Editor

Email: khoh[at]tcaservices.kr
Yuwei WANG
Editor

Email: ywwang[at]ict.ac.cn
X.MVSC

Minimum viable security controls


Gabor ACS-KURUCZ
Editor

Email: acskurucz[at]google.com
X.nspam

Security framework for network storage protection against malware attacks


Bongchan KIM
Editor

Email: kbchani[at]namusoft.co.kr
Jonghyun KIM
Editor

Email: jhk[at]etri.re.kr
Sujung PARK
Editor

Email: sjpark[at]tta.or.kr
Sungyong SHIN
Editor

Email: syshin[at]filingbox.com
Jonghyun WOO
Editor

Email: jhwoo[at]dualauth.com
X.oob-pacs

Framework for out-of-band physical access control systems using beacon-initiated mutual authentication


Il Jin JUNG
Editor

Email: jiljin[at]estorm.co.kr
Tail LEE
Editor

Email: tail3831[at]estorm.co.kr
Youngjoo LEE
Editor

Email: yjyjoo99[at]naver.com
Sujung PARK
Editor

Email: sjpark[at]tta.or.kr
Heejun SHIN
Editor

Email: heejun[at]estorm.co.kr
Jonghyun WOO
Editor

Email: jhwoo[at]dualauth.com
X.ota-sec

Implementation and evaluation of security functions to support over-the-air (OTA) update capability in connected vehicles


Sang-Woo LEE
Editor

Email: ttomlee[at]etri.re.kr
Yousik LEE
Editor

Email: yousik.lee[at]sch.ac.kr
Seungwook PARK
Editor

Email: seungwook.park[at]hyundai.com
Samuel WOO
Editor

Email: samuelwoo[at]dankook.ac.kr
X.pg-cla

A guideline for continual learning to actively respond to network attacks


Jae Hoon NAH
Editor

Email: jhnah[at]etri.re.kr
Jongyoul PARK
Editor

Email: jongyoul[at]seoultech.ac.kr
X.qsdlt-ca

Guidelines for building crypto-agility and migration for quantum-safe DLT systems


Fuwen LIU
Editor

Email: liufuwen[at]chinamobile.com
Ke WANG
Editor

Email: wangkeyj[at]chinamobile.com
Weidong WANG
Editor

Email: wangweidong[at]chinawllc.com
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
X.rs-certi

Framework for risk assessment of server certificate in application


Xiang LIU
Editor

Email: liux15[at]pcl.ac.cn
Haiguang WANG
Editor

Email: wang.haiguang1[at]huawei.com
Rongwei YANG
Editor

Email: yangrw[at]pcl.ac.cn
Bin ZHANG
Editor

Email: zhangb[at]pcl.ac.cn
X.S-AIA

Security requirements and guidelines for Artificial Intelligence agent


Zhiyuan HU
Editor

Email: huzhiyuan[at]vivo.com
Jing JING
Editor

Email: jingjing[at]caict.ac.cn
Quanchao LIU
Editor

Email: liuquanchao[at]chinamobile.com
Ke WANG
Editor

Email: wangkeyj[at]chinamobile.com
Feng ZHANG
Editor

Email: zhangfeng[at]chinamobile.com
X.scr-cna

Security requirements of sandboxed container runtime for cloud native applications


Zeya ZHU
Editor

Email: zhuzy13[at]chinatelecom.cn
X.sc-sscti

Guidelines on Security Capabilities for Software Supply Chain in the Telecommunications Industry


Yuanying XIAO
Editor

Email: xiaoyy1[at]chinatelecom.cn
Jia XIE
Editor

Email: xiej68[at]chinatelecom.cn
Baoqi YAN
Editor

Email: yanbq[at]chinatelecom.cn
X.sec_QKD_profr

Framework of quantum key distribution (QKD) protocols in QKD network


Mariko HONDA
Editor

Email: tmyrkhonda[at]gmail.com
Hao QIN
Editor

Email: hao.qin[at]nus.edu.sg
X.sec_QKDNi

Security requirements for Quantum Key Distribution Network interworking (QKDNi)


Yazi WANG
Editor

Email: yazi_wang[at]bupt.edu.cn
Xiaosong YU
Editor

Email: xiaosongyu[at]bupt.edu.cn
Yongli ZHAO
Editor

Email: yonglizhao[at]bupt.edu.cn
X.secadef

Security capabilities definitions


Arnaud TADDEI
Editor

Email: arnaud.taddei[at]broadcom.com
Chen ZHANG
Editor

Email: zhangchen[at]cmdi.chinamobile.com
X.sec-grp-mov

Security guideline for group movement service platform


Changoh KIM
Editor

Email: peterx.1053[at]gmail.com
HuyKang KIM
Editor

Email: cenda[at]korea.ac.kr
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
X.sec-va

Security guidelines for vertical applications within the IMT-2020 ecosystem


Jingpeng BAI
Editor

Email: baijp[at]chinatelecom.cn
Wang SHAOMIN
Editor

Email: wangshaomin[at]chinatelecom.cn
Xuan SI
Editor

Email: six1[at]chinatelecom.cn
Zhonghuai XIE
Editor

Email: xiezh55[at]chinaunicom.cn
X.sfdiw

Security framework of digital identity wallet for decentralized identity model


Abbie BARBIR
Editor

Email: barbira[at]cvshealth.com
Daeun HYEON
Editor

Email: hde0610[at]naver.com
Bradley SNYDER
Editor

Email: blsnyder[at]fbi.gov
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
X.sf-dtea

Security framework for detecting targeted email attacks


Chunghan KIM
Editor

Email: kevinkim[at]kiwontech.com
Jonghyun KIM
Editor

Email: jhk[at]etri.re.kr
Sujung PARK
Editor

Email: sjpark[at]tta.or.kr
Warren SEALEY
Editor

Email: warren.sealey[at]broadcom.com
Hyunmin SHIN
Editor

Email: hyunminshin[at]kiwontech.com
X.sfrms

Security framework and requirements of microservice for cloud computing using container technology


Wenjing MA
Editor

Email: berryjing0222[at]163.com
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
X.sgcnp

Security guidelines for platform as a service for cloud native applications


Wei LIU
Editor

Email: liuw147[at]chinaunicom.cn
Nan MENG
Editor

Email: mengnan[at]caict.ac.cn
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
Laifu WANG
Editor

Email: wanglaifu[at]chinatelecom.cn
Lei XU
Editor

Email: xulei56[at]chinaunicom.cn
X.sg-dcs

Security guidelines for DLT-based digital collection services


Jihye KIM
Editor

Email: ngswma32[at]gmail.com
Jong-Hyouk LEE
Editor

Email: jonghyouk[at]sejong.ac.kr
X.sg-eAI

Security requirements and guidelines for embodied artificial intelligence systems


Feng GAO
Editor

Email: gaofeng149[at]chinaunicom.cn
Jae Hoon NAH
Editor

Email: jhnah[at]etri.re.kr
Chang SONG
Editor

Email: songc53[at]chinaunicom.cn
X.sg-eimv

Security guidelines for enabling integration of virtual and physical worlds of the metaverses in smart city


Feng GAO
Editor

Email: gaofeng149[at]chinaunicom.cn
Jae Hoon NAH
Editor

Email: jhnah[at]etri.re.kr
Chang SONG
Editor

Email: songc53[at]chinaunicom.cn
Junjie XIA
Editor

Email: xiajj2[at]chinaunicom.cn
X.sgfems

Security requirements and guidelines for factory energy management system


Feng GAO
Editor

Email: gaofeng149[at]chinaunicom.cn
Mengxiang HAN
Editor

Email: hanmx12[at]chinaunicom.cn
Jae Hoon NAH
Editor

Email: jhnah[at]etri.re.kr
Junjie XIA
Editor

Email: xiajj2[at]chinaunicom.cn
X.sg-GenAI

Security Guidelines for Generative Artificial Intelligence Application Service


Yang CHEN
Editor

Email: cheny1672[at]chinaunicom.cn
Huifang LI
Editor

Email: lihf209[at]chinaunicom.cn
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
X.sg-GenAId

Security Guidelines for Generative Artificial Intelligence Data Life Cycle


Mi CAO
Editor

Email: caom11[at]chinaunicom.cn
Jiahang LI
Editor

Email: lijh1337[at]chinaunicom.cn
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
X.sg-ressso

Security guidelines for reporting email security status to security operations


Chunghan KIM
Editor

Email: kevinkim[at]kiwontech.com
Jonghyun KIM
Editor

Email: jhk[at]etri.re.kr
Hyunmin SHIN
Editor

Email: hyunminshin[at]kiwontech.com
X.sgrtem

Security guidelines for real-time event monitoring and integrated management in smart city platforms


Feng GAO
Editor

Email: gaofeng149[at]chinaunicom.cn
Chang SONG
Editor

Email: songc53[at]chinaunicom.cn
Junjie XIA
Editor

Email: xiajj2[at]chinaunicom.cn
X.sg-sd

Security guidelines for synthetic data in the context of AI systems


Lu CHEN
Editor

Email: chenl225[at]chinaunicom.cn
Hou JIE
Editor

Email: houj76[at]chinaunicom.cn
Lei XU
Editor

Email: xulei56[at]chinaunicom.cn
X.sg-tc

Security guidelines of trusted cloud services


Lu CHEN
Editor

Email: chenl225[at]chinaunicom.cn
Dongxin LIU
Editor

Email: liudongxin[at]chinatelecom.cn
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
X.s-isac

Security guidelines for integrated sensing and communication in IMT-2020 networks and beyond


Chang LIU
Editor

Email: liuchangyjy[at]chinamobile.com
Guoshun NAN
Editor

Email: nanguo2021[at]bupt.edu.cn
Li SU
Editor

Email: suli[at]chinamobile.com
Ke WANG
Editor

Email: wangkeyj[at]chinamobile.com
X.sm-iot

Technical requirements of security situation monitoring for Internet of things (IoT) devices


Hang DONG
Editor

Email: donghang[at]chinamobile.com
Xiaoqin HUANG
Editor

Email: huangxiaoqin[at]cmiot.chinamobile.com
Lijun LIU
Editor

Email: liulijun[at]cmiot.chinamobile.com
Le YU
Editor

Email: yule[at]chinamobile.com
Shuang ZHANG
Editor

Email: zhangshuang[at]cmiot.chinamobile.com
X.soar-cc

Framework of security orchestration, automation and response for cloud computing


Maofei CHEN
Editor

Email: chenmf6[at]chinatelecom.cn
Dongxin LIU
Editor

Email: liudongxin[at]chinatelecom.cn
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
Laifu WANG
Editor

Email: wanglaifu[at]chinatelecom.cn
Yi ZHANG
Editor

Email: enidzhang2019[at]163.com
X.Spud

Security requirements for psuedonymizing unstructured data


Lim HYUNG-JIN
Editor

Email: dream.hjlim[at]gmail.com
I seok KANG
Editor

Email: kis[at]kisa.or.kr
Junho KIM
Editor

Email: kimjh0201[at]kisa.or.kr
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
X.sr-AI

Security requirements for AI systems


Daeun HYEON
Editor

Email: hde0610[at]naver.com
Jae Nam KO
Editor

Email: jnko[at]sch.ac.kr
Qing LIU
Editor

Email: liuqing6[at]chinatelecom.cn
Junhyung PARK
Editor

Email: junhyung.park[at]sch.ac.kr
Zoe Sungchae PARK
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
X.srapi-cc

Security requirements of application programming interface (API) for cloud computing


Maofei CHEN
Editor

Email: chenmf6[at]chinatelecom.cn
Dongxin LIU
Editor

Email: liudongxin[at]chinatelecom.cn
Laifu WANG
Editor

Email: wanglaifu[at]chinatelecom.cn
X.sr-da-GenAI

Security threats and requirements for data annotation service of generative artificial intelligence


Zhiyuan HU
Editor

Email: huzhiyuan[at]vivo.com
Luhua WANG
Editor

Email: wlh[at]cert.org.cn
Hong ZHANG
Editor

Email: zhanghong[at]cert.org.cn
Yunwei ZHAO
Editor

Email: zhaoyw[at]cert.org.cn
X.sr-di

Security requirements for DLT-based invoices


Jinsue LEE
Editor

Email: jinsue[at]pel.sejong.ac.kr
Jong-Hyouk LEE
Editor

Email: jonghyouk[at]sejong.ac.kr
X.srdidm

Security requirements for decentralized identity management systems using distributed ledger technology


Byoung-Moon CHIN
Editor

Email: bmchin[at]tta.or.kr
Keundug PARK
Editor

Email: jacepark926[at]gmail.com
Kiho YEO
Editor

Email: beware523[at]paran.com
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
X.sr-dpts

Security requirements for DLT data on permissioned DLT-based distributed power trading systems


Lee HANEUL
Editor

Email: hameul6789[at]gmail.com
Jihye KIM
Editor

Email: ngswma32[at]gmail.com
Jinsue LEE
Editor

Email: jinsue[at]pel.sejong.ac.kr
Jong-Hyouk LEE
Editor

Email: jonghyouk[at]sejong.ac.kr
X.sreai-ec

Security requirements of delivering edge AI on edge computing


Maofei CHEN
Editor

Email: chenmf6[at]chinatelecom.cn
Laifu WANG
Editor

Email: wanglaifu[at]chinatelecom.cn
X.sreg-ICS

Security Requirements and Evaluation Guidelines for Intelligent Customer Services


Xiongwei JIA
Editor

Email: jiaxw9[at]chinaunicom.cn
Xiaojun MU
Editor

Email: muxj[at]chinaunicom.cn
X.srg-AIgis

Security requirements and guidelines for AI-based image generation system


Feng GAO
Editor

Email: gaofeng149[at]chinaunicom.cn
Mengxiang HAN
Editor

Email: hanmx12[at]chinaunicom.cn
Jae Hoon NAH
Editor

Email: jhnah[at]etri.re.kr
X.srgsc

Security requirements and guidelines of application and service for smart city platform


Feng GAO
Editor

Email: gaofeng149[at]chinaunicom.cn
Jae Hoon NAH
Editor

Email: jhnah[at]etri.re.kr
Jun SHEN
Editor

Email: shenjun6[at]chinatelecom.cn
Junjie XIA
Editor

Email: xiajj2[at]chinaunicom.cn
X.srgsdcs

Security requirements and guidelines of sensing and data collection system for city infrastructure


Feng GAO
Editor

Email: gaofeng149[at]chinaunicom.cn
Mengxiang HAN
Editor

Email: hanmx12[at]chinaunicom.cn
Jae Hoon NAH
Editor

Email: jhnah[at]etri.re.kr
Junjie XIA
Editor

Email: xiajj2[at]chinaunicom.cn
X.sr-iiot

Security requirements for the industrial Internet of things based smart manufacturing reference model


Lee HANEUL
Editor

Email: hameul6789[at]gmail.com
Jinsue LEE
Editor

Email: jinsue[at]pel.sejong.ac.kr
Jong-Hyouk LEE
Editor

Email: jonghyouk[at]sejong.ac.kr
Taeyang LEE
Editor

Email: taeyang[at]pel.sejong.ac.kr
X.srm-fml

Security requirements and measures of federated machine learning


Jianing CHEN
Editor

Email: chenjn[at]chinatelecom.cn
Xiongwei JIA
Editor

Email: jiaxw9[at]chinaunicom.cn
Qiuli MEI
Editor

Email: meiqiuli2010[at]163.com
X.srm-sup

Security risk management on software supply chain for telecommunication organizations


Yifu WANG
Editor

Email: wangyifu[at]cmdi.chinamobile.com
Yue WANG
Editor

Email: wangy2025[at]chinaunicom.cn
Chen ZHANG
Editor

Email: zhangchen[at]cmdi.chinamobile.com
X.sr-smb

Security requirements for industrial IoT data of smart manufacturing using blockchain


Haneul LEE
Editor

Email: haneul[at]pel.sejong.ac.kr
Jong-Hyouk LEE
Editor

Email: jonghyouk[at]sejong.ac.kr
X.ssc-sa

Guidelines for software supply chain security audit


Lizhu SU
Editor

Email: sulz9[at]chinaunicom.cn
X.SSDHN-AI-Atk

Security Guidelines for Software-Defined Heterogeneous Networks Architecture against AI generated Attacks and Threats


Ravinder KUMAR
Editor

Email: ravinder.kumar74[at]gov.in
Yashwant KUMAR
Editor

Email: ddgngn.tec[at]gov.in
Vaishnavi MOORTHY
Editor

Email: vaishnam[at]srmist.edu.in
Revathi VENKATARAMAN
Editor

Email: revathin[at]srmist.edu.in
X.stie

Structured Threat Information Expression (STIE)


Michael ROSA
Editor

Email: mjrosa[at]cyber.nsa.gov
Duncan SPARRELL
Editor

Email: duncan[at]sfractal.com
X.stm-dpm

Security for things across metaverses in aspects of data processing and management


Xiongwei JIA
Editor

Email: jiaxw9[at]chinaunicom.cn
Xiaojun MU
Editor

Email: muxj[at]chinaunicom.cn
Junhyung PARK
Editor

Email: junhyung.park[at]sch.ac.kr
Zoe Sungchae PARK
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
X.st-ssc

Security threats of software supply chain


Daeun HYEON
Editor

Email: hde0610[at]naver.com
Jae Nam KO
Editor

Email: jnko[at]sch.ac.kr
Junhyung PARK
Editor

Email: junhyung.park[at]sch.ac.kr
Zoe Sungchae PARK
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
X.suppl.divs

Rationale and initial vision of a decentralized identity verification system (DIVS) based on verifiable data


Daeun HYEON
Editor

Email: hde0610[at]naver.com
Zoe Sungchae PARK
Editor

Email: zoesc.park[at]sch.ac.kr
Bradley SNYDER
Editor

Email: blsnyder[at]fbi.gov
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
X.suppl-tig-iotsec

Technical implementation guidelines for IoT devices and gateway


Zoe Sungchae PARK
Editor

Email: zoesc.park[at]sch.ac.kr
Jyoti SENGAR
Editor

Email: jyoti.sengar[at]gov.in
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
X.taeii

Trusted Automated Exchange of Intelligence Information (TAEII)


Michael ROSA
Editor

Email: mjrosa[at]cyber.nsa.gov
Duncan SPARRELL
Editor

Email: duncan[at]sfractal.com
X.tas

Telebiometric authentication using speaker recognition


Myung Geun CHUN
Editor

Email: mgchun[at]chungbuk.ac.kr
Fatoumata SAMAKE
Editor

Email: fsamake42002[at]yahoo.fr
X.tc-ifd

Technical capabilities of interactive fraud detection


Bibo LIU
Editor

Email: lubibo.lbb[at]alibaba-inc.com
Jae Hoon NAH
Editor

Email: jhnah[at]etri.re.kr
Jin PENG
Editor

Email: jim.pj[at]antgroup.com
X.tis

Telebiometric authentication based on information splitting


Myung Geun CHUN
Editor

Email: mgchun[at]chungbuk.ac.kr
X.uc-zt-5g

Security threats associated with use cases for applying zero trust to IMT-2020 private network deployments


Junhyung PARK
Editor

Email: junhyung.park[at]sch.ac.kr
Zoe Sungchae PARK
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
X.vctp

Verifiable credential-based trust propagation framework in the decentralized identity


Abbie BARBIR
Editor

Email: barbira[at]cvshealth.com
Daeun HYEON
Editor

Email: hde0610[at]naver.com
Junhyung PARK
Editor

Email: junhyung.park[at]sch.ac.kr
Zoe Sungchae PARK
Editor

Email: zoesc.park[at]sch.ac.kr
Bradley SNYDER
Editor

Email: blsnyder[at]fbi.gov
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
X.vide

Guideline of visual feature protection and secure sharing mechanisms for de-identification


Feng GAO
Editor

Email: gaofeng149[at]chinaunicom.cn
Youngjoo JO
Editor

Email: run.youngjoo[at]etri.re.kr
Jongyoul PARK
Editor

Email: jongyoul[at]seoultech.ac.kr
X.ztmc

Guidelines for Hhigh level Zero trust model and its security capabilities for in telecommunication networks


Junhyung PARK
Editor

Email: junhyung.park[at]sch.ac.kr
Zoe Sungchae PARK
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
XSTR.ac-pqc

Technical Report: Guidance on use of advanced cryptography based on Post Quantum Cryptography (PQC)


Koji NAKAO
Editor

Email: ko-nakao[at]nict.go.jp
XSTR.AISec

Technical Report: Artificial intelligence security standardization strategies


Shaoyong GUO
Editor

Email: syguo[at]bupt.edu.cn
Zhiyuan HU
Editor

Email: huzhiyuan[at]vivo.com
Weizhao HUANG
Editor

Email: goodbean2000[at]163.com
Xiongwei JIA
Editor

Email: jiaxw9[at]chinaunicom.cn
Jabu MTSWENI
Editor

Email: jmtsweni[at]csir.co.za
Lin SHI
Editor

Email: shilin1[at]caict.ac.cn
XSTR.cr-mv

Technical Report: Cyber risks, threats, and harms in the metaverse


Jae Nam KO
Editor

Email: jnko[at]sch.ac.kr
Zoe Sungchae PARK
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
XSTR.cs-sc

Technical Report: Collection of Security Concerns for extracting the Security Requirements for Cyber Security Reference Architecture


N. Kishor NARANG
Editor

Email: design[at]narnix.com
Jitender PRAKASH
Editor

Email: dirsa-dot[at]gov.in
Preetika SINGH
Editor

Email: preetika.singh87[at]gov.in
Pushpendra Kumar SINGH
Editor

Email: pushpendraks.its[at]gov.in
XSTR.cs-uc

Technical Report: Use cases for extracting the security requirements for cyber security reference architecture


Daeun HYEON
Editor

Email: hde0610[at]naver.com
Juhee KI
Editor

Email: eye[at]iitp.kr
Zoe Sungchae PARK
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
XSTR.dpama

Technical Report on " A Landscape analysis for data protection of avatars in metaverse applications"


Heebong CHOI
Editor

Email: hhbchoi[at]gmail.com
Dae-Ki KANG
Editor

Email: dkkang[at]dongseo.ac.kr
HoonJae LEE
Editor

Email: hjlee[at]dongseo.ac.kr
XSTR.fcnsc

Technical Report: Framework for cloud native based security collaboration mechanism among cloud service providers


Zhengwei CHANG
Editor

Email: changzw[at]126.com
Lin CHEN
Editor

Email: chenlin6[at]caict.ac.cn
Hao HAN
Editor

Email: hhan[at]nuaa.edu.cn
Bo PANG
Editor

Email: pang-bo[at]outlook.com
Xuan ZHA
Editor

Email: zhaxuan[at]caict.ac.cn
Linghao ZHANG
Editor

Email: 16100178[at]qq.com
XSTR.FMSC-IMT2030

Technical Report: Security technologies of fixed, mobile and satellite convergence of IMT-2030 networks


Meiling CHEN
Editor

Email: chenmeiling[at]chinamobile.com
Li SU
Editor

Email: suli[at]chinamobile.com
Junzhi YAN
Editor

Email: yanjunzhi[at]chinamobile.com
XSTR.gscim-dlt

Technical Report: Guidelines for security consideration for incident management by DLT service provider


Yue CHEN
Editor

Email: chenyue[at]cert.org.cn
Han HAN
Editor

Email: hanh[at]cert.org.cn
Junzhi YAN
Editor

Email: yanjunzhi[at]chinamobile.com
Yunwei ZHAO
Editor

Email: zhaoyw[at]cert.org.cn
XSTR.hyb_qsafe

Technical Report: Overview of key management of hybrid approaches for quantum-safe communications


Kaoru KENYOSHI
Editor

Email: kaoru.kenyoshi[at]nict.go.jp
XSTR.IMT2030-sec-con

Technical Report on "Security Consideration for IMT-2030 Networks"


HaiTao DU
Editor

Email: duhaitao[at]chinamobile.com
Yutaka MIYAKE
Editor

Email: yu-miyake[at]kddi.com
Li SU
Editor

Email: suli[at]chinamobile.com
Ke WANG
Editor

Email: wangkeyj[at]chinamobile.com
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
XSTR.kdc_qkdn

Technical Report: Key distribution center based approaches in the service layer to manage keys supplied by QKDN


Shen HE
Editor

Email: heshen[at]chinamobile.com
Fuwen LIU
Editor

Email: liufuwen[at]chinamobile.com
Zhangchao MA
Editor

Email: mazhangchao[at]qtict.com
Ye TIAN
Editor

Email: tianye[at]chinamobile.com
Yong ZHAO
Editor

Email: yong.zhao[at]quantum-info.com
XSTR.lzkml

Technical Report: Landscape analysis of Zero-Knowledge machine learning


Dong Bin CHOI
Editor

Email: dbchoi85[at]gmail.com
Jae Hoon NAH
Editor

Email: jhnah[at]etri.re.kr
JoYeon PARK
Editor

Email: hpjoanne[at]sogang.ac.kr
XSTR.QKDN-SP

Technical Report: Overview of security profile for Quantum Key Distribution Networks in hybrid mode


Venkata Rama Raju CHELLE
Editor

Email: cvramaraju.v[at]gov.in
Soumya DAS
Editor

Email: soumya06.das[at]gmail.com
Prabhakar KRISHNAN
Editor

Email: kprabhakar[at]am.amrita.edu
Ravindra Pratap SINGH
Editor

Email: rpsingh[at]prl.res.in
XSTR.saAIoT

Technical Report: Security Threat Analysis for Artificial Intelligence of Things on Devices


Yang CHEN
Editor

Email: cheny1672[at]chinaunicom.cn
Shiding SUN
Editor

Email: sunsd15[at]chinaunicom.cn
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
XSTR.sa-ran

Technical Report on "Security Attacks in Radio Access Networks"


Eduardo RODRIGUES
Editor

Email: eduardorodrigues[at]anatel.gov.br
Dalton VALADARES
Editor

Email: dalton.valadares[at]embedded.ufcg.edu.br
XSTR.sd-cnc

Technical report: Security guidelines for data of coordination of networking and computing


Li SU
Editor

Email: suli[at]chinamobile.com
Ke WANG
Editor

Email: wangkeyj[at]chinamobile.com
Tingting YANG
Editor

Email: yangtingting[at]chinamobile.com
XSTR.se-AI

Technical Report: Security Evaluation on Artificial Intelligence Technology in ICT


Jia CHEN
Editor

Email: chenjia[at]chinamobile.com
Quanchao LIU
Editor

Email: liuquanchao[at]chinamobile.com
Yong SUN
Editor

Email: sy359975[at]alibaba-inc.com
Ke WANG
Editor

Email: wangkeyj[at]chinamobile.com
XSTR.sec-iepi-AI

Technical Report: Security guideline for artificial intelligence applications of IoT-based electric power infrastructure monitoring system


Mamadou Sire BARRY
Editor

Email: mamadou.barry[at]artp.sn
Liu BOYU
Editor

Email: 13939010853[at]163.com
Fangfang DANG
Editor

Email: 1621597980[at]qq.com
Shaoyong GUO
Editor

Email: syguo[at]bupt.edu.cn
Zhaotai MENG
Editor

Email: mengzhaotai[at]pku.edu.cn
XSTR.sec-int-cpc

Technical report: Security considerations for interconnection of computing power centers


Yu JIANG
Editor

Email: jiangyu[at]chinatelecom.cn
Xiang LIU
Editor

Email: liux15[at]pcl.ac.cn
Weizhe ZHANG
Editor

Email: weizhe.zhang[at]pcl.ac.cn
Yu ZHANG
Editor

Email: zhangyu5[at]cmdi.chinamobile.com
XSTR.sg-lmcs

Technical report: Security guidelines for DLT-based lifecycle management of computing services


Lanfang REN
Editor

Email: renlanfang[at]chinamobile.com
Junzhi YAN
Editor

Email: yanjunzhi[at]chinamobile.com
Bo YANG
Editor

Email: yangbo[at]chinamobile.com
Huachun ZHOU
Editor

Email: hchzhou[at]bjtu.edu.cn
XSTR.SIMRegBio

Technical Report: Guidelines for SIM Identity and Biometrics Registration


Kwadwo OSAFO-MAAFO
Editor

Email: kwadwo.osafo-maafo[at]nca.org.gh
Opeolu OYEBANJI
Editor

Email: opeolu[at]ncc.gov.ng
Shamsuddeen SABO
Editor

Email: ssabo[at]ncc.gov.ng
Pushpendra Kumar SINGH
Editor

Email: pushpendraks.its[at]gov.in
XSTR.smpa

Technical Report: Security middle platform architecture


Jingyang LI
Editor

Email: lijy29[at]chinatelecom.cn
Ke WANG
Editor

Email: wangkeyj[at]chinamobile.com
Shuai WANG
Editor

Email: wangshuai8[at]chinatelecom.cn
Haodi ZHANG
Editor

Email: zhanghaodi[at]chinatelecom.cn
XSTR.SQKDN-SC

Technical Report: Security consideration for satellite-based quantum key distribution network


Dongdong LI
Editor

Email: dongdong.li[at]quantum-info.com
Ming-Han LI
Editor

Email: liminghan[at]qtict.com
Shengkai LIAO
Editor

Email: skliao[at]ustc.edu.cn
Weiyang ZHANG
Editor

Email: zwy2hucong[at]ustc.edu.cn
XSTR.srsec

Technical Report: Security aspects of segment routing IPv6 for the convergence of computing and network for telecommunication operators


Gang DU
Editor

Email: dugang[at]cmdi.chinamobile.com
Xuetao DU
Editor

Email: duxuetao[at]cmdi.chinamobile.com
Chen ZHANG
Editor

Email: zhangchen[at]cmdi.chinamobile.com
XSTR.st-iot

Technical Report: Security threat scenarios in Internet of Things


Ernesto SILVEIRA
Editor

Email: ernestom[at]anatel.gov.br
Dalton VALADARES
Editor

Email: dalton.valadares[at]embedded.ufcg.edu.br
XSTR.Suss-rev

Technical Report: Successful use of security standards


Abbie BARBIR
Editor

Email: barbira[at]cvshealth.com
XSTR.trust

Technical Report: Trust framework for telecommunication/ICTs


Jae Nam KO
Editor

Email: jnko[at]sch.ac.kr
N. Kishor NARANG
Editor

Email: design[at]narnix.com
Zoe Sungchae PARK
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl YOUM
Editor

Email: hyyoum[at]sch.ac.kr
XSTR.trust-metaverse

Technical Report: Technical challenges to achieving trustworthy metaverses


Xiongwei JIA
Editor

Email: jiaxw9[at]chinaunicom.cn
Gyu Myoung LEE
Editor

Email: gyumyoung.lee[at]gmail.com
Wonjoo PARK
Editor

Email: wjpark[at]etri.re.kr
Xiaojia SONG
Editor

Email: songxiaojia[at]chinamobile.com
XSTR.verm

Technical Report: Framework for verification of messages


Kwadwo OSAFO-MAAFO
Editor

Email: kwadwo.osafo-maafo[at]nca.org.gh
Export: