{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T17:43:21Z","timestamp":1750355001416,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/efta.2007.4416847","type":"proceedings-article","created":{"date-parts":[[2008,1,4]],"date-time":"2008-01-04T15:59:03Z","timestamp":1199462343000},"page":"744-747","source":"Crossref","is-referenced-by-count":21,"title":["Using a packet manipulation tool for security analysis of industrial network protocols"],"prefix":"10.1109","author":[{"given":"Tiago H.","family":"Kobayashi","sequence":"first","affiliation":[]},{"given":"Aguinaldo B.","family":"Batista","sequence":"additional","affiliation":[]},{"given":"Agostinho M.","family":"Brito","sequence":"additional","affiliation":[]},{"given":"Paulo S.","family":"Motta Pires","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Nemesis Packet Injection Tool Suite","year":"2007","author":"nathan","key":"ref10"},{"key":"ref11","first-page":"127","article-title":"Security aspects of scada and corporate network interconnection: An overview","author":"pires","year":"2006","journal-title":"Proceedings of the International Conference on Dependability of Computer Systems (DEPCOS-RELCOMEX'06)"},{"journal-title":"Hping - Active Network Security Tool","year":"2007","author":"sanfilippo","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2004.1377709"},{"journal-title":"Worlds in collision - ethernet and the factory floor","year":"2002","author":"byres","key":"ref4"},{"journal-title":"Scapy","year":"0","author":"biondi","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.849714"},{"journal-title":"Pacgen Where do you want to send packets today?","year":"2007","author":"cato","key":"ref5"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1049\/ir:20041105","article-title":"network security - who's responsible? [ethernet in plant floor automation applications]","volume":"50","author":"freeman","year":"2004","journal-title":"IEE Review"},{"journal-title":"GNU General Public License","year":"0","author":"foundation","key":"ref7"},{"journal-title":"Modbus-IDA","year":"0","key":"ref2"},{"year":"0","key":"ref1"},{"journal-title":"Modbus application protocol specification v1 1a","year":"2004","key":"ref9"}],"event":{"name":"2007 IEEE Conference on Emerging Technologies & Factory Automation (EFTA 2007)","start":{"date-parts":[[2007,9,25]]},"location":"Patras, Greece","end":{"date-parts":[[2007,9,28]]}},"container-title":["2007 IEEE Conference on Emerging Technologies &amp; Factory Automation (EFTA 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4416742\/4416743\/04416847.pdf?arnumber=4416847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T22:40:37Z","timestamp":1497739237000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4416847\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/efta.2007.4416847","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}