{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T19:43:31Z","timestamp":1757706211889},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/efta.2007.4416854","type":"proceedings-article","created":{"date-parts":[[2008,1,4]],"date-time":"2008-01-04T15:59:03Z","timestamp":1199462343000},"page":"772-775","source":"Crossref","is-referenced-by-count":9,"title":["Automating security tests for industrial automation devices using neural networks"],"prefix":"10.1109","author":[{"given":"Joao Paulo S.","family":"Medeiros","sequence":"first","affiliation":[]},{"given":"Allison C.","family":"da Cunha","sequence":"additional","affiliation":[]},{"given":"Agostinho M.","family":"Brito","sequence":"additional","affiliation":[]},{"given":"Paulo S.","family":"Motta Pires","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.849714"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.849721"},{"key":"ref10","first-page":"1998","author":"oja","year":"0","journal-title":"Bibliography of self&#x2013;organizing map (som)"},{"journal-title":"Fyodor Network mapper","year":"2006","key":"ref6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DEPCOS-RELCOMEX.2006.46"},{"journal-title":"I O for Standardization ISO 17799 2005 - Information Technology - Security Techniques - Code of Practice for information security management ISO","year":"2005","key":"ref5"},{"year":"0","key":"ref12"},{"journal-title":"API 1164&#x2013;SCADA Security","year":"2004","author":"institute","key":"ref8"},{"journal-title":"Fyodor Nmap remote os detection via tcp\/ip fingerprinting (2nd generation)","year":"2006","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PCICON.2005.1524567"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-88163-3","author":"kohonen","year":"1989","journal-title":"self&#x2013;organization and Associative Memory"},{"journal-title":"Association AGA Report No 12 Part 1 - Cryptographic Protection for SCADA communications Backgroundand Policies AGA","year":"2006","key":"ref1"}],"event":{"name":"2007 IEEE Conference on Emerging Technologies & Factory Automation (EFTA 2007)","start":{"date-parts":[[2007,9,25]]},"location":"Patras, Greece","end":{"date-parts":[[2007,9,28]]}},"container-title":["2007 IEEE Conference on Emerging Technologies &amp; Factory Automation (EFTA 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4416742\/4416743\/04416854.pdf?arnumber=4416854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T22:40:31Z","timestamp":1497739231000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4416854\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/efta.2007.4416854","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}