{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T05:29:22Z","timestamp":1767418162480,"version":"3.48.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,10]]},"DOI":"10.1109\/enc68268.2025.11311918","type":"proceedings-article","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T18:15:34Z","timestamp":1767377734000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive Cybersecurity for Industrial Environments Using Evolutionary Algorithms: A Methodological Proposal"],"prefix":"10.1109","author":[{"given":"J. E. Soto","family":"Soto","sequence":"first","affiliation":[{"name":"SECIHTI-Tecnol&#x00F3;gico Nacional de M&#x00E9;xico, Instituto Tecnol&#x00F3;gico de Nuevo Le&#x00F3;n,Divisi&#x00F3;n de Estudios de Posgrado e Investigaci&#x00F3;n,Guadalupe,Nuevo Le\u00f3n,M&#x00E9;xico"}]},{"given":"J.I.","family":"Hern\u00e1ndez-Vega","sequence":"additional","affiliation":[{"name":"Tecnol&#x00F3;gico Nacional de M&#x00E9;xico, Instituto Tecnol&#x00F3;gico de Nuevo Le&#x00F3;n,Departamento de Sistemas y Computaci&#x00F3;n,Guadalupe,Nuevo Le\u00f3n,M&#x00E9;xico"}]},{"given":"L. E.","family":"G\u00f3mez-S\u00e1nchez","sequence":"additional","affiliation":[{"name":"Tecnol&#x00F3;gico Nacional de M&#x00E9;xico, Instituto Tecnol&#x00F3;gico de Nuevo Le&#x00F3;n,Departamento de Sistemas y Computaci&#x00F3;n,Guadalupe,Nuevo Le\u00f3n,M&#x00E9;xico"}]},{"given":"L. A.","family":"Reynoso-Guajardo","sequence":"additional","affiliation":[{"name":"Tecnol&#x00F3;gico Nacional de M&#x00E9;xico, Instituto Tecnol&#x00F3;gico de Nuevo Le&#x00F3;n,Departamento de Sistemas y Computaci&#x00F3;n,Guadalupe,Nuevo Le\u00f3n,M&#x00E9;xico"}]},{"given":"C.","family":"Hern\u00e1ndez-Santos","sequence":"additional","affiliation":[{"name":"Tecnol&#x00F3;gico Nacional de M&#x00E9;xico, Instituto Tecnol&#x00F3;gico de Nuevo Le&#x00F3;n,Departamento de El&#x00E9;ctrica-Electr&#x00F3;nica,Guadalupe,Nuevo Le\u00f3n,M&#x00E9;xico"}]},{"given":"A.","family":"Alonzo-Garcia","sequence":"additional","affiliation":[{"name":"Divisi&#x00F3;n de Estudios de Posgrado e Investigaci&#x00F3;n, SECIHTI-Tecnol&#x00F3;gico Nacional de M&#x00E9;xico, Instituto Tecnol&#x00F3;gico de Nuevo Le&#x00F3;n,Guadalupe,Nuevo Le\u00f3n,M&#x00E9;xico"}]},{"given":"J. F.","family":"Jimenez-Vielma","sequence":"additional","affiliation":[{"name":"Tecnol&#x00F3;gico Nacional de M&#x00E9;xico, Instituto Tecnol&#x00F3;gico de Nuevo Le&#x00F3;n,Departamento de Sistemas y Computaci&#x00F3;n,Guadalupe,Nuevo Le\u00f3n,M&#x00E9;xico"}]},{"given":"A. G.","family":"Silva-Trujillo","sequence":"additional","affiliation":[{"name":"Universidad Aut&#x00F3;noma de San Luis Potos&#x00ED;,Facultad de Ingenier&#x00ED;a,San Luis Potos&#x00ED;,M&#x00E9;xico"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/1206212x.2020.1720951"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-024-09663-6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3104113"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2019.01.03"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111434"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s25010213"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s43621-025-01141-9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3934\/math.2024763"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-98056-2"},{"key":"ref10","article-title":"Evolutionary Algorithms and AI in Cybersecurity: Adaptive Threat Mitigation Strategies Using Big Data and IoT","author":"Mumtaz","year":"2021","journal-title":"ResearchGate"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13224440"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103675"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2025.104478"}],"event":{"name":"2025 Mexican International Conference on Computer Science (ENC)","start":{"date-parts":[[2025,11,10]]},"location":"Orizaba, Veracruz, Mexico","end":{"date-parts":[[2025,11,14]]}},"container-title":["2025 Mexican International Conference on Computer Science (ENC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11311716\/11311718\/11311918.pdf?arnumber=11311918","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T05:27:50Z","timestamp":1767418070000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11311918\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/enc68268.2025.11311918","relation":{},"subject":[],"published":{"date-parts":[[2025,11,10]]}}}