{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T00:33:12Z","timestamp":1777681992107,"version":"3.51.4"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:00:00Z","timestamp":1768348800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:00:00Z","timestamp":1768348800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100020595","name":"National Science and Technology Council","doi-asserted-by":"publisher","award":["113-2221-E-011-077-MY2"],"award-info":[{"award-number":["113-2221-E-011-077-MY2"]}],"id":[{"id":"10.13039\/100020595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026,1,14]]},"DOI":"10.1109\/icoin68469.2026.11480638","type":"proceedings-article","created":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T19:45:18Z","timestamp":1777405518000},"page":"959-964","source":"Crossref","is-referenced-by-count":0,"title":["A Study of Cybersecurity Vulnerabilities in a Programmable Logic Controller"],"prefix":"10.1109","author":[{"given":"Dong-Yang","family":"Lee","sequence":"first","affiliation":[{"name":"Graduate Institute of Intelligent Manufacturing Technology, National Taiwan University of Science and Technology,Taipei,Taiwan"}]},{"given":"Wei-chen","family":"Lee","sequence":"additional","affiliation":[{"name":"National Taiwan University of Science and Technology,Department of Mechanical Engineering,Taipei,Taiwan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO51393.2021.9596460"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BSC.2018.8494686"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EI247390.2019.9062159"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3408098"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2020.01.334"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3546579"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2024.07.182"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WCICSS.2016.7882935"},{"key":"ref9","first-page":"1","article-title":"ICS\/SCADA security analysis of a Beckhoff CX5020 PLC","volume-title":"2015 International Conference on Information Systems Security and Privacy (ICISSP)","volume":"911","author":"Bonney"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/encyclopedia4020056"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC55534.2022.00034"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3394848"}],"event":{"name":"2026 40th International Conference on Information Networking (ICOIN)","location":"Hanoi, Vietnam","start":{"date-parts":[[2026,1,14]]},"end":{"date-parts":[[2026,1,16]]}},"container-title":["2026 40th International Conference on Information Networking (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11480424\/11480459\/11480638.pdf?arnumber=11480638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T08:41:35Z","timestamp":1777452095000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11480638\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,14]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icoin68469.2026.11480638","relation":{},"subject":[],"published":{"date-parts":[[2026,1,14]]}}}