{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T22:21:26Z","timestamp":1757456486250,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/nca.2018.8548060","type":"proceedings-article","created":{"date-parts":[[2018,11,29]],"date-time":"2018-11-29T18:47:51Z","timestamp":1543517271000},"page":"1-9","source":"Crossref","is-referenced-by-count":4,"title":["Securing WirelessHART: Monitoring, Exploring and Detecting New Vulnerabilities"],"prefix":"10.1109","author":[{"given":"Duarte","family":"Raposo","sequence":"first","affiliation":[]},{"given":"Andre","family":"Rodrigues","sequence":"additional","affiliation":[]},{"given":"Soraya","family":"Sinche","sequence":"additional","affiliation":[]},{"given":"Jorge Sa","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Boavida","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2548360"},{"key":"ref11","first-page":"380","article-title":"An evolved security architecture for distributed industrial automation and control systems","author":"rosa","year":"0","journal-title":"Proc of European Conference of Information Warfare and Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/I2MTC.2012.6229331"},{"journal-title":"WirelessHART network metrics YANG example","year":"0","author":"raposo","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.58"},{"journal-title":"Killerbee","year":"2018","author":"charles","key":"ref15"},{"journal-title":"WirelessHART dissector","year":"2018","author":"wightman","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.235"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364725"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"9703","DOI":"10.3390\/s150509703","article-title":"Routing and Scheduling Algorithms for WirelessHARTNetworks: A Survey","volume":"15","author":"nobre","year":"2015","journal-title":"Sensors (Basel Switzerland)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2009.5347043"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2018.02.001"},{"key":"ref8","first-page":"223","article-title":"Security analysis of Wire-lessHART communication scheme","author":"bayou","year":"2016","journal-title":"Intemationsal Symposium on Foundations and Practice of Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2045373"},{"journal-title":"Industrial communication networks - Wireless communication network and communication profiles - WirelessHART IEC 62591 2010","year":"2010","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIAS.2016.2600737"},{"journal-title":"Mon-itoring Industrial Wireless Sensor Networks","year":"2018","author":"raposo","key":"ref9"}],"event":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","start":{"date-parts":[[2018,11,1]]},"location":"Cambridge, MA","end":{"date-parts":[[2018,11,3]]}},"container-title":["2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8533540\/8548052\/08548060.pdf?arnumber=8548060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T08:37:58Z","timestamp":1643272678000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8548060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/nca.2018.8548060","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}