{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:43:03Z","timestamp":1730306583112,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T00:00:00Z","timestamp":1667088000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T00:00:00Z","timestamp":1667088000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,30]]},"DOI":"10.1109\/wpmc55625.2022.10014942","type":"proceedings-article","created":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T14:12:29Z","timestamp":1674223949000},"page":"170-174","source":"Crossref","is-referenced-by-count":0,"title":["Network tool for hybrid analysis with External and Internal Scanning for Vulnerability Assessment of Network Nodes"],"prefix":"10.1109","author":[{"given":"Liubomir","family":"Nenov","sequence":"first","affiliation":[{"name":"9 French Language School,Sofia,Bulgaria"}]},{"given":"Ivan","family":"Zlatanov","sequence":"additional","affiliation":[{"name":"InterConsult Bulgaria ICB,Sofia,Bulgaria"}]},{"given":"Agata","family":"Manolova","sequence":"additional","affiliation":[{"name":"Technical University of Sofia,Faculty of Telecommunications,Sofia,Bulgaria"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1142\/S0218539317500024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3329786"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2015.7340766"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/KIT.2019.8883481"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2011.6122824"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2018.8554656"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS50412.2020.9237012"},{"key":"ref8","first-page":"135","article-title":"Threat minimization by design and deployment of secured networking model","volume":"8","author":"islam","year":"2018","journal-title":"International Journal of Information and Electronics Engineering"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNEEE.2015.7381362"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI48184.2020.9143018"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/BalkanLight.2018.8546869"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2018.00020"}],"event":{"name":"2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC)","start":{"date-parts":[[2022,10,30]]},"location":"Herning, Denmark","end":{"date-parts":[[2022,11,2]]}},"container-title":["2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10014682\/10014702\/10014942.pdf?arnumber=10014942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T16:56:15Z","timestamp":1676912175000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10014942\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,30]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/wpmc55625.2022.10014942","relation":{},"subject":[],"published":{"date-parts":[[2022,10,30]]}}}