{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T04:52:16Z","timestamp":1775883136756,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"FCT \u2013 Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["2024.07624.IACDC\/2024"],"award-info":[{"award-number":["2024.07624.IACDC\/2024"]}]},{"name":"PRR \u2013 Plano de Recupera\u00e7\u00e3o e Resili\u00eancia","award":["RE-C05-i08"],"award-info":[{"award-number":["RE-C05-i08"]}]},{"name":"European Union funds","award":["UID\/50008\/2025"],"award-info":[{"award-number":["UID\/50008\/2025"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3622497","type":"journal-article","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:38:44Z","timestamp":1760636324000},"page":"181957-181976","source":"Crossref","is-referenced-by-count":0,"title":["Toward Automatic Detection and Mitigation of High-Risk Cybersecurity Vulnerabilities at Networked Systems"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-0559-2950","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Pol\u00f3nio","sequence":"first","affiliation":[{"name":"1Instituto Universit&#x00E1;rio de Lisboa (ISCTE&#x2013;IUL), Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3516-8781","authenticated-orcid":false,"given":"Jos\u00e9","family":"Moura","sequence":"additional","affiliation":[{"name":"1Instituto Universit&#x00E1;rio de Lisboa (ISCTE&#x2013;IUL), Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0385-8876","authenticated-orcid":false,"given":"Rui Neto","family":"Marinheiro","sequence":"additional","affiliation":[{"name":"1Instituto Universit&#x00E1;rio de Lisboa (ISCTE&#x2013;IUL), Lisboa, Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3429269"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.03.016"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3467021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2987085"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3180465.3180473"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228653"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-020-00533-4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2021.016240"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DSC54232.2022.9888808"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3533016"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917633"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-0716-y"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s21144939"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3403\/30421040u"},{"key":"ref15","volume-title":"SDN-Vuln: Proactive Discovery and Mitigation of Security Vulnerabilities Leveraged By SDN","author":"Polonio","year":"2024"},{"key":"ref16","volume-title":"Catalyst - Speed Up Your Reactions","year":"2025"},{"key":"ref17","volume-title":"FastAPI Framework, High Performance, Easy to Learn, Fast to Code, Ready for Production","year":"2025"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.47672\/ejt.1547"},{"key":"ref19","volume-title":"Redis: The Real-Time Data Platform","year":"2025"},{"key":"ref20","volume-title":"Nmap: Discover Your Network","year":"2025"},{"key":"ref21","volume-title":"Nmap Network Scanning","year":"2009"},{"key":"ref22","volume-title":"Vulnerability Management: Open Source and GDPR-Compliant","year":"2025"},{"key":"ref23","volume-title":"API That Returns Exploit Prediction Scoring System (EPSS) Probabilities for CVE Security Vulnerabilities","year":"2025"},{"key":"ref24","volume-title":"Python Controller Ryu: Build SDN Agilely","year":"2017"},{"key":"ref25","volume-title":"Open VSwitch: Production Quality, Multilayer Open Virtual Switch","year":"2016"},{"key":"ref26","volume-title":"Mininet: An Instant Virtual Network on Your Laptop (or Other PC)","year":"2022"},{"key":"ref27","volume-title":"ISC DHCP: Enterprise-Grade Solution for IP Address-Configuration Need","year":"2025"},{"key":"ref28","volume-title":"Kea DHCP: Modern, Open Source DHCPv4 and DHCPv6 Server","year":"2025"},{"key":"ref29","volume-title":"Iscte-IUL: Laboratories","year":"2025"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICN.2010.71"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4908-6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WPMC48795.2019.9096131"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-75887-4_11"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00835-x"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-023-04946-1"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2017.39"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.101805"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2018.8400040"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICSES63445.2024.10763115"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3409843"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3368377"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-09996-w"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11205517.pdf?arnumber=11205517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T04:19:02Z","timestamp":1775881142000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11205517\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3622497","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}