{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T03:26:37Z","timestamp":1771125997497,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,3,29]],"date-time":"2012-03-29T00:00:00Z","timestamp":1332979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000105","name":"Office of Cyberinfrastructure","doi-asserted-by":"publisher","award":["OCI-0959687"],"award-info":[{"award-number":["OCI-0959687"]}],"id":[{"id":"10.13039\/100000105","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000005","name":"U.S. Department of Defense","doi-asserted-by":"publisher","award":["H98230-10-1-0419"],"award-info":[{"award-number":["H98230-10-1-0419"]}],"id":[{"id":"10.13039\/100000005","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,29]]},"DOI":"10.1145\/2184512.2184590","type":"proceedings-article","created":{"date-parts":[[2012,4,17]],"date-time":"2012-04-17T12:53:22Z","timestamp":1334667202000},"page":"331-332","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Wireless vulnerability of SCADA systems"],"prefix":"10.1145","author":[{"suffix":"III","given":"Guillermo","family":"Francia","sequence":"first","affiliation":[{"name":"Jacksonville State University, Jacksonville, AL"}]},{"given":"David","family":"Thornton","sequence":"additional","affiliation":[{"name":"Jacksonville State University, Jacksonville, AL"}]},{"given":"Thomas","family":"Brookshire","sequence":"additional","affiliation":[{"name":"Jacksonville State University, Jacksonville, AL"}]}],"member":"320","published-online":{"date-parts":[[2012,3,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","DOI":"10.1002\/0471729221","volume-title":"Wireless and Mobile Data Networks","author":"Ahmad A.","year":"2005","unstructured":"Ahmad , A. ( 2005 ) Wireless and Mobile Data Networks . Hoboken, NJ : Wiley & Sons . Ahmad, A. (2005) Wireless and Mobile Data Networks. Hoboken, NJ: Wiley & Sons."},{"key":"e_1_3_2_1_2_1","volume-title":"Retrieved","author":"Aircrack","year":"2011","unstructured":"Aircrack -ng Website ( 2011 ). Simple WEP Cracking with a Flowchart . Retrieved October 30, 2011, from http:\/\/www.aircrack-ng.org\/. Aircrack-ng Website (2011). Simple WEP Cracking with a Flowchart. Retrieved October 30, 2011, from http:\/\/www.aircrack-ng.org\/."},{"key":"e_1_3_2_1_3_1","volume-title":"Hacking Exposed Wireless: Wireless Security Secrets and Solutions","author":"Cache J.","year":"2010","unstructured":"Cache , J. , Wright , J. and Liu , V . ( 2010 ) Hacking Exposed Wireless: Wireless Security Secrets and Solutions , 2 nd Edition. McGraw-Hill Companies . Cache, J., Wright, J. and Liu, V. (2010) Hacking Exposed Wireless: Wireless Security Secrets and Solutions, 2nd Edition. McGraw-Hill Companies.","edition":"2"},{"key":"e_1_3_2_1_4_1","volume-title":"Colasoft Packet Builder.\" Retrieved","author":"ColaSoft","year":"2012","unstructured":"ColaSoft ( 2012 ). \" Colasoft Packet Builder.\" Retrieved January 15, 2012 from http:\/\/www.colasoft.com\/packet_builder. ColaSoft (2012). \"Colasoft Packet Builder.\" Retrieved January 15, 2012 from http:\/\/www.colasoft.com\/packet_builder."},{"key":"e_1_3_2_1_5_1","volume-title":"Implementation of the Critical Infrastructure Security and Assessment Laboratory (CISAL),\" Proc of the 2011 International Conference on Security and Management (SAM'11)","author":"Francia III, G. A.","year":"2011","unstructured":"Francia III, G. A. , Bekhouche , N. , and Marbut , T. , ( 2011 ). \" Implementation of the Critical Infrastructure Security and Assessment Laboratory (CISAL),\" Proc of the 2011 International Conference on Security and Management (SAM'11) . July 18-21, 2011, Las Vegas , NV. Francia III, G. A., Bekhouche, N., and Marbut, T., (2011). \"Implementation of the Critical Infrastructure Security and Assessment Laboratory (CISAL),\" Proc of the 2011 International Conference on Security and Management (SAM'11). July 18-21, 2011, Las Vegas, NV."},{"key":"e_1_3_2_1_6_1","volume-title":"Retrieved","author":"Karma Project","year":"2011","unstructured":"Karma Project ( 2011 ). Linux Rogue Access Point HOWTO . Retrieved October 22, 2011, from http:\/\/wirelessdefence.org\/Contents\/RogueAPHowtoBASICLinux.htm. Karma Project (2011). Linux Rogue Access Point HOWTO. Retrieved October 22, 2011, from http:\/\/wirelessdefence.org\/Contents\/RogueAPHowtoBASICLinux.htm."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352541"},{"key":"e_1_3_2_1_8_1","volume-title":"Understanding Man-in-the-Middle Attack,\" Retrieved","author":"Sanders","year":"2010","unstructured":"Sanders , Chris ( 2010 ), \" Understanding Man-in-the-Middle Attack,\" Retrieved January 10, 2012, from http:\/\/www.windowsecurity.com\/articles\/Understanding-Man-in-the-Middle-Attacks-ARP-Part1.html Sanders, Chris (2010), \"Understanding Man-in-the-Middle Attack,\" Retrieved January 10, 2012, from http:\/\/www.windowsecurity.com\/articles\/Understanding-Man-in-the-Middle-Attacks-ARP-Part1.html"},{"key":"e_1_3_2_1_9_1","volume-title":"Spread Spectrum Ethernet Radio JR900 & JR240\" Retrieved","author":"Schneider Electric J","year":"2012","unstructured":"Schneider Electric , \" J Series : Spread Spectrum Ethernet Radio JR900 & JR240\" Retrieved January 10, 2012 from http:\/\/www.trio.com.au\/p-j-over.php. Schneider Electric, \"J Series: Spread Spectrum Ethernet Radio JR900 & JR240\" Retrieved January 10, 2012 from http:\/\/www.trio.com.au\/p-j-over.php."}],"event":{"name":"ACM SE '12: ACM Southeast Regional Conference","location":"Tuscaloosa Alabama","acronym":"ACM SE '12","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 50th Annual Southeast Regional Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184512.2184590","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2184512.2184590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:49:11Z","timestamp":1750236551000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184512.2184590"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,29]]},"references-count":9,"alternative-id":["10.1145\/2184512.2184590","10.1145\/2184512"],"URL":"https:\/\/doi.org\/10.1145\/2184512.2184590","relation":{},"subject":[],"published":{"date-parts":[[2012,3,29]]},"assertion":[{"value":"2012-03-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}