{"id":"https://openalex.org/W2099675026","doi":"https://doi.org/10.1109/efta.2007.4416854","title":"Automating security tests for industrial automation devices using neural networks","display_name":"Automating security tests for industrial automation devices using neural networks","publication_year":2007,"publication_date":"2007-09-01","ids":{"openalex":"https://openalex.org/W2099675026","doi":"https://doi.org/10.1109/efta.2007.4416854","mag":"2099675026"},"language":"en","primary_location":{"id":"doi:10.1109/efta.2007.4416854","is_oa":false,"landing_page_url":"https://doi.org/10.1109/efta.2007.4416854","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 IEEE Conference on Emerging Technologies &amp; Factory Automation (EFTA 2007)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016043237","display_name":"Jo\u00e3o Paulo S. Medeiros","orcid":"https://orcid.org/0000-0002-5102-2707"},"institutions":[{"id":"https://openalex.org/I35046152","display_name":"Universidade Federal do Rio Grande do Norte","ror":"https://ror.org/04wn09761","country_code":"BR","type":"education","lineage":["https://openalex.org/I35046152"]},{"id":"https://openalex.org/I94328231","display_name":"University of Rio Grande and Rio Grande Community College","ror":"https://ror.org/02sghbs34","country_code":"US","type":"education","lineage":["https://openalex.org/I94328231"]}],"countries":["BR","US"],"is_corresponding":true,"raw_author_name":"Joao Paulo S. Medeiros","raw_affiliation_strings":["LabSIN-Security Information Laboratory, Departament of Computer Engineering and Automation-DCA, Federal University of Rio Grande do Norte, Natal, Rio Grande do Norte, Brazil","Fed. Univ. of Rio Grande do Norte, Natal"],"affiliations":[{"raw_affiliation_string":"LabSIN-Security Information Laboratory, Departament of Computer Engineering and Automation-DCA, Federal University of Rio Grande do Norte, Natal, Rio Grande do Norte, Brazil","institution_ids":["https://openalex.org/I35046152"]},{"raw_affiliation_string":"Fed. Univ. of Rio Grande do Norte, Natal","institution_ids":["https://openalex.org/I94328231"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035968177","display_name":"Allison C. da Cunha","orcid":null},"institutions":[{"id":"https://openalex.org/I94328231","display_name":"University of Rio Grande and Rio Grande Community College","ror":"https://ror.org/02sghbs34","country_code":"US","type":"education","lineage":["https://openalex.org/I94328231"]},{"id":"https://openalex.org/I35046152","display_name":"Universidade Federal do Rio Grande do Norte","ror":"https://ror.org/04wn09761","country_code":"BR","type":"education","lineage":["https://openalex.org/I35046152"]}],"countries":["BR","US"],"is_corresponding":false,"raw_author_name":"Allison C. da Cunha","raw_affiliation_strings":["LabSIN-Security Information Laboratory, Departament of Computer Engineering and Automation-DCA, Federal University of Rio Grande do Norte, Natal, Rio Grande do Norte, Brazil","Fed. Univ. of Rio Grande do Norte, Natal"],"affiliations":[{"raw_affiliation_string":"LabSIN-Security Information Laboratory, Departament of Computer Engineering and Automation-DCA, Federal University of Rio Grande do Norte, Natal, Rio Grande do Norte, Brazil","institution_ids":["https://openalex.org/I35046152"]},{"raw_affiliation_string":"Fed. Univ. of Rio Grande do Norte, Natal","institution_ids":["https://openalex.org/I94328231"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060643596","display_name":"Agostinho M. Brito","orcid":null},"institutions":[{"id":"https://openalex.org/I94328231","display_name":"University of Rio Grande and Rio Grande Community College","ror":"https://ror.org/02sghbs34","country_code":"US","type":"education","lineage":["https://openalex.org/I94328231"]},{"id":"https://openalex.org/I35046152","display_name":"Universidade Federal do Rio Grande do Norte","ror":"https://ror.org/04wn09761","country_code":"BR","type":"education","lineage":["https://openalex.org/I35046152"]}],"countries":["BR","US"],"is_corresponding":false,"raw_author_name":"Agostinho M. Brito","raw_affiliation_strings":["LabSIN-Security Information Laboratory, Departament of Computer Engineering and Automation-DCA, Federal University of Rio Grande do Norte, Natal, Rio Grande do Norte, Brazil","Fed. Univ. of Rio Grande do Norte, Natal"],"affiliations":[{"raw_affiliation_string":"LabSIN-Security Information Laboratory, Departament of Computer Engineering and Automation-DCA, Federal University of Rio Grande do Norte, Natal, Rio Grande do Norte, Brazil","institution_ids":["https://openalex.org/I35046152"]},{"raw_affiliation_string":"Fed. Univ. of Rio Grande do Norte, Natal","institution_ids":["https://openalex.org/I94328231"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103587819","display_name":"Paulo S. Motta Pires","orcid":null},"institutions":[{"id":"https://openalex.org/I35046152","display_name":"Universidade Federal do Rio Grande do Norte","ror":"https://ror.org/04wn09761","country_code":"BR","type":"education","lineage":["https://openalex.org/I35046152"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Paulo S. Motta Pires","raw_affiliation_strings":["LabSIN-Security Information Laboratory, Departament of Computer Engineering and Automation-DCA, Federal University of Rio Grande do Norte, Natal, Rio Grande do Norte, Brazil"],"affiliations":[{"raw_affiliation_string":"LabSIN-Security Information Laboratory, Departament of Computer Engineering and Automation-DCA, Federal University of Rio Grande do Norte, Natal, Rio Grande do Norte, Brazil","institution_ids":["https://openalex.org/I35046152"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5016043237"],"corresponding_institution_ids":["https://openalex.org/I35046152","https://openalex.org/I94328231"],"apc_list":null,"apc_paid":null,"fwci":2.567,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.90278349,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"772","last_page":"775"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7682698369026184},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.5703392624855042},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5525979399681091},{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.5396402478218079},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5269884467124939},{"id":"https://openalex.org/keywords/protocol-stack","display_name":"Protocol stack","score":0.5037395358085632},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4778713285923004},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4445565342903137},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.4324198365211487},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42541664838790894},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35976868867874146},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32566380500793457},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2914796769618988},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.152927964925766},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12662479281425476}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7682698369026184},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.5703392624855042},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5525979399681091},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.5396402478218079},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5269884467124939},{"id":"https://openalex.org/C38601921","wikidata":"https://www.wikidata.org/wiki/Q1757693","display_name":"Protocol stack","level":3,"score":0.5037395358085632},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4778713285923004},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4445565342903137},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.4324198365211487},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42541664838790894},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35976868867874146},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32566380500793457},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2914796769618988},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.152927964925766},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12662479281425476},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/efta.2007.4416854","is_oa":false,"landing_page_url":"https://doi.org/10.1109/efta.2007.4416854","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 IEEE Conference on Emerging Technologies &amp; Factory Automation (EFTA 2007)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320325185","display_name":"Universidade Federal do Rio Grande do Norte","ror":"https://ror.org/04wn09761"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W23758216","https://openalex.org/W1570131942","https://openalex.org/W1991848143","https://openalex.org/W2018546916","https://openalex.org/W2026640816","https://openalex.org/W2110817709","https://openalex.org/W2124369850"],"related_works":["https://openalex.org/W2615977515","https://openalex.org/W2115760278","https://openalex.org/W2146396794","https://openalex.org/W2807864071","https://openalex.org/W2809162650","https://openalex.org/W2388279172","https://openalex.org/W2617238897","https://openalex.org/W4386714408","https://openalex.org/W3164929525","https://openalex.org/W2952960077"],"abstract_inverted_index":{"TCP/IP":[0],"OS":[1,84],"fingerprinting":[2,68],"is":[3],"the":[4,65,120],"task":[5],"of":[6],"identify":[7,59,107],"a":[8,55,71,75,87,93],"machine":[9],"operating":[10,112],"system":[11,113],"according":[12,118],"to":[13,22,29,106,119],"its":[14,111],"protocol":[15],"stack":[16],"implementation.":[17],"Fingerprinting":[18],"tools":[19],"are":[20],"able":[21],"provide":[23],"information":[24],"that":[25,96],"can":[26,34],"be":[27,35,104],"useful":[28],"protect":[30],"SCADA":[31],"systems.":[32,100],"It":[33],"used":[36,105],"for":[37,58,82],"network":[38,62],"device":[39,121],"inventory,":[40],"detect":[41],"unauthorized":[42],"or":[43],"dangerous":[44],"devices":[45,63,108],"and":[46,60,70,86,114],"select":[47,115],"security":[48,116],"tests.":[49],"In":[50],"this":[51],"work":[52],"we":[53,91],"propose":[54],"new":[56,76],"method":[57],"classify":[61],"using":[64],"nmap":[66],"tool":[67],"capabilities":[69],"neural":[72,89],"network.":[73],"With":[74],"metric":[77],"based":[78,109],"on":[79,110],"Euclidean":[80],"distance":[81],"comparing":[83],"fingerprints":[85],"self-organizing":[88],"net,":[90],"build":[92],"contextual":[94],"map":[95,102],"groups":[97],"similarities":[98],"between":[99],"This":[101],"will":[103],"tests":[117],"class":[122],"it":[123],"belongs":[124],"to.":[125]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
