{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:01:33Z","timestamp":1725483693248},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540001652"},{"type":"electronic","value":"9783540361626"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36162-6_4","type":"book-chapter","created":{"date-parts":[[2007,5,3]],"date-time":"2007-05-03T12:51:14Z","timestamp":1178196674000},"page":"83-100","source":"Crossref","is-referenced-by-count":2,"title":["Categorizing Computing Assets According to Communication Patterns"],"prefix":"10.1007","author":[{"given":"Dieter","family":"Gantenbein","sequence":"first","affiliation":[]},{"given":"Luca","family":"Deri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,11,8]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"J. Case et.al., Simple Network Management Protocol (SNMP), RFC 1157, 1990","DOI":"10.17487\/rfc1157"},{"key":"4_CR2","unstructured":"Centennial, Network Inventory Audit, http:\/\/www.intertechnology.ca\/soft-1.htm"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"R. Cooley, B. Mobasher, and J. Srivastava, Grouping Web Page References into Transactions for Mining World Wide Web Browsing Patterns, in Proc. KDEX\u201997, Newport Beach CA, 1997","DOI":"10.1109\/KDEX.1997.629824"},{"key":"4_CR4","unstructured":"M.S. Chen, J.S. Park, and P.S. Yu, Data Mining for path traversal patterns in a Web environment, in Proc. 16th Int. Conf. On Distributed Computing Systems, p. 385\u2013392, 1996"},{"key":"4_CR5","unstructured":"Denmac Systems, Network Based Intrusion Detection: a Review of Technologies, http:\/\/www.denmac.com\/ , November 1999"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"L. Deri and S. Suin, Effective Traffic Measurement using ntop, IEEE Communications Magazine, May 2000, http:\/\/luca.ntop.org\/ntop_IEEE.pdf.gz","DOI":"10.1109\/35.841838"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"L. Deri and S. Suin, Effective Traffic Measurement using ntop, IEEE Communications Magazine, May 2000, Monitoring Networks using Ntop, in Proc. 2001 IEEE\/IFIP Int. Symp. On Integrated Network Management, Seattle, WA, 2001","DOI":"10.1109\/35.841838"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"L. Deri and S. Suin, Ntop: beyond Ping and Traceroute, DSOM, 1999, http:\/\/luca.ntop.org\/ntop_DSOM99.pdf.gz","DOI":"10.1007\/3-540-48100-1_21"},{"key":"4_CR9","unstructured":"Ethereal free network protocol analyzer for Unix and Windows, http:\/\/www.ethereal.com\/"},{"key":"4_CR10","volume-title":"Diploma Thesis","author":"M. Filoni","year":"2001","unstructured":"M. Filoni, Computing assets categorization according to collected configuration and usage information, Diploma Thesis, University of Pisa, Italy, November 2001"},{"key":"4_CR11","volume-title":"Network-based IT asset discovery and categorization, Presentation","author":"D. Gantenbein","year":"2000","unstructured":"D. Gantenbein, Network-based IT asset discovery and categorization, Presentation, University of Pisa, Italy, October 2000"},{"key":"4_CR12","unstructured":"J. Han and M. Kamber, Data Mining: Concepts and Techniques, Academic Press, 2001, ISBN 1-55860-489-8"},{"key":"4_CR13","unstructured":"D. Heywood, Networking with Microsoft TCP\/IP, 3rd edition, Microsoft Press, New Riders Publishing, ISBN: 0-7357-0014-1, 1998"},{"key":"4_CR14","unstructured":"J. Fielding et.al., Hypertext Transfer Protocol-HTTP 1.1"},{"key":"4_CR15","unstructured":"Pervasive Computing, IBM Systems Journal, Vol. 38, No. 4, 1999. http:\/\/www.research.ibm.com\/journal\/sj38-4.html"},{"key":"4_CR16","unstructured":"Intelligent Device Discovery (IDD), IBM Zurich Research Laboratory, Project http:\/\/www.zurich.ibm.com\/csc\/ibi\/idd.html"},{"key":"4_CR17","unstructured":"V. Jacobson, C. Leres, and S. McCanne, tcpdump, Lawrence Berkeley National Labs, ftp:\/\/ftp.ee.lbl.gov\/ , 1989"},{"key":"4_CR18","unstructured":"A. G. Lowe-Norris, Windows 2000 Active Directory, O\u2019Reilly, ISBN 3-89721-171-8, 2001"},{"key":"4_CR19","unstructured":"Microsoft Exchange: Tracking Log, http:\/\/www.microsoft.com\/Exchange\/en\/55\/help\/default.asp?url=\/Exchange\/en\/55\/help\/documents\/server\/XMT04027.HTM"},{"key":"4_CR20","unstructured":"Caida, NetGeo: the Internet Geographic Database, http:\/\/netgeo.caida.org\/ , 2000"},{"key":"4_CR21","unstructured":"NetView, Tivoli product, http:\/\/www.tivoli.com\/products\/index\/netview\/"},{"key":"4_CR22","unstructured":"NMAP Free Security Scanner, http:\/\/www.insecure.org\/nmap\/index.html"},{"key":"4_CR23","unstructured":"NSA Firewall Network Security Auditor, http:\/\/www.research.ibm.com\/gsal\/gsal-watson.html"},{"key":"4_CR24","unstructured":"L. Deri, Ntop: a Lightweight Open-Source Network IDS, 1998-2001, http:\/\/www.ntop.org\/"},{"key":"4_CR25","unstructured":"J. Pitkow, In search of a reliable usage data on the www, in Sixth Int. Wold Wide Web Conf., pp. 451\u2013463, Santa Clara CA, 1997"},{"key":"4_CR26","unstructured":"Sendmail mail service, http:\/\/www.sendmail.org"},{"key":"4_CR27","unstructured":"R. Siamwalla et al., Discovering Internet Topology, in Proc. IEEE INFOCOM\u2019 99, 1999, http:\/\/www.cs.cornell.edu\/skeshav\/papers\/di scovery.pdf"},{"key":"4_CR28","unstructured":"Simple Mail Transfer Protocol, J. B. Postel, RFC 821, August 1982"},{"key":"4_CR29","unstructured":"Tivoli, Inventory management, http:\/\/www.tivoli.com\/products\/index\/inventory\/"},{"key":"4_CR30","unstructured":"Tivoli, Performance solutions, http:\/\/www.tivoli.com\/products\/solutions\/availability\/news.html"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"S. Branigan et al., What can you do with Traceroute?, http:\/\/www.computer.org\/internet\/v5n5\/index.htm","DOI":"10.1109\/4236.957902"},{"key":"4_CR32","unstructured":"Extended Common Log File Format, W3C working Draft, http:\/\/www.w3.org\/TR\/WD-logfile"},{"key":"4_CR33","unstructured":"Winfingerprint Windows Information Gathering Tool, http:\/\/winfingerprint.sourceforge.net\/"}],"container-title":["Lecture Notes in Computer Science","Advanced Lectures on Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36162-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T13:21:52Z","timestamp":1556371312000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36162-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540001652","9783540361626"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/3-540-36162-6_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}