{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T21:11:31Z","timestamp":1769980291544,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540665984","type":"print"},{"value":"9783540481003","type":"electronic"}],"license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48100-1_21","type":"book-chapter","created":{"date-parts":[[2007,11,7]],"date-time":"2007-11-07T07:40:29Z","timestamp":1194421229000},"page":"271-283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Ntop: Beyond Ping and Traceroute"],"prefix":"10.1007","author":[{"given":"Luca","family":"Deri","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Suin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,3]]},"reference":[{"key":"21_CR1","unstructured":"Abell V.: hf, \n                    ftp:\/\/vic.cc.purdue.edu\/pub\/tools\/unix\/lsof\/\n                    \n                   (1 998)."},{"key":"21_CR2","unstructured":"Apostals E.: queso, \n                    http:\/\/www.apostols.org\/\n                    \n                   (1998)."},{"key":"21_CR3","unstructured":"Binns R.: top (1993)."},{"key":"21_CR4","unstructured":"BrownIee N.: NeTraMet v.4.2 Users\u2019 Guide, \n                    http:\/\/WWW.auckland.an.nz\/net\/Accounting\/\n                    \n                   (1998)."},{"key":"21_CR5","unstructured":"Claerhout B.: IP Spoof (1996)."},{"key":"21_CR6","unstructured":"Deri L.: Droplets: Breaking Monolithic Applications Apart, IBM Research Report RZ 2799 (1 995)."},{"key":"21_CR7","unstructured":"Deri L.: Surfin\u2019 Network Management Applications Across the Web, Proceedings of 2nd Xnt. IEEE Workshop on System and Network Management (1996)."},{"key":"21_CR8","unstructured":"Fyodor: Remote 0s detection via TCP\/IP stack fingerprinting, \n                    http:\/\/www.insecure.org\/nmap\/nmap-fingerprinting-article.txt\n                    \n                   (1998)."},{"key":"21_CR9","unstructured":"Jacobson V., Leres C., and McCanne S.: tcpdump, Lawrence Berkeley National Labs, \n                    ftp:\/\/ftp. ee. lbl.gov\/\n                    \n                   (1989)."},{"key":"21_CR10","unstructured":"Jander M.: Web-based Management: Welcome to the Revolution, Data Communications (1996)."},{"key":"21_CR11","unstructured":"S. McCanne and V. Jacobson: The BSD Packer Filter: A New Architecture for User-level Packet Capture, Proc. of 1993 Winter USENIX Conference, 1993."},{"key":"21_CR12","unstructured":"S. McCanne, C. Leres and V. Jacobson: libpcap, Lawrence Berkeley National Labs, \n                    ftp:\/\/ftp.ee.lbl.gov\/\n                    \n                   (1994)."},{"key":"21_CR13","unstructured":"Microsoft Corporation: NDIS Packet Driver 3.0 (1996)."},{"key":"21_CR14","unstructured":"Ranum M., and others: Implementing a Generalized Tool for Network Monitoring, Proc. of LISA\u201997, USENIX 1 1 th System Administration Conference, \n                    http:\/\/www.nfr.com\/forum\/publications\/LISA-97.htm\n                    \n                   (1997)."},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Raymond E.: The Cathedral and the Bazaar, \n                    http:\/\/www.tuxedo.org\/-esr\/\n                    \n                   (1998).","DOI":"10.5210\/fm.v3i2.578"},{"key":"21_CR16","unstructured":"Stevens R.: UNIX Network Programming, Volume 1, 2nd Edition (1998)."},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Waldbusser S.: Remote Network Monitoring Management Information Base, RFC 1757 (1995).","DOI":"10.17487\/rfc1757"},{"key":"21_CR18","unstructured":"Free Software Foundation, GNU gdbm, \n                    http:\/\/www.gnu.org\/software\/gdbm\/\n                    \n                   (1999)."}],"container-title":["Lecture Notes in Computer Science","Active Technologies for Network and Service Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48100-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T11:00:30Z","timestamp":1558263630000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48100-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540665984","9783540481003"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-48100-1_21","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1999]]},"assertion":[{"value":"3 June 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}