{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:05:59Z","timestamp":1742947559460,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319525686"},{"type":"electronic","value":"9783319525693"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-52569-3_6","type":"book-chapter","created":{"date-parts":[[2017,1,17]],"date-time":"2017-01-17T20:06:24Z","timestamp":1484683584000},"page":"62-76","source":"Crossref","is-referenced-by-count":1,"title":["Network Topology Exploration for Industrial Networks"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Paul","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Franka","family":"Schuster","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hartmut","family":"K\u00f6nig","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,1,19]]},"reference":[{"key":"6_CR1","unstructured":"Snort: Network intrusion detection system (2016). https:\/\/www.snort.org"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Black, R., Donnelly, A., Fournet, C.: Ethernet topology discovery without network assistance. In: Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), Berlin, Germany, 5\u20138 October 2004, pp. 328\u2013339 (2004)","DOI":"10.1109\/ICNP.2004.1348122"},{"issue":"3","key":"6_CR3","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1109\/TNET.2004.828963","volume":"12","author":"Y Breitbart","year":"2004","unstructured":"Breitbart, Y., Garofalakis, M.N., Jai, B., Martin, C., Rastogi, R., Silberschatz, A.: Topology discovery in heterogeneous IP networks: the NetInventory system. IEEE\/ACM Trans. Netw. 12(3), 401\u2013414 (2004)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Eriksson, B., Barford, P., Nowak, R.D., Crovella, M.: Learning network structure from passive measurements. In: Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, IMC 2007, San Diego, California, USA, 24\u201326 October 2007, pp. 209\u2013214 (2007)","DOI":"10.1145\/1298306.1298335"},{"issue":"4","key":"6_CR5","doi-asserted-by":"crossref","first-page":"1220","DOI":"10.1109\/TNET.2009.2039757","volume":"18","author":"H Gobjuka","year":"2010","unstructured":"Gobjuka, H., Breitbart, Y.: Ethernet topology discovery for networks with incomplete information. IEEE\/ACM Trans. Netw. 18(4), 1220\u20131233 (2010)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/978-3-642-33338-5_18","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"D Had\u017eiosmanovi\u0107","year":"2012","unstructured":"Had\u017eiosmanovi\u0107, D., Simionato, L., Bolzoni, D., Zambon, E., Etalle, S.: N-Gram against the machine: on the feasibility of the N-Gram network analysis for binary protocols. In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. LNCS, vol. 7462, pp. 354\u2013373. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33338-5_18"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Kienzle, D.M., Evans, N.S., Elder, M.C.: NICE: endpoint-based topology discovery. In: Cyber and Information Security Research Conference, CISR 2014, Oak Ridge, TN, USA, 8\u201310 April 2014, pp. 97\u2013100 (2014)","DOI":"10.1145\/2602087.2602104"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Lowekamp, B., O\u2019Hallaron, D.R., Gross, T.R.: Topology discovery for large ethernet networks. In: SIGCOMM, pp. 237\u2013248 (2001)","DOI":"10.1145\/383059.383078"},{"key":"6_CR9","unstructured":"Moussadek-Kabdania, A., Soilli, A.: Grassmarlin, an open-source tool for passive ICS network mapping (2016). http:\/\/www.securityinsider-solucom.fr\/2016\/03\/en-grassmarlin-open-source-tool-for.html"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Schuster, F., Paul, A.: A distributed intrusion detection system for industrial automation networks. In: Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation, ETFA 2012, Krakow, Poland, 17\u201321 September 2012, pp. 1\u20134. IEEE (2012)","DOI":"10.1109\/ETFA.2012.6489703"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Schuster, F., Paul, A., Rietz, R., K\u00f6nig, H.: Potentials of using one-class SVM for detecting protocol-specific anomalies in industrial networks. In: IEEE Symposium Series on Computational Intelligence, SSCI 2015, Cape Town, South Africa, 7\u201310 December 2015, pp. 83\u201390. IEEE (2015)","DOI":"10.1109\/SSCI.2015.22"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Wang, Y., Li, D., Han, C., Zhu, Z.: Research and application on automatic network topology discovery in ITSM system. In: Proceedings of the 9th International Conference on Hybrid Intelligent Systems, Shenyang, China, 12\u201314 August 2009, pp. 336\u2013340 (2009)","DOI":"10.1109\/HIS.2009.180"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Yao, B., Viswanathan, R., Chang, F., Waddington, D.G.: Topology inference in the presence of anonymous routers. In: IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30 - April 3 2003 (2003)","DOI":"10.1109\/INFCOM.2003.1208687"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Industrial Networks and Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-52569-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T04:28:58Z","timestamp":1498364938000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-52569-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319525686","9783319525693"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-52569-3_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}