{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T10:57:58Z","timestamp":1762340278870},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642040900"},{"type":"electronic","value":"9783642040917"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04091-7_1","type":"book-chapter","created":{"date-parts":[[2009,9,26]],"date-time":"2009-09-26T01:52:07Z","timestamp":1253929927000},"page":"1-8","source":"Crossref","is-referenced-by-count":11,"title":["A Data Mining Based Analysis of Nmap Operating System Fingerprint Database"],"prefix":"10.1007","author":[{"given":"Jo\u00e3o Paulo S.","family":"Medeiros","sequence":"first","affiliation":[]},{"suffix":"Jr.","given":"Agostinho M.","family":"Brito","sequence":"additional","affiliation":[]},{"given":"Paulo S. Motta","family":"Pires","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"1_CR1","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/BF00337288","volume":"43","author":"T. Kohonen","year":"1982","unstructured":"Kohonen, T.: Self-organized formation of topologically correct feature maps. Biological Cybernetics\u00a043(1), 59\u201369 (1982)","journal-title":"Biological Cybernetics"},{"key":"1_CR2","unstructured":"Fritzke, B.: A Growing Neural Gas Network Learns Topologies. Advances in Neural Information Processing Systems 7 (1995)"},{"key":"1_CR3","first-page":"100","volume":"28","author":"J. Hartigan","year":"1979","unstructured":"Hartigan, J., Wong, M.: A K-means Clustering Algorithm. JR Stat. Soc. Ser. C-Appl. Stat.\u00a028, 100\u2013108 (1979)","journal-title":"JR Stat. Soc. Ser. C-Appl. Stat."},{"key":"1_CR4","unstructured":"Fyodor: Remote OS Detection via TCP\/IP Fingerprinting. Phrack Magazine 8 (1998)"},{"key":"1_CR5","unstructured":"Fyodor: Nmap Network Scanning. Insecure.Com LLC (2008)"},{"key":"1_CR6","volume-title":"Data mining: concepts and techniques","author":"J. Han","year":"2006","unstructured":"Han, J., Kamber, M.: Data mining: concepts and techniques, 2nd edn. Morgan Kaufmann, San Francisco (2006)","edition":"2"},{"key":"1_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-56927-2","volume-title":"Self-Organizing Maps","author":"T. Kohonen","year":"2001","unstructured":"Kohonen, T.: Self-Organizing Maps, 3rd edn. Springer, Heidelberg (2001)","edition":"3"},{"key":"1_CR8","volume-title":"Neural Networks: A Comprehensive Foundation","author":"S. Haykin","year":"1999","unstructured":"Haykin, S.: Neural Networks: A Comprehensive Foundation. Prentice-Hall, Englewood Cliffs (1999)"},{"key":"1_CR9","unstructured":"Apple Developer Connection: Open Source (2009), \n                    \n                      http:\/\/developer.apple.com\/opensource\/index.html"},{"key":"1_CR10","unstructured":"FreeBSD News: FreeBSD embedded systems (2008), \n                    \n                      http:\/\/www.freebsdnews.net\/2008\/07\/24\/freebsd-embedded-systems\/"},{"key":"1_CR11","unstructured":"NetBSD Project: Products based on NetBSD (2009), \n                    \n                      http:\/\/www.netbsd.org\/gallery\/products.html"},{"key":"1_CR12","first-page":"397","volume":"1","author":"T. Martinetz","year":"1991","unstructured":"Martinetz, T., Schulten, K.: A Neural-Gas Network Learns Topologies. Artificial Neural Networks\u00a01, 397\u2013402 (1991)","journal-title":"Artificial Neural Networks"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Medeiros, J.P.S., Cunha, A.C., Brito, A.M., Pires, P.S.M.: Automating Security Tests for Industrial Automation Devices Using Neural Networks. In: Proc. IEEE Conference on Emerging Technologies & Factory Automation, pp. 772\u2013775 (2007)","DOI":"10.1109\/EFTA.2007.4416854"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89173-4_20","volume-title":"Critical Information Infrastructures Security","author":"J.P.S. Medeiros","year":"2008","unstructured":"Medeiros, J.P.S., Cunha, A.C., Brito, A.M., Pires, P.S.M.: Application of Kohonen Maps to Improve Security Tests on Automation Devices. In: Lopez, J., H\u00e4mmerli, B.M. (eds.) CRITIS 2007. LNCS, vol.\u00a05141. Springer, Heidelberg (2008)"},{"key":"1_CR15","unstructured":"OpenBSD PF: The OpenBSD Packet Filter \u2013 OpenBSD 4.4 (2008)"}],"container-title":["Advances in Intelligent and Soft Computing","Computational Intelligence in Security for Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04091-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T11:25:18Z","timestamp":1580297118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04091-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642040900","9783642040917"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04091-7_1","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2009]]}}}