{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:50:20Z","timestamp":1725749420308},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642414756"},{"type":"electronic","value":"9783642414763"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41476-3_18","type":"book-chapter","created":{"date-parts":[[2013,9,22]],"date-time":"2013-09-22T21:30:06Z","timestamp":1379885406000},"page":"205-208","source":"Crossref","is-referenced-by-count":1,"title":["Dependencies Discovery and Analysis in Distributed Systems"],"prefix":"10.1007","author":[{"given":"Emiliano","family":"Casalicchio","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"AggreGate. Network Manager, \n                  \n                    http:\/\/aggregate.tibbo.com\/"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Bahl, P., Chandra, R., Greenberg, A., Kandula, S., Maltz, D.A., Zhang, M.: Towards highly reliable enterprise network services via inference of multi-level dependencies. Microsoft Research (2007)","DOI":"10.1145\/1282380.1282383"},{"key":"18_CR3","unstructured":"Chen, X., Zhang, M., Morley Mao, Z., Bahl, P.: Automating network application dependency discovery: experiences, limitations, and new solutions. Microsoft Research, University of Michigan (2008)"},{"key":"18_CR4","unstructured":"HP. Network management center, \n                  \n                    https:\/\/h10078.www1.hp.com\/cda\/"},{"key":"18_CR5","unstructured":"IBM. Tivoli, \n                  \n                    http:\/\/www-01.ibm.com\/software\/tivoli\/"},{"key":"18_CR6","unstructured":"OpenNMS, \n                  \n                    http:\/\/www.opennms.org\/"},{"key":"18_CR7","unstructured":"ServiceNow, \n                  \n                    http:\/\/www.service-now.com\/"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Kandula, S., Chandra, R., Katabi, D.: Whats going on? Learning communication rules in edge networks. Microsoft Research (2008)","DOI":"10.1145\/1402958.1402970"},{"key":"18_CR9","unstructured":"Standford Linear Accelerator Center, Network Monitoring Tools, \n                  \n                    http:\/\/www.slac.stanford.edu\/xorg\/nmtf\/nmtf-tools.html"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Tyson Macaulay Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies. CRC Press Inc. (December 2009)","DOI":"10.1201\/9781420068368"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructure Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41476-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T22:37:52Z","timestamp":1578523072000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41476-3_18"}},"subtitle":["(Short Paper)"],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642414756","9783642414763"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41476-3_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}