{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T11:47:32Z","timestamp":1763466452827},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2005,9,1]],"date-time":"2005-09-01T00:00:00Z","timestamp":1125532800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2005,9]]},"DOI":"10.1007\/s10922-005-6263-2","type":"journal-article","created":{"date-parts":[[2005,9,13]],"date-time":"2005-09-13T06:03:53Z","timestamp":1126591433000},"page":"329-344","source":"Crossref","is-referenced-by-count":5,"title":["NetGlean: A Methodology for Distributed Network Security Scanning"],"prefix":"10.1007","volume":"13","author":[{"given":"Gavin W.","family":"Manes","sequence":"first","affiliation":[]},{"given":"Dominic","family":"Schulte","sequence":"additional","affiliation":[]},{"given":"Seth","family":"Guenther","sequence":"additional","affiliation":[]},{"given":"Sujeet","family":"Shenoi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6263_CR1","unstructured":"Jeff Forristal and Greg Shipley, Vulnerability Assessment Scanners, Network Computing, January 8, 2001. http:\/\/www.nwc.com\/1201\/1201f1b1.html."},{"key":"6263_CR2","unstructured":"Fyodor, The Art of Port Scanning, www.insecure.org\/nmap\/nmap_doc.html, December 2, 2002."},{"key":"6263_CR3","unstructured":"Fyodor, Remote OS Detection via TCP\/IP Stack FingerPrinting, http:\/\/www.insecure.org, April 10, 1999."},{"key":"6263_CR4","unstructured":"Thomas Ptacek and Timothy Newsham, Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, January 1998."},{"key":"6263_CR5","unstructured":"Richard Forno and Kenneth R. van Wyk, Incident Response. O\u2019Reilly & Associates, Inc: August, 2001."},{"key":"6263_CR6","unstructured":"Kapil Sharma, Security Scanners, Linux Gazette, Issue 57. September 2000."},{"key":"6263_CR7","doi-asserted-by":"crossref","unstructured":"Blackburn Skaggs, Shenoi Manes, Network Vulnerability Analysis, Proceedings of the IEEE 45th Midwest Symposium on Circuits and Systems, Tulsa, OK, August 4\u20137, 2002.","DOI":"10.1109\/MWSCAS.2002.1187081"},{"key":"6263_CR8","unstructured":"J. Novotny, A. Meehan, D. Schulte, G. Manes, and S. Shenoi, Evidence Acquisition Tools for Cyber Sex Crimes Investigations, Proceedings of the SPIE Conference on Sensors and C3I Technologies for Homeland Defense and Law Enforcement (Vol. 4708), Orlando, Florida, April 2002."},{"key":"6263_CR9","unstructured":"Farrow, System Fingerprinting With Nmap, Network Magazine, November 5, 2000."},{"key":"6263_CR10","unstructured":"Arkin Ofir and Fyodor Yarochkin, Xprobe v2.0: A \u2018Fuzzy\u2019 Approach to Remote Active Operating System Fingerprinting. The Sys-Security Group, August 2002. http:\/\/www.sys-security.com."},{"key":"6263_CR11","unstructured":"Valeur Vigna, J. Zhou, and R. A. Kemmerer, Composable Tools For Network Discovery and Security Analysis, http:\/\/www.cs.ucsb.edu\/~rsg\/pub\/2002_vigna_valeur_zhou_kemmerer_acsac02.pdf, November 20, 2002."},{"key":"6263_CR12","unstructured":"Arkin Ofir, ICMP Usage in Scanning. The Sys-Security Group, June 2001. http:\/\/www.sys-security.com."},{"key":"6263_CR13","unstructured":"Steve Gibson, The Strange Tale of the Denial of Service Attacks Against GRC.COM, Gibson Research Corporation: March 5, 2002."},{"key":"6263_CR14","unstructured":"Tom Harris, How Fingerprint Scanners Work, http:\/\/www.howstuffworks.com\/fingerprint-scanner.htm, December 2, 2002."},{"key":"6263_CR15","unstructured":"El-Semary, A Framework for Network Intelligence and Security, Ph.D. Disseration, University of Tulsa, 2004."},{"key":"6263_CR16","unstructured":"Coretez Geovanni, Passive Mapping: An Offensive Use of IDS, Endeavor Systems, April 11, 2000."},{"key":"6263_CR17","unstructured":"Dawkins Manes and Shenoi Hale, Identifying & Tracking Attacks on Networks: C3I Displays & Related Technologies, Proceedings of the SPIE Conference on Sensors and C3I Technologies for Homeland Defense and Law Enforcement (Vol. 5071), Orlando, Florida, April 2003."},{"key":"6263_CR18","unstructured":"Nessus Information and Documentation. http:\/\/www.nessus.org\/."},{"key":"6263_CR19","unstructured":"Nazario Jose, Passive System Fingerprinting using Network Client Applications, Crimelabs Research, January 19, 2001. http:\/\/www.crimelabs.net\/docs\/passive.pdf."}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-005-6263-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-005-6263-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-005-6263-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T08:51:20Z","timestamp":1559465480000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-005-6263-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,9]]}},"alternative-id":["6263"],"URL":"https:\/\/doi.org\/10.1007\/s10922-005-6263-2","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,9]]}}}