{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:00:27Z","timestamp":1730210427447,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/csac.2002.1176274","type":"proceedings-article","created":{"date-parts":[[2003,6,26]],"date-time":"2003-06-26T15:35:00Z","timestamp":1056641700000},"page":"14-24","source":"Crossref","is-referenced-by-count":3,"title":["Composable tools for network discovery and security analysis"],"prefix":"10.1109","author":[{"given":"G.","family":"Vigna","sequence":"first","affiliation":[]},{"given":"F.","family":"Valeur","sequence":"additional","affiliation":[]},{"given":"J.","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"R.A.","family":"Kemmerer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Fyodor Nmap - the network mapper","year":"2002","key":"ref4"},{"journal-title":"D M T Force Common Information Model (CIM) Core Model White Paper","year":"0","key":"ref3"},{"key":"ref10","volume":"792","author":"postel","year":"1981","journal-title":"Internet control message protocol"},{"journal-title":"Managing your Network with HP OpenView Network Node Manager","year":"2000","author":"packard","key":"ref6"},{"key":"ref11","article-title":"Tel Extensions for Network Management Applications","author":"schonwalder","year":"1995","journal-title":"Proc 3rd Tcl\/Tk Workshop"},{"journal-title":"O Group PROTOS Test-Suite c06-snmpv1","year":"2002","key":"ref5"},{"key":"ref12","first-page":"335","article-title":"Fremont, A System for Discovering Network Characteristics and Problems","author":"wood","year":"1993","journal-title":"USENIX Conference Proceedings"},{"journal-title":"Nessus homepage","year":"2002","key":"ref8"},{"journal-title":"Internet Security Systems Internet Scanner","year":"2002","key":"ref7"},{"key":"ref2","article-title":"Protocol operations for version 2 of the simple network management protocol (SNMPv2)","author":"case","year":"1996","journal-title":"Internet Engineering Task Force (IETF) RFC 1905"},{"journal-title":"Getting Started with Tkined","year":"1997","author":"newnham","key":"ref9"},{"journal-title":"Big brother system and network monitor homepage","year":"2002","key":"ref1"}],"event":{"name":"Eighteenth Annual Computer Security Applications Conference","acronym":"CSAC-02","location":"Las Vegas, NV, USA"},"container-title":["18th Annual Computer Security Applications Conference, 2002. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8386\/26404\/01176274.pdf?arnumber=1176274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T23:11:57Z","timestamp":1489446717000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1176274\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/csac.2002.1176274","relation":{},"subject":[]}}