{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:22:56Z","timestamp":1729660976711,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/cts.2012.6261108","type":"proceedings-article","created":{"date-parts":[[2012,8,8]],"date-time":"2012-08-08T17:09:50Z","timestamp":1344445790000},"page":"575-582","source":"Crossref","is-referenced-by-count":1,"title":["APSAT: A framework for modeling and analysis of workflow dynamics in mission-centric systems"],"prefix":"10.1109","author":[{"given":"John","family":"Pecarina","sequence":"first","affiliation":[]},{"given":"Jyh-Charn","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/984334.984339"},{"year":"2004","author":"hertel","journal-title":"IMPLEMENTING CIFS The Common Internet File System","key":"11"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1016\/j.tcs.2008.08.042"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1007\/978-0-387-77672-9_12"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/TKDE.2004.47"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19345-3","author":"van der aalst","year":"2011","journal-title":"Process Mining Discovery Conformance and Enhancement of Business Processes"},{"year":"0","journal-title":"Splunk | Operational Intelligence Log Management Application Management Security and Compliance","key":"10"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1016\/S1389-1286(99)00112-7"},{"year":"0","journal-title":"SMB Traffic Analyzer Hhetter's Blog","key":"6"},{"year":"0","journal-title":"Nagios - The Industry Standard in IT Infrastructure Monitoring","key":"5"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1007\/978-1-4419-0056-2_23"},{"key":"9","volume":"5","author":"combs","year":"1998","journal-title":"Wireshark-Network Protocol Analyzer"},{"key":"8","article-title":"Snort-lightweight intrusion detection system","author":"roesch","year":"1999","journal-title":"Proceedings of LISA'99 13th Systems Administration Conference"}],"event":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","start":{"date-parts":[[2012,5,21]]},"location":"Denver, CO, USA","end":{"date-parts":[[2012,5,25]]}},"container-title":["2012 International Conference on Collaboration Technologies and Systems (CTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6247135\/6261004\/06261108.pdf?arnumber=6261108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T00:03:08Z","timestamp":1643155388000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6261108\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/cts.2012.6261108","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}