{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T23:22:04Z","timestamp":1777591324225,"version":"3.51.4"},"reference-count":30,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/dance.2002.1003509","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T20:30:39Z","timestamp":1056573039000},"page":"379-393","source":"Crossref","is-referenced-by-count":21,"title":["Active network monitoring and control: the SENCOMM architecture and implementation"],"prefix":"10.1109","author":[{"given":"A.W.","family":"Jackson","sequence":"first","affiliation":[]},{"given":"J.P.G.","family":"Sterbenz","sequence":"additional","affiliation":[]},{"given":"M.N.","family":"Condell","sequence":"additional","affiliation":[]},{"given":"R.R.","family":"Hain","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/231699.231701"},{"key":"ref10","author":"condell","year":"2002","journal-title":"User's Guide to the SENCOMM Environment in the ABONE"},{"key":"ref11","article-title":"Writing a Probe in the SENCOMM Environment","author":"condell","year":"2002"},{"key":"ref12","author":"dawson","year":"2000","journal-title":"User Guide to Anetd 1 6 3)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/65.750445"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/248156.248162"},{"key":"ref15","author":"jackson","year":"2001","journal-title":"Sencomm architecture"},{"key":"ref16","author":"jackson","year":"2001","journal-title":"Sencomm design"},{"key":"ref17","first-page":"259","article-title":"The BSD Packet Filter: A new architecture for user-level packet capture","author":"mccanne","year":"1993","journal-title":"Proceedings of the 1993 Winter USENIX Technical Conference"},{"key":"ref18","article-title":"Network time protocol (version 3) specification, implementation","author":"mills","year":"1992","journal-title":"Request for Comments 1305 Internet Engineering Task Force"},{"key":"ref19","author":"moats","year":"1997","journal-title":"URN syntax Request for Comments 2141 Internet Engineering Task Force"},{"key":"ref28","author":"ricciulli","year":"1998","journal-title":"Anetd Active NETworks Daemon (v1 0) Technical report"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/65.690960"},{"key":"ref27","author":"peterson","year":"2000","journal-title":"NodeOS Interface Specification AN draft AN Node OS Working Group"},{"key":"ref3","article-title":"Active Network Encapsulation Protocol (ANEP)","author":"alexander","year":"1997","journal-title":"Technical report Active Networks Group"},{"key":"ref6","author":"calvert","year":"1999","journal-title":"ConCast"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IZSBC.2002.991742"},{"key":"ref5","article-title":"ASP EE: An Active Execution Environment for Network Control Protocols","author":"braden","year":"1999","journal-title":"Technical Report"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/35.722139"},{"key":"ref7","article-title":"Architectural Framework for Active Networks","author":"calvert","year":"1998","journal-title":"AN Architecture Working Group Draft"},{"key":"ref2","year":"0"},{"key":"ref9","author":"condell","year":"2002","journal-title":"SENCOMM Programmer's API"},{"key":"ref1","year":"0"},{"key":"ref20","author":"murphy","year":"0","journal-title":"Active node security architecture diagram"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/OPNARC.2001.916839"},{"key":"ref21","article-title":"Proposed modifications to security architecture: Topics 1&#x2013;5","author":"murphy","year":"1999","journal-title":"Active Nets security mailing list"},{"key":"ref24","author":"murphy","year":"2001","journal-title":"Security Architecture for Active Networks AN draft AN Security Working Group"},{"key":"ref23","author":"murphy","year":"1998","journal-title":"Security Architecture for Active Networks AN draft AN Security Working Group"},{"key":"ref26","article-title":"Version 2 of the Reliable Data Protocol (RDP)","author":"partridge","year":"1990","journal-title":"Request for Comments 1151 Internet Engineering Task Force"},{"key":"ref25","author":"nagle","year":"0","journal-title":"Network Attached Secure Disk"}],"event":{"name":"DARPA Active Networks Conference and Exposition","location":"San Francisco, CA, USA","acronym":"DANCE-02"},"container-title":["Proceedings DARPA Active Networks Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7864\/21659\/01003509.pdf?arnumber=1003509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T18:30:51Z","timestamp":1489170651000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1003509\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/dance.2002.1003509","relation":{},"subject":[]}}