{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:03:08Z","timestamp":1730275388748,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/ispan.2004.1300542","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"587-593","source":"Crossref","is-referenced-by-count":4,"title":["Arm up administrators: automated vulnerability management"],"prefix":"10.1109","author":[{"given":"H.T.","family":"Tian","sequence":"first","affiliation":[]},{"given":"L.S.","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Z.","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Y.L.","family":"Luo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Passive Fingerprinting IDing Remote Hosts Without Them Knowing","year":"2000","author":"spitzna","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/S1363-4127(02)00104-8"},{"year":"0","key":"18"},{"key":"15","article-title":"Netkuang-a multi-host configuration vulnerability checker","author":"zerkle","year":"1998","journal-title":"Proceedings of the Summer 1998 USENIX Conference"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/2.963441"},{"key":"13","article-title":"Towards a common enumeration of vulnerabilities","author":"mann","year":"1999","journal-title":"2nd Workshop Research with Security Vulnerability Databases"},{"year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.1999.797953"},{"key":"12","article-title":"Vulnerability assessment scanners","author":"forristal","year":"2001","journal-title":"Network Computing"},{"year":"0","key":"21"},{"journal-title":"Remote OS detection via TCP\/IP stack fingerprinting","year":"1999","author":"fyodor","key":"20"},{"year":"0","key":"22"},{"key":"23","article-title":"What are the vulnerabilities that we are looking at today?","author":"venter","year":"2002","journal-title":"Computers&Security"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/185403.185412"},{"key":"25","article-title":"Use of A taxonomy of security faults","volume":"tr96 51","author":"aslam","year":"1996","journal-title":"Technical Report"},{"year":"0","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45203-4_18"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"journal-title":"Fundamentals of Computer Security Technology","year":"1994","author":"amoroso","key":"10"},{"year":"0","key":"1"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"year":"0","key":"5"},{"year":"0","key":"4"},{"year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","start":{"date-parts":[[2004,5,12]]},"location":"Hong Kong, China","end":{"date-parts":[[2004,5,12]]}},"container-title":["7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9103\/28881\/01300542.pdf?arnumber=1300542","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T20:33:44Z","timestamp":1489437224000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1300542\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ispan.2004.1300542","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}