{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:29:02Z","timestamp":1766579342041,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/noms.2014.6838295","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T19:03:46Z","timestamp":1406574226000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Managing risk in multi-node automation of endpoint management"],"prefix":"10.1109","author":[{"given":"Sai","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Constantin","family":"Adam","sequence":"additional","affiliation":[]},{"given":"Fred","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Shang","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yaoping","family":"Ruan","sequence":"additional","affiliation":[]},{"given":"Cashchakanithara","family":"Venugopal","sequence":"additional","affiliation":[]},{"given":"Rajeev","family":"Puri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Parsing techniques a practical guide","year":"2007","author":"grune","key":"17"},{"journal-title":"Facade Collaborative Creation Peer Review and Execution of IT Tickets","year":"2011","author":"de","key":"18"},{"key":"15","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-3-540-74320-0_6","article-title":"The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware","author":"vallentin","year":"2007","journal-title":"Recent Advances in Intrusion Detection"},{"key":"16","first-page":"74","article-title":"CWE-77: Improper Sanitization of Special Elements used in a Command ('Command Injection')","author":"ordinalities","year":"2009","journal-title":"CWE Version 1 5"},{"key":"13","article-title":"Cluster command and control (c3) tool suite","volume":"4","author":"brim","year":"2001","journal-title":"Parallel and Distributed Computing Practices"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250739"},{"journal-title":"SSH-Based Configuration Management & Deployment","year":"0","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1551609.1551629"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1234772.1234774"},{"year":"0","key":"2"},{"journal-title":"Going Lean How the Best Companies Apply Lean Manufacturing Principles to Shatter Uncertainty Drive Innovation and Maximize Profits","year":"2008","author":"ruffa","key":"1"},{"journal-title":"Salt Stack","year":"0","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1108\/13552510610654510"},{"year":"0","key":"6"},{"year":"0","key":"5"},{"journal-title":"Distributed Configuration Management","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1243418.1243426"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592576"}],"event":{"name":"NOMS 2014 - 2014 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2014,5,5]]},"location":"Krakow, Poland","end":{"date-parts":[[2014,5,9]]}},"container-title":["2014 IEEE Network Operations and Management Symposium (NOMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6828592\/6838210\/06838295.pdf?arnumber=6838295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T17:26:05Z","timestamp":1498152365000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6838295\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/noms.2014.6838295","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}