{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:13:25Z","timestamp":1755792805412,"version":"3.44.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/roedunet.2016.7753217","type":"proceedings-article","created":{"date-parts":[[2016,11,24]],"date-time":"2016-11-24T16:37:43Z","timestamp":1480005463000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["VizNet \u2014 Dynamic visualization of networks and internet of things"],"prefix":"10.1109","author":[{"given":"Zoran","family":"Constantinescu","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Technology, UPG University of Ploiesti, Ploiesti, Romania"}]},{"given":"Monica","family":"Vl\u0103doiu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Technology, UPG University of Ploiesti, Ploiesti, Romania"}]},{"given":"Gabriela","family":"Moise","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Technology, UPG University of Ploiesti, Ploiesti, Romania"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3954"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5101"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5153"},{"article-title":"A Survey of Network Traffic Monitoring and Analysis Tools","year":"0","author":"so-in","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298349"},{"journal-title":"NfSen - NetFlow Sensor","year":"2016","key":"ref15"},{"article-title":"7 free tools every network needs. From device discovery to visibility into systems, networks, and traffic flows, these free open source monitoring tools have you covered","year":"0","author":"venezia","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85933-8_11"},{"key":"ref18","article-title":"ANEMOS: An Autonomous NEtwork MOnitoring System","author":"danalis","year":"2003","journal-title":"Proc of 4th Passive and Active Measurements Workshop"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/BF03001906","article-title":"CyberNet: A framework for managing networks using 3D metaphoric worlds","volume":"55","author":"abel","year":"2000","journal-title":"Annales des telecommunications"},{"journal-title":"Verizon","article-title":"State of the market: Internet of Things 2016","year":"0","key":"ref4"},{"journal-title":"Network Security Journal","year":"2015","author":"moise","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/9781118511305.ch19"},{"journal-title":"GSMA Intelligence","article-title":"Analysis Understanding 5G: Perspectives on future technological advancements in mobile","year":"0","key":"ref5"},{"key":"ref8","article-title":"Mobile Ad hoc Networking","author":"de morais cordeiro","year":"0","journal-title":"Center for Distributed and Mobile Computing ECECS University of Cincinnati 2002"},{"key":"ref7","first-page":"607","article-title":"Challenges in Safety, Security, and Privacy of Vehicle Tracking Systems, International Workshop on Systems, Safety and Security for Automotive, Passengers and Good Protection","author":"constantinescu","year":"0"},{"journal-title":"Gartner IT Glossary Internet of Things","year":"0","key":"ref2"},{"key":"ref1","first-page":"362","author":"tanenbaum","year":"2011","journal-title":"Computer Networks"},{"article-title":"Improving Network Monitoring and Security via Visualization","year":"0","author":"miller","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/EMS.2009.24"},{"key":"ref22","first-page":"172","author":"conti","year":"2007","journal-title":"Security Data Visualization Graphical Techniques for Network Analysis"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990699"},{"article-title":"The Top 20 Free Network Monitoring and Analysis Tools for Sys Admins","year":"0","author":"tabona","key":"ref24"},{"key":"ref23","first-page":"285","article-title":"A Survey on Information Visualization for Network and Service Management","volume":"8","author":"guimaraes","year":"2015","journal-title":"IEEE Communications Surveys & Tutorials"}],"event":{"name":"2016 15th RoEduNet Conference: Networking in Education and Research","start":{"date-parts":[[2016,9,7]]},"location":"Bucharest, Romania","end":{"date-parts":[[2016,9,9]]}},"container-title":["2016 15th RoEduNet Conference: Networking in Education and Research"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7733872\/7753195\/07753217.pdf?arnumber=7753217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T18:39:24Z","timestamp":1755196764000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7753217\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/roedunet.2016.7753217","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}