{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:48:17Z","timestamp":1763459297675,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,12,7]],"date-time":"2016-12-07T00:00:00Z","timestamp":1481068800000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ARO","award":["W911NF-09-1-0553"],"award-info":[{"award-number":["W911NF-09-1-0553"]}]},{"name":"NSF","award":["CNS-1408632"],"award-info":[{"award-number":["CNS-1408632"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12,7]]},"DOI":"10.1145\/2818000.2818012","type":"proceedings-article","created":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T12:06:08Z","timestamp":1449835568000},"page":"41-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Know Your Achilles' Heel"],"prefix":"10.1145","author":[{"given":"Ali","family":"Zand","sequence":"first","affiliation":[{"name":"UC Santa Barbara"}]},{"given":"Amir","family":"Houmansadr","sequence":"additional","affiliation":[{"name":"UMass Amherst"}]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[{"name":"UC Santa Barbara"}]},{"given":"Richard","family":"Kemmerer","sequence":"additional","affiliation":[{"name":"UC Santa Barbara"}]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[{"name":"UC Santa Barbara"}]}],"member":"320","published-online":{"date-parts":[[2015,12,7]]},"reference":[{"unstructured":"NetFlow protocol. http:\/\/www.manageengine.com\/products\/netflow\/help\/cisco-netflow\/netflow-ios-versions.html.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","volume-title":"In Proc. V HotNets Workshop","author":"Bahl P.","year":"2006","unstructured":"P. Bahl, P. Barham, R. Black, R. Ch, M. Goldszmidt, R. Isaacs, S. K, L. Li, J. Maccormick, D. A. Maltz, R. Mortier, M. Wawrzoniak, and M. Zhang. Discovering dependencies for network management. In In Proc. V HotNets Workshop, 2006."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/1282427.1282383"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1007\/978-1-4419-0140-8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/1368436.1368445"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.5555\/539444"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/INM.2001.918054"},{"key":"e_1_3_2_1_8_1","volume-title":"Analysis and Design of Communication Links and Networks (CAMAD), 2010 15th IEEE International Workshop on","author":"Chaudhary U.","year":"2010","unstructured":"U. Chaudhary, I. Papapanagiotou, and M. Devetsikiotis. Flow classification using clustering and association rule mining. In Computer Aided Modeling, Analysis and Design of Communication Links and Networks (CAMAD), 2010 15th IEEE International Workshop on, 2010."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.5555\/1251175.1251198"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.5555\/1855741.1855750"},{"key":"e_1_3_2_1_11_1","volume-title":"Fundamentals of Statistical Reasoning in Education","author":"Coladarci T.","year":"2010","unstructured":"T. Coladarci, C. Cobb, E. Minium, and R. Clarke. Fundamentals of Statistical Reasoning in Education. Wiley\/Jossey-Bass Education. John Wiley & Sons, 2010."},{"key":"e_1_3_2_1_12_1","volume-title":"Design and Evaluation for Situation Awareness Enhancement. In Proceedings of the Human Factors Society 32nd Annual Meeting","volume":"1","author":"Endsley M. R.","unstructured":"M. R. Endsley. Design and Evaluation for Situation Awareness Enhancement. In Proceedings of the Human Factors Society 32nd Annual Meeting, volume 1 of Aerospace Systems: Situation Awareness in Aircraft Systems, 1988."},{"key":"e_1_3_2_1_13_1","first-page":"37","article-title":"Towards a Theory of Situation Awareness","author":"Endsley M. R.","year":"1995","unstructured":"M. R. Endsley. Towards a Theory of Situation Awareness in Dynamic Systems. Human Factors, 37, 1995.","journal-title":"Dynamic Systems. Human Factors"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1007\/978-3-642-17517-6_36"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.5555\/1973430.1973450"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1117\/12.665763"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1007\/978-3-540-87696-0_30"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.5555\/1856821.1856897"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/1413140.1413177"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1109\/MCOM.2010.5434386"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1117\/12.665288"},{"key":"e_1_3_2_1_22_1","volume-title":"Information Fusion, 2008 11th International Conference on. IEEE","author":"Holsopple J.","year":"2008","unstructured":"J. Holsopple and S. Yang. FuSIA: Future situation and impact awareness. In Information Fusion, 2008 11th International Conference on. IEEE, 2008."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of SPIE","author":"Salerno J.J.","year":"2005","unstructured":"J.J. Salerno, M.L. Hinman, and D.M. Boulware. A situation awareness model applied to multiple domains. In Proceedings of SPIE, 2005."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/1402946.1402970"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1109\/TPAMI.2002.1017616"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/1090191.1080119"},{"key":"e_1_3_2_1_27_1","volume-title":"Recognition-Primed Decision Strategies. ARI research note 96-36","author":"Klein G.","year":"1996","unstructured":"G. Klein and B. Crandall. Recognition-Primed Decision Strategies. ARI research note 96-36, 1996."},{"key":"e_1_3_2_1_28_1","volume-title":"FSKD'02","author":"Lampinen T.","year":"2002","unstructured":"T. Lampinen, H. Koivisto, and T. Honkanen. Profiling network applications with fuzzy c-means clustering and self-organizing map. In FSKD'02, 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/MILCOM.2008.4753521"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/1740390.1740411"},{"volume-title":"NSDMiner: Automated Discovery of Network Service Dependencies. In In proceedings of IEEE International Conference on Computer Communications (INFOCOM '12)","author":"Natarajan A.","unstructured":"A. Natarajan, P. Ning, Y. Liu, S. Jajodia, and S. E. Hutchinson. NSDMiner: Automated Discovery of Network Service Dependencies. In In proceedings of IEEE International Conference on Computer Communications (INFOCOM '12).","key":"e_1_3_2_1_31_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.5555\/1754701.1754710"},{"key":"e_1_3_2_1_33_1","volume-title":"PageRank: Bringing order to the web. Stanford Digital Libraries Working Paper 1997-0072","author":"Page L.","year":"1997","unstructured":"L. Page. PageRank: Bringing order to the web. Stanford Digital Libraries Working Paper 1997-0072, Stanford University, 1997."},{"key":"e_1_3_2_1_34_1","volume-title":"J. Chandrashekar, N. Taft, and I. Stoica. Macroscope: End-Point Approach to Networked Application Dependency Discovery","author":"Popa L.","year":"2009","unstructured":"L. Popa, B. gon Chun, J. Chandrashekar, N. Taft, and I. Stoica. Macroscope: End-Point Approach to Networked Application Dependency Discovery, 2009."},{"key":"e_1_3_2_1_35_1","first-page":"13","author":"Rasmussen J.","year":"1983","unstructured":"J. Rasmussen. Skills, Rules, and Knowledge; Signals, Signs and Symbols, and Other Distinctions in Humans Performance Models. IEEE Transactions on Systems, Man and Cybernetics, 13, 1983.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/1815396.1815507"},{"key":"e_1_3_2_1_37_1","volume-title":"Information Fusion, 2008 11th International Conference on","author":"Salerno J.","year":"2008","unstructured":"J. Salerno. Measuring Situation Assessment Performance through the Activities of Interest Score. In Information Fusion, 2008 11th International Conference on, 2008."},{"key":"e_1_3_2_1_38_1","volume-title":"Adaptive Network Flow Clustering. 2007 IEEE International Conference on Networking, Sensing and Control","author":"Song S.","year":"2007","unstructured":"S. Song and Z. Chen. Adaptive Network Flow Clustering. 2007 IEEE International Conference on Networking, Sensing and Control, 2007."},{"volume-title":"April","year":"2012","unstructured":"Symantec. Internet security threat report. Technical report, April 2012.","key":"e_1_3_2_1_39_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1007\/11856214_7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.5555\/2045561.2045611"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1109\/INFOCOM.2014.6848158"}],"event":{"sponsor":["ACSA Applied Computing Security Assoc"],"acronym":"ACSAC 2015","name":"ACSAC 2015: 2015 Annual Computer Security Applications Conference","location":"Los Angeles CA USA"},"container-title":["Proceedings of the 31st Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818012","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2818000.2818012","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2818000.2818012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:42:32Z","timestamp":1763458952000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818012"}},"subtitle":["Automatic Detection of Network Critical Services"],"short-title":[],"issued":{"date-parts":[[2015,12,7]]},"references-count":42,"alternative-id":["10.1145\/2818000.2818012","10.1145\/2818000"],"URL":"https:\/\/doi.org\/10.1145\/2818000.2818012","relation":{},"subject":[],"published":{"date-parts":[[2015,12,7]]},"assertion":[{"value":"2015-12-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}