{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:17Z","timestamp":1750221077630,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T00:00:00Z","timestamp":1546041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,29]]},"DOI":"10.1145\/3301551.3301571","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T12:33:01Z","timestamp":1552307581000},"page":"115-119","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive Network Tools and Services Network Topology Mapper"],"prefix":"10.1145","author":[{"given":"Godwin S.","family":"Monserate","sequence":"first","affiliation":[{"name":"University of San Carlos, Cebu City, Philippines"}]},{"given":"Juliet S.","family":"Mendez","sequence":"additional","affiliation":[{"name":"University of San Carlos, Cebu City, Philippines"}]}],"member":"320","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Journal of Security Engineering","author":"Adrian Stoica","year":"2008","unstructured":"Adrian Stoica , A Study on The Information Gathering Method for Penetration Testing , Journal of Security Engineering , May 5, 2008 Adrian Stoica, A Study on The Information Gathering Method for Penetration Testing, Journal of Security Engineering, May 5, 2008"},{"key":"e_1_3_2_1_2_1","volume-title":"Jacqueline Kim","author":"Anthony Bruno","year":"2001","unstructured":"Anthony Bruno , Jacqueline Kim Nov. 18, 2001 . Cisco Network Topologies and LAN Design. (c) 2017 Pearson Education, Cisco Press . 800 East 96th Street, Indianapolis, Indiana 46240 Anthony Bruno, Jacqueline Kim Nov. 18, 2001. Cisco Network Topologies and LAN Design. (c) 2017 Pearson Education, Cisco Press. 800 East 96th Street, Indianapolis, Indiana 46240"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the International Conference on Security and Management (SAM) (p. 1).","author":"El-Nazeer N.","year":"2011","unstructured":"El-Nazeer , N. , & Daimi , K. ( 2011 ). Evaluation of Network Port Scanning Tools . In Proceedings of the International Conference on Security and Management (SAM) (p. 1). El-Nazeer, N., & Daimi, K. (2011). Evaluation of Network Port Scanning Tools. In Proceedings of the International Conference on Security and Management (SAM) (p. 1)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(02)00326-2"},{"key":"e_1_3_2_1_6_1","volume-title":"2012 IEEE International Conference on Computer Science and Automation Engineering, 304--306","author":"Li J.","year":"2012","unstructured":"Li , J. , & Peng , C. ( 2012 ). jQuery-based Ajax general interactive architecture . 2012 IEEE International Conference on Computer Science and Automation Engineering, 304--306 . Li, J., & Peng, C. (2012). jQuery-based Ajax general interactive architecture. 2012 IEEE International Conference on Computer Science and Automation Engineering, 304--306."},{"key":"e_1_3_2_1_7_1","unstructured":"Nmap Nmap.org Available: http:\/\/nmap.org\/.  Nmap Nmap.org Available: http:\/\/nmap.org\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Office of External Relations. History of University of San Carlos. https:\/\/www.usc.edu.ph October 2016  Office of External Relations. History of University of San Carlos. https:\/\/www.usc.edu.ph October 2016"},{"key":"e_1_3_2_1_9_1","volume-title":"International Conference on Information and Communication on Technology (pp. 110--123)","author":"Procaccianti G.","year":"2011","unstructured":"Procaccianti , G. , Ardito , L. , & Morisio , M. ( 2011 , August). Profiling power consumption on desktop computer systems . In International Conference on Information and Communication on Technology (pp. 110--123) . Springer, Berlin, Heidelberg. Procaccianti, G., Ardito, L., & Morisio, M. (2011, August). Profiling power consumption on desktop computer systems. In International Conference on Information and Communication on Technology (pp. 110--123). Springer, Berlin, Heidelberg."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.15623\/ijret.2014.0307070"},{"key":"e_1_3_2_1_11_1","volume-title":"Host Discovery with nmap. Exploring nmap's default behavior, 1, 16","author":"Wolfgang M.","year":"2002","unstructured":"Wolfgang , M. ( 2002 ). Host Discovery with nmap. Exploring nmap's default behavior, 1, 16 . Wolfgang, M. (2002). Host Discovery with nmap. Exploring nmap's default behavior, 1, 16."},{"key":"e_1_3_2_1_12_1","volume-title":"Penetration testing and vulnerability assessments: A professional approach","author":"Xynos K.","year":"2010","unstructured":"Xynos , K. , Sutherland , I. , Read , H. , Everitt , E. , & Blyth , A. J. ( 2010 ). Penetration testing and vulnerability assessments: A professional approach . Xynos, K., Sutherland, I., Read, H., Everitt, E., & Blyth, A. J. (2010). Penetration testing and vulnerability assessments: A professional approach."},{"key":"e_1_3_2_1_13_1","unstructured":"Laravel Framework https:\/\/laravel.com\/docs\/4.2\/introduction  Laravel Framework https:\/\/laravel.com\/docs\/4.2\/introduction"}],"event":{"name":"ICIT 2018: IoT and Smart City","sponsor":["The Hong Kong Polytechnic The Hong Kong Polytechnic University","TU Tianjin University"],"location":"Hong Kong Hong Kong","acronym":"ICIT 2018"},"container-title":["Proceedings of the 6th International Conference on Information Technology: IoT and Smart City"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301571","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301551.3301571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:35Z","timestamp":1750208255000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301571"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,29]]},"references-count":12,"alternative-id":["10.1145\/3301551.3301571","10.1145\/3301551"],"URL":"https:\/\/doi.org\/10.1145\/3301551.3301571","relation":{},"subject":[],"published":{"date-parts":[[2018,12,29]]},"assertion":[{"value":"2018-12-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}