{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T13:42:58Z","timestamp":1762954978043},"reference-count":10,"publisher":"National Library of Serbia","issue":"1","license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ComSIS","COMPUT SCI INF SYST","COMPUT SCI INFORM SY","COMPUTER SCI INFORM","COMSIS J"],"published-print":{"date-parts":[[2011]]},"abstract":"<jats:p>In order to be competitive enterprises continuously implement ICT strategies\n   &amp; architectures to improve manufacture, research, products quality, sales,\n   services and costs control. All large enterprises have a local area network,\n   a virtual private network, an Intranet and Internet, servers and workstations\n   for operations, administration and management working together for the same\n   objective: profits. The virtual enterprise and the virtual team?s concepts\n   are discussed in this article. This work analyzes the network architecture\n   for geographically dispersed enterprises (seen as virtual enterprises) as\n   support for virtual project development by virtual teams work. In addition,\n   the paper presents an enterprise networks monitoring solution using open\n   source software (OSS).<\/jats:p>","DOI":"10.2298\/csis100127033r","type":"journal-article","created":{"date-parts":[[2010,11,12]],"date-time":"2010-11-12T08:02:00Z","timestamp":1289548920000},"page":"1-26","source":"Crossref","is-referenced-by-count":15,"title":["VPN solutions and network monitoring to support virtual teams work in virtual enterprises"],"prefix":"10.2298","volume":"8","author":[{"suffix":"Sebastian","given":"Marius","family":"Ro\u015fu","sequence":"first","affiliation":[]},{"given":"George","family":"Dr\u0103goi","sequence":"additional","affiliation":[]}],"member":"1078","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.indmarman.2005.02.005"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2007.01.001"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2007.00281.x"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2007.06.020"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2005.00200.x"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS0901093C"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9310.00296"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S0923-4748(03)00005-5"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1108\/13527590710759865"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s10726-006-9042-x"}],"container-title":["Computer Science and Information Systems"],"original-title":[],"language":"en","deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T08:29:56Z","timestamp":1685348996000},"score":1,"resource":{"primary":{"URL":"https:\/\/doiserbia.nb.rs\/Article.aspx?ID=1820-02141000033R"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011]]}},"URL":"https:\/\/doi.org\/10.2298\/csis100127033r","relation":{},"ISSN":["1820-0214","2406-1018"],"issn-type":[{"value":"1820-0214","type":"print"},{"value":"2406-1018","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}