{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:26:28Z","timestamp":1740201988250,"version":"3.37.3"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"abstract":"<jats:p>In data-communication networks, network reliability is of great concern to both network operators and customers. Therefore, network operators want to determine what services could be affected by software vulnerabilities being exploited that are present within their data-communication network. To determine what services could be affected by a software vulnerability being exploited, it is fundamentally important to know the ongoing tasks in a network. A particular task may depend on multiple network services, spanning many network devices. Unfortunately, dependency details are often not documented and are difficult to discover by relying on human expert knowledge. In monitored networks huge amounts of data are available and by applying data mining techniques, we are able to extract information of ongoing network activities. From a data mining perspective, we are interested to test the potential of applying data mining techniques to real-life applications.<\/jats:p>","DOI":"10.3233\/978-1-61499-672-9-1583","type":"book-chapter","created":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:26:53Z","timestamp":1740133613000},"source":"Crossref","is-referenced-by-count":0,"title":["Using a Deep Understanding of Network Activities for Network Vulnerability Assessment"],"prefix":"10.3233","author":[{"family":"Lange Mona","sequence":"additional","affiliation":[]},{"family":"Kuhr Felix","sequence":"additional","affiliation":[]},{"family":"M&ouml;ller Ralf","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["Frontiers in Artificial Intelligence and Applications","ECAI 2016"],"original-title":[],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:41:23Z","timestamp":1740134483000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISBN&isbn=978-1-61499-671-2&spage=1583&doi=10.3233\/978-1-61499-672-9-1583"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/978-1-61499-672-9-1583","relation":{},"ISSN":["0922-6389"],"issn-type":[{"value":"0922-6389","type":"print"}],"subject":[],"published":{"date-parts":[[2016]]}}}