{"id":"https://openalex.org/W2054728119","doi":"https://doi.org/10.1145/2602087.2602104","title":"NICE","display_name":"NICE","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2054728119","doi":"https://doi.org/10.1145/2602087.2602104","mag":"2054728119"},"language":"en","primary_location":{"id":"doi:10.1145/2602087.2602104","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2602087.2602104","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th Annual Cyber and Information Security Research Conference on - CISR '14","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042640289","display_name":"Darrell Kienzle","orcid":null},"institutions":[{"id":"https://openalex.org/I1308906816","display_name":"NortonLifeLock (United States)","ror":"https://ror.org/0449t3a80","country_code":"US","type":"company","lineage":["https://openalex.org/I1308906816"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Darrell M. Kienzle","raw_affiliation_strings":["Symantec Corporation, Herndon, VA"],"affiliations":[{"raw_affiliation_string":"Symantec Corporation, Herndon, VA","institution_ids":["https://openalex.org/I1308906816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054783600","display_name":"Nathan S. Evans","orcid":null},"institutions":[{"id":"https://openalex.org/I1308906816","display_name":"NortonLifeLock (United States)","ror":"https://ror.org/0449t3a80","country_code":"US","type":"company","lineage":["https://openalex.org/I1308906816"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nathan S. Evans","raw_affiliation_strings":["Symantec Corporation, Herndon, VA"],"affiliations":[{"raw_affiliation_string":"Symantec Corporation, Herndon, VA","institution_ids":["https://openalex.org/I1308906816"]}]},{"author_position":"last","author":{"id":null,"display_name":"Matthew C. Elder","orcid":null},"institutions":[{"id":"https://openalex.org/I1308906816","display_name":"NortonLifeLock (United States)","ror":"https://ror.org/0449t3a80","country_code":"US","type":"company","lineage":["https://openalex.org/I1308906816"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matthew C. Elder","raw_affiliation_strings":["Symantec Corporation, Herndon, VA"],"affiliations":[{"raw_affiliation_string":"Symantec Corporation, Herndon, VA","institution_ids":["https://openalex.org/I1308906816"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5042640289"],"corresponding_institution_ids":["https://openalex.org/I1308906816"],"apc_list":null,"apc_paid":null,"fwci":0.3597,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.67433186,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"97","last_page":"100"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/simple-network-management-protocol","display_name":"Simple Network Management Protocol","score":0.7818952798843384},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7609776258468628},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7464412450790405},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.6713689565658569},{"id":"https://openalex.org/keywords/ethernet","display_name":"Ethernet","score":0.5567387342453003},{"id":"https://openalex.org/keywords/network-management","display_name":"Network management","score":0.5263972282409668},{"id":"https://openalex.org/keywords/networking-hardware","display_name":"Networking hardware","score":0.5021238327026367},{"id":"https://openalex.org/keywords/fiber-distributed-data-interface","display_name":"Fiber Distributed Data Interface","score":0.48707106709480286},{"id":"https://openalex.org/keywords/network-management-station","display_name":"Network management station","score":0.44088345766067505},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.43872204422950745},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.4288516044616699},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.37157702445983887}],"concepts":[{"id":"https://openalex.org/C69527307","wikidata":"https://www.wikidata.org/wiki/Q184230","display_name":"Simple Network Management Protocol","level":3,"score":0.7818952798843384},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7609776258468628},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7464412450790405},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.6713689565658569},{"id":"https://openalex.org/C172173386","wikidata":"https://www.wikidata.org/wiki/Q79984","display_name":"Ethernet","level":2,"score":0.5567387342453003},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.5263972282409668},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.5021238327026367},{"id":"https://openalex.org/C7769488","wikidata":"https://www.wikidata.org/wiki/Q181382","display_name":"Fiber Distributed Data Interface","level":3,"score":0.48707106709480286},{"id":"https://openalex.org/C16986412","wikidata":"https://www.wikidata.org/wiki/Q918419","display_name":"Network management station","level":3,"score":0.44088345766067505},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.43872204422950745},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.4288516044616699},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37157702445983887},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2602087.2602104","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2602087.2602104","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th Annual Cyber and Information Security Research Conference on - CISR '14","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5400000214576721}],"awards":[],"funders":[{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1629946144","https://openalex.org/W2080766671","https://openalex.org/W2133495045"],"related_works":["https://openalex.org/W1979528400","https://openalex.org/W2375035220","https://openalex.org/W2162516362","https://openalex.org/W1497045789","https://openalex.org/W2358564577","https://openalex.org/W2378542861","https://openalex.org/W1569390378","https://openalex.org/W2376879360","https://openalex.org/W2366933082","https://openalex.org/W4321846333"],"abstract_inverted_index":{"We":[0,201],"present":[1],"a":[2,22,58,169,185,212],"novel":[3,163],"method":[4,187],"of":[5,18,21,103,136,165],"layer":[6,54,95,159,170],"2":[7,55,96,160,171],"network":[8,44,56,83,105,138],"topology":[9],"discovery":[10],"for":[11,62],"Ethernet":[12,37],"LANs":[13,38],"through":[14],"the":[15,63,66,74,100,104,128,134,195],"coordinated":[16],"operation":[17],"endpoints/hosts,":[19],"part":[20],"research":[23],"project":[24],"called":[25],"NICE":[26,121,143],"(Network":[27],"Introspection":[28],"by":[29],"Collaborating":[30],"Endpoints).":[31],"Networks":[32],"are":[33,48],"constantly":[34],"changing,":[35],"including":[36,130],"--":[39],"machines":[40],"come":[41],"and":[42,65,78,89,106,141,153,157,184,190,210],"go,":[43],"hardware":[45],"fails,":[46],"switches":[47],"rewired,":[49],"equipment":[50],"is":[51,70,122,151],"reconfigured.":[52],"The":[53,162],"represents":[57],"moving":[59],"target,":[60],"both":[61,76,155],"attacker":[64],"defender":[67],"alike.":[68],"It":[69],"necessary":[71],"to":[72,118,148,188,206,214],"understand":[73],"network,":[75],"before":[77],"during":[79],"these":[80],"changes.":[81],"Existing":[82],"management":[84,139],"approaches":[85],"based":[86],"on":[87],"collecting":[88],"correlating":[90],"SNMP":[91,178],"data":[92],"from":[93],"managed":[94],"devices":[97,193],"cannot":[98,107],"see":[99,108],"complete":[101],"picture":[102],"all":[109],"changes":[110,116],"as":[111],"they":[112],"occur,":[113],"in":[114,194],"particular":[115],"related":[117],"unmanaged":[119,131],"devices.":[120,161],"able":[123],"discover":[124,189],"more":[125],"information":[126],"about":[127],"topology,":[129,196],"devices,":[132],"without":[133],"assistance":[135],"traditional":[137],"tools":[140],"protocols.":[142],"requires":[144],"no":[145],"administrative":[146],"access":[147,179],"networking":[149],"hardware,":[150],"multi-platform,":[152],"discovers":[154],"consumer":[156],"enterprise":[158],"contributions":[164],"this":[166],"paper":[167],"include":[168],"mapping":[172],"protocol":[173],"that":[174],"does":[175],"not":[176],"require":[177],"nor":[180],"MAC":[181],"address":[182],"spoofing,":[183],"working":[186],"locate":[191],"non-NICE":[192],"improving":[197],"upon":[198],"existing":[199,215],"research.":[200,216],"have":[202],"performed":[203],"extensive":[204],"experimentation":[205],"validate":[207],"our":[208],"techniques":[209],"provide":[211],"comparison":[213]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-23T09:07:50.710637","created_date":"2016-06-24T00:00:00"}
