{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:10:29Z","timestamp":1743037829166,"version":"3.40.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030503987"},{"type":"electronic","value":"9783030503994"}],"license":[{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-50399-4_27","type":"book-chapter","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T11:02:37Z","timestamp":1591700557000},"page":"279-291","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Survey of Cyberspace Resources Scanning and Analyzing"],"prefix":"10.1007","author":[{"given":"Yuanwei","family":"Hou","sequence":"first","affiliation":[]},{"given":"Xiaoxiao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yongle","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Zhiwei","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Shiyu","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,10]]},"reference":[{"issue":"1","key":"27_CR1","first-page":"1","volume":"4","author":"B Fang","year":"2018","unstructured":"Fang, B.: Define cyberspace security. Chin. J. Netw. Inf. Secur. 4(1), 1\u20135 (2018)","journal-title":"Chin. J. Netw. Inf. Secur."},{"key":"27_CR2","unstructured":"Treasure Map Project. http:\/\/mobile.businessinsider.com\/nsa-treasure-map-project-2014-9"},{"key":"27_CR3","unstructured":"Nakashima, E.: With Plan X, Pentagon seeks to spread US military might to cyberspace. Washington Post, 30 May 2012"},{"key":"27_CR4","unstructured":"Grant, T.: On the military geography of cyberspace. Leading Issues in Cyber Warfare and Security: Cyber Warfare Secur. 2, 119 (2015)"},{"key":"27_CR5","unstructured":"Shodan. https:\/\/www.shodan.io"},{"issue":"5","key":"27_CR6","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/1096536.1096552","volume":"35","author":"C Shannon","year":"2005","unstructured":"Shannon, C., Moore, D., Keys, K., Fomenkov, M., Huffaker, B., Claffy, K.: The internet measurement data catalog. ACM SIGCOMM Comput. Commun. Rev. 35(5), 97\u2013100 (2005)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"1","key":"27_CR7","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/2567561.2567568","volume":"44","author":"A Dainotti","year":"2013","unstructured":"Dainotti, A., Benson, K., King, A., Kallitsis, M., Glatz, E., et al.: Estimating internet address space usage through passive measurements. ACM SIGCOMM Comput. Commun. Rev. 44(1), 42\u201349 (2013)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"27_CR8","unstructured":"ZoomEye. https:\/\/www.zoomeye.org\/"},{"key":"27_CR9","unstructured":"FoFa. https:\/\/fofa.so"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Smith, M.A., Drucker, S.M., Kraut, R., Wellman, B.: Counting on community in cyberspace. In: Proceedings of CHI 1999 Extended Abstracts on Human Factors in Computing Systems, pp. 87\u201388 (1999)","DOI":"10.1145\/632716.632770"},{"key":"27_CR11","unstructured":"\u5b59\u4e2d\u4f1f, \u8def\u7d2b, \u738b\u6768: \u7f51\u7edc\u4fe1\u606f\u7a7a\u95f4\u7684\u5730\u7406\u5b66\u7814\u7a76\u56de\u987e\u4e0e\u5c55\u671b, \u5730\u7403\u79d1\u5b66\u8fdb\u5c55 22(10), 1005\u20131011 (2007)"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"\u5468\u6768, \u5f90\u9752, \u7f57\u5411\u9633, \u7b49: \u7f51\u7edc\u7a7a\u95f4\u6d4b\u7ed8\u7684\u6982\u5ff5\u53ca\u5176\u6280\u672f\u4f53\u7cfb\u7684\u7814\u7a76. \u8ba1\u7b97\u673a\u79d1\u5b66 45(5) (2018)","DOI":"10.1071\/PVv2018n196p44"},{"key":"27_CR13","unstructured":"Nmap: a free network mapping and security scanning tool. http:\/\/nmap.org\/"},{"key":"27_CR14","unstructured":"Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast internet-wide scanning and its security applications. In: The 22nd Usenix Security Symposium, pp. 605\u2013620 (2013)"},{"key":"27_CR15","unstructured":"Masscan. https:\/\/github.com\/robertdavidgraham\/masscan"},{"key":"27_CR16","unstructured":"Topic Detection and Tracking (TDT) Evaluation Workshop. The 2002 topic detection and tracking task definition and evaluation plan, April 2006. ftp:\/\/jaguar.ncsl.nist.gov\/tdt\/tdt2002\/"},{"key":"27_CR17","unstructured":"Li, J.: Network topology discovery based on SNMP. In: The 9th International Conference on Computational Intelligence and Security (CIS), pp. 194\u2013199 (2013)"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Yin, J.B., Li, Y.M., Wang, Q., et al.: SNMP-based network topology discovery algorithm and implementation. In: The International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), pp. 2241\u20132244 (2012)","DOI":"10.1109\/FSKD.2012.6233879"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Marchetta, P., M\u00e9rindol, P., Donnet, B., et al.: Quantifying and mitigating IGMP filtering in topology discovery. In: The Conference on Global Communications (GLOBECOM), pp. 1871\u20131876 (2012)","DOI":"10.1109\/GLOCOM.2012.6503388"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Marchetta, P., Pescape, A.: DRAGO: detecting, quantifying and locating hidden routers in traceroute IP paths. In: The 32nd IEEE International Conference on Computer Communications (INFOCOM), pp. 3237\u20133242 (2013)","DOI":"10.1109\/INFCOMW.2013.6562876"},{"key":"27_CR21","unstructured":"Jacobson, V.: Traceroute. ftp:\/\/ftp.ee.lbl.gov\/traceroute.tar.gz"},{"issue":"9","key":"27_CR22","doi-asserted-by":"publisher","first-page":"1776","DOI":"10.1109\/JSAC.2011.111003","volume":"29","author":"P Marchetta","year":"2011","unstructured":"Marchetta, P., M\u00e9rindol, P., Donnet, B., et al.: Topology discovery at the router level: a new hybrid tool targeting ISP networks. IEEE J. Sel. Areas Commun. 29(9), 1776\u20131787 (2011)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Govindan, R., Tangmunarunkit, H.: Heuristics for Internet map discovery. In: Proceedings of the IEEE Conference on Computer Communications Workshops, pp. 1371\u20131380 (2000)","DOI":"10.1109\/INFCOM.2000.832534"},{"issue":"1","key":"27_CR24","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TNET.2003.822655","volume":"12","author":"N Spring","year":"2004","unstructured":"Spring, N., Mahajan, R., Wetherall, D., et al.: Measuring ISP topologies with Rocketfuel. IEEE\/ACM Trans. Netw. 12(1), 2\u201316 (2004)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"4","key":"27_CR25","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1145\/1402946.1402992","volume":"38","author":"B Eriksson","year":"2008","unstructured":"Eriksson, B., Barford, P., Nowak, R.: Network discovery from passive measurements. ACM SIGCOMM Comput. Commun. Rev. 38(4), 291\u2013302 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"27_CR26","doi-asserted-by":"crossref","unstructured":"Bender, A., Sherwood, R., Spring, N.: Fixing ally\u2019s growing pains with velocity modeling. In: Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, pp. 337\u2013342 (2008)","DOI":"10.1145\/1452520.1452560"},{"issue":"6","key":"27_CR27","doi-asserted-by":"publisher","first-page":"1738","DOI":"10.1109\/TNET.2009.2014227","volume":"17","author":"MH Gunes","year":"2009","unstructured":"Gunes, M.H., Sarac, K.: Resolving IP aliases in building traceroute-based Internet maps. IEEE\/ACM Trans. Netw. (ToN) 17(6), 1738\u20131751 (2009)","journal-title":"IEEE\/ACM Trans. Netw. (ToN)"},{"key":"27_CR28","unstructured":"Madhyastha, H.V., Isdal, T., Piatek, M., et al.: iPlane: an information plane for distributed services. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, pp. 367\u2013380 (2006)"},{"key":"27_CR29","doi-asserted-by":"crossref","unstructured":"Feldman, D., Shavitt, Y.: Automatic large scale generation of internet PoP level maps. In: Proceedings of the IEEE Global Telecommunications Conference, pp. 1\u20136 (2008)","DOI":"10.1109\/GLOCOM.2008.ECP.466"},{"key":"27_CR30","doi-asserted-by":"crossref","unstructured":"Shavitt, Y., Zilberman, N.: A structural approach for PoP geo-location. In: Proceedings of the IEEE Conference on Computer Communications Workshops, pp. 1\u20136 (2010)","DOI":"10.1109\/INFCOMW.2010.5466699"},{"key":"27_CR31","doi-asserted-by":"crossref","unstructured":"Shavitt, Y., Zilberman, N.: Geographical internet PoP level maps. In: Traffic Monitoring and Analysis, pp. 121\u2013124 (2012)","DOI":"10.1007\/978-3-642-28534-9_13"},{"key":"27_CR32","doi-asserted-by":"crossref","unstructured":"Shavitt, Y., Zilberman, N.: Improving IP geolocation by crawling the Internet PoP level graph. In: Proceedings of the IFIP Networking Conference, pp. 1\u20139 (2013)","DOI":"10.1007\/978-3-642-36784-7_4"},{"key":"27_CR33","doi-asserted-by":"crossref","unstructured":"Shavitt, Y., Zilberman, N.: Internet PoP level maps. In: Data Traffic Monitoring and Analysis, pp. 82\u2013103 (2013)","DOI":"10.1007\/978-3-642-36784-7_4"},{"key":"27_CR34","doi-asserted-by":"crossref","unstructured":"Kohno, T., Broido, A., Claffy, K.C.: Remote physical device fingerprinting. In: 2005 IEEE Symposium on Security and Privacy, pp. 211\u2013225. IEEE (2005)","DOI":"10.1109\/SP.2005.18"},{"key":"27_CR35","doi-asserted-by":"crossref","unstructured":"Fink, R.: A statistical approach to remote physical device fingerprinting. In: The Conference on Military Communications, pp. 1\u20137 (2007)","DOI":"10.1109\/MILCOM.2007.4454890"},{"key":"27_CR36","doi-asserted-by":"publisher","unstructured":"\u5f90\u4e66\u534e, \u5f90\u4e3d\u5a1c. \u57fa\u4e8eTCP\u65f6\u95f4\u6233\u7684\u8fdc\u7a0b\u7f51\u7edc\u8bbe\u5907\u8bc6\u522b\u6280\u672f\u7814\u7a76. \u7f51\u7edc\u4e0e\u901a\u4fe1 (2013). https:\/\/doi.org\/10.19358\/j.issn.1674-7720.2013.05.016","DOI":"10.19358\/j.issn.1674-7720.2013.05.016"},{"key":"27_CR37","doi-asserted-by":"crossref","unstructured":"Hofmann, T.: Probabilistic latent semantic indexing. In: Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), pp. 50\u201357 (1999)","DOI":"10.1145\/312624.312649"},{"issue":"Suppl. 1","key":"27_CR38","doi-asserted-by":"publisher","first-page":"5228","DOI":"10.1073\/pnas.0307752101","volume":"101","author":"TL Griffiths","year":"2004","unstructured":"Griffiths, T.L., Steyvers, M.: Finding scientific topics. Proc. Natl. Acad. Sci. 101(Suppl. 1), 5228\u20135235 (2004)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"27_CR39","doi-asserted-by":"crossref","unstructured":"Bandyopadhyay, S., Coyle, E.J.: An energy efficient hierarchical clustering algorithm for wireless sensor networks. In: Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol. 3, pp. 1713\u20131723. IEEE (2003)","DOI":"10.1109\/INFCOM.2003.1209194"},{"key":"27_CR40","doi-asserted-by":"crossref","unstructured":"G\u00f3mezluna, J., Gonz\u00e1lezlinares, J.M., Benavides, J.I., et al.: Parallelization of a video segmentation algorithm on CUDA\u2013enabled graphics processing units. In: Euro-Par 2009 Parallel Processing, pp. 924\u2013935. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-03869-3_85"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50399-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T07:33:09Z","timestamp":1723015989000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-50399-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,10]]},"ISBN":["9783030503987","9783030503994"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50399-4_27","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,6,10]]},"assertion":[{"value":"10 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lodz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}