{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:23:04Z","timestamp":1742934184650,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030891367"},{"type":"electronic","value":"9783030891374"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-89137-4_2","type":"book-chapter","created":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T22:42:46Z","timestamp":1633905766000},"page":"21-35","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Detecting Internet-Scale Surveillance Devices Using RTSP Recessive Features"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5787-0870","authenticated-orcid":false,"given":"Zhaoteng","family":"Yan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7071-2976","authenticated-orcid":false,"given":"Zhi","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9362-4124","authenticated-orcid":false,"given":"Wenping","family":"Bai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6768-7896","authenticated-orcid":false,"given":"Nan","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3720-7403","authenticated-orcid":false,"given":"Hongsong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Limin","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,10]]},"reference":[{"key":"2_CR1","unstructured":"Nltk: the natural language toolkit. http:\/\/www.nltk.org\/"},{"key":"2_CR2","unstructured":"Antonakakis, M., et al.: Understanding the mirai botnet. In: Proceedings of 26th USENIX Security Symposium (2017)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Bouharb, E., Debbabi, M., Assi, C.: Cyber scanning: a comprehensive survey. In: IEEE Communications Surveys and Tutorials. vol. 16, pp. 1496\u20131519 (2014)","DOI":"10.1109\/SURV.2013.102913.00020"},{"key":"2_CR4","unstructured":"Cao, K., Brbi\u0107, M., Leskovec, J.: Open-world semi-supervised learning. In: arXiv:2102.03526 (2021)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., Adrian, D., Mirian, A., Bailey, M., Halderman, J.A.: A search engine backed by internet-wide scanning. In: Proceedings of 22nd Computer and Communications Security (2015)","DOI":"10.1145\/2810103.2813703"},{"key":"2_CR6","unstructured":"Durumeric, Z., Wustrow, E., Halderman, J.A.: Zmap: fast internet-wide scanning and its security applications. In: Proceedings of 23th USENIX Security Symposium (2013)"},{"key":"2_CR7","unstructured":"Feng, X., Li, Q., Wang, H., Sun, L.: Acquisitional rule-based engine for discovering internet-of-thing devices. In: Proceedings of 27th USENIX Security Symposium (2018)"},{"key":"2_CR8","unstructured":"Guo, L.Z., Zhang, Z.Y., Jiang, Y., Li, Y.F., Zhou, Z.H.: Safe deep semi-supervised learning for unseen-class unlabeled data. In: III, H.D., Singh, A. (eds.) Proceedings of the 37th International Conference on Machine Learning Proceedings of Machine Learning Research, vol. 119, pp. 3897\u20133906. PMLR (2020)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. In: Empirical Methods in Natural Language Processing, pp. 1746\u20131751 (2014)","DOI":"10.3115\/v1\/D14-1181"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Li, Q., Feng, X., Wang, H., Sun, L.: Automatically discovering surveillance devices in the cyberspace. In: Proceedings of 8th ACM International Conference on Multimedia System (2017)","DOI":"10.1145\/3083187.3084020"},{"key":"2_CR11","unstructured":"Michael Gilleland, M.P.S.: Levenshtein distance, in three flavors. https:\/\/people.cs.pitt.edu\/ (2006)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Schulzrinne, H., Rao, A., Lanphier, R.: Real time streaming protocol (rtsp). In: RFC2326 (1998)","DOI":"10.17487\/rfc2326"},{"key":"2_CR13","unstructured":"Shodan: https:\/\/www.shodan.io\/explore\/tag\/webcam"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Wang, X., Wang, Y., Feng, X., Zhu, H., Sun, L., Zou, Y.: Iottracker: an enhanced engine for discovering internet-of-thing devices. In: Proceedings of IEEE WoWMoM (2019)","DOI":"10.1109\/WoWMoM.2019.8793012"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Yan, X., Jacky, K., Bennin, K.E., Qing, M.: Improving bug localization with word embedding and enhanced convolutional neural networks. Inf. Softw. Technol. 105, 17\u201329 (2019)","DOI":"10.1016\/j.infsof.2018.08.002"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Yan, Z., Lv, S., Zhang, Y., Zhu, H., Sun, L.: Remote fingerprinting on internet-wide printers based on neural network. In: Proceedings of IEEE GLOBECOM (2019)","DOI":"10.1109\/GLOBECOM38437.2019.9014144"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Yang, K., Li, Q., Sun, L.: Towards automatic fingerprinting of IOT devices in the cyberspace. Comput. Netw. 148, 318\u2013327 (2019)","DOI":"10.1016\/j.comnet.2018.11.013"},{"key":"2_CR18","unstructured":"Zoomeye: https:\/\/www.zoomeye.org\/"}],"container-title":["Lecture Notes in Computer Science","Science of Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-89137-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T21:30:05Z","timestamp":1638394205000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-89137-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030891367","9783030891374"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-89137-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SciSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Science of Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scisec2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/scisec.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}