{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T15:07:55Z","timestamp":1725980875830},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319942674"},{"type":"electronic","value":"9783319942681"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94268-1_11","type":"book-chapter","created":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T08:49:21Z","timestamp":1528793361000},"page":"127-139","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Smart Device Fingerprinting Based on Webpage Loading"],"prefix":"10.1007","author":[{"given":"Peng","family":"Fang","sequence":"first","affiliation":[]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hongli","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Qijian","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,13]]},"reference":[{"issue":"1","key":"11_CR1","doi-asserted-by":"publisher","first-page":"57","DOI":"10.7763\/IJCTE.2014.V6.837","volume":"6","author":"T Al-Shehari","year":"2014","unstructured":"Al-Shehari, T., Shahzad, F.: Improving operating system fingerprinting using machine learning techniques. Int. J. Comput. Theory Eng. 6(1), 57 (2014)","journal-title":"Int. J. Comput. Theory Eng."},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-24668-8_16","volume-title":"Passive and Active Network Measurement","author":"R Beverly","year":"2004","unstructured":"Beverly, R.: A robust classifier for passive TCP\/IP fingerprinting. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol. 3015, pp. 158\u2013167. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24668-8_16"},{"key":"11_CR3","volume-title":"Applied Cryptography","author":"S Bruce","year":"1996","unstructured":"Bruce, S.: Applied Cryptography, 2nd edn. Wiley, Hoboken (1996)","edition":"2"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Chen, Y.C., Liao, Y., Baldi, M., Lee, S.J., Qiu, L.: OS fingerprinting and tethering detection in mobile networks. In: Proceedings of the 2014 Conference on Internet Measurement Conference, pp. 173\u2013180. ACM (2014)","DOI":"10.1145\/2663716.2663745"},{"key":"11_CR5","unstructured":"Gayle, D.: This is a secure line: the groundbreaking encryption app that will scrample your calls and messages (2013)"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Herrmann, D., Wendolsky, R., Federrath, H.: Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial na\u00efve-bayes classifier. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 31\u201342. ACM (2009)","DOI":"10.1145\/1655008.1655013"},{"key":"11_CR7","unstructured":"Hjelmvik, E.: Passive network security analysis with networkminer. In: (IN)Secure, no. 18, pp. 1\u2013100 (2008)"},{"key":"11_CR8","unstructured":"JetStream: Sunspider 1.0.2 javascript benchmark. https:\/\/webkit.org\/perf\/sunspider\/sunspider.html Accessed 8 May 2017"},{"issue":"2","key":"11_CR9","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TDSC.2005.26","volume":"2","author":"T Kohno","year":"2005","unstructured":"Kohno, T., Broido, A., Claffy, K.C.: Remote physical device fingerprinting. IEEE Trans. Dependable Secure Comput. 2(2), 93\u2013108 (2005)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Liberatore, M., Levine, B.N.: Inferring the source of encrypted HTTP connections. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 255\u2013263. ACM (2006)","DOI":"10.1145\/1180405.1180437"},{"key":"11_CR11","unstructured":"Lippmann, R., Fried, D., Piwowarski, K., Streilein, W.: Passive operating system identification from TCP\/IP packet headers. In: Workshop on Data Mining for Computer Security, p. 40. Citeseer (2003)"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Matou\u0161ek, P., Ry\u0161av\u1ef3, O., Gr\u00e9gr, M., Vyml\u00e1til, M.: Towards identification of operating systems from the internet traffic: IPFIX monitoring with fingerprinting and clustering. In: 2014 5th International Conference on Data Communication Networking (DCNET), pp. 1\u20137. IEEE (2014)","DOI":"10.5220\/0005099500210027"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Matsunaka, T., Yamada, A., Kubota, A.: Passive OS fingerprinting by DNS traffic analysis. In: 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), pp. 243\u2013250. IEEE (2013)","DOI":"10.1109\/AINA.2013.119"},{"key":"11_CR14","series-title":"Advances in Intelligent and Soft Computing","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-04091-7_1","volume-title":"Computational Intelligence in Security for Information Systems","author":"JPS Medeiros","year":"2009","unstructured":"Medeiros, J.P.S., Brito, A.M., Pires, P.S.M.: A data mining based analysis of Nmap operating system fingerprint database. In: Herrero, \u00c1., Gastaldo, P., Zunino, R., Corchado, E. (eds.) CISIS 2009. AINSC, vol. 63, pp. 1\u20138. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04091-7_1"},{"key":"11_CR15","unstructured":"Mi\u0142\u00f3s, G., Murray, D.G., Hand, S., Fetterman, M.A.: Satori: enlightened page sharing. In: Proceedings of the 2009 Conference on USENIX Annual Technical Conference, p. 1 (2009)"},{"key":"11_CR16","unstructured":"Ornaghi, A., Valleri, M.: Ettercap. https:\/\/www.ettercap-project.org\/ . Accessed 28 Apr 2017"},{"issue":"5","key":"11_CR17","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1109\/TDSC.2014.2369033","volume":"12","author":"SV Radhakrishnan","year":"2015","unstructured":"Radhakrishnan, S.V., Uluagac, A.S., Beyah, R.: GTID: a technique for physical device and device type fingerprinting. IEEE Trans. Dependable Secur. Comput. 12(5), 519\u2013532 (2015)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"11_CR18","unstructured":"Sarraute, C., Burroni, J.: Using neural networks to improve classical operating system fingerprinting techniques. arXiv preprint arXiv:1006.1918 (2010)"},{"key":"11_CR19","unstructured":"Schwartzenberg, J.: Using machine learning techniques for advanced passive operating system fingerprinting. Master\u2019s thesis, University of Twente (2010)"},{"key":"11_CR20","unstructured":"Spitzner, L.: Know your enemy: passive fingerprinting. In: World Wide Web, March 2002"},{"key":"11_CR21","unstructured":"Zalewski, M.: p0f: passive OS fingerprinting tool. http:\/\/lcamtuf.coredump.cx\/p0f.shtml . Accessed 6 May 2017"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94268-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,19]],"date-time":"2019-10-19T06:16:12Z","timestamp":1571465772000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-94268-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319942674","9783319942681"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94268-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}