{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:12:25Z","timestamp":1763467945865},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2009,9,3]],"date-time":"2009-09-03T00:00:00Z","timestamp":1251936000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol"],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1007\/s11416-009-0134-4","type":"journal-article","created":{"date-parts":[[2009,9,1]],"date-time":"2009-09-01T23:12:33Z","timestamp":1251846753000},"page":"329-342","source":"Crossref","is-referenced-by-count":19,"title":["IpMorph: fingerprinting spoofing unification"],"prefix":"10.1007","volume":"6","author":[{"given":"Guillaume","family":"Prigent","sequence":"first","affiliation":[]},{"given":"Florian","family":"Vichot","sequence":"additional","affiliation":[]},{"given":"Fabrice","family":"Harrouet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,9,3]]},"reference":[{"key":"134_CR1","unstructured":"Smart, M., Malan, G.R., Jahanian, F.: Defeating TCP\/IP stack fingerprinting. In: Proceddings of the 9th USENIX Security Symposium. http:\/\/www.usenix.org\/events\/sec00\/full_papers\/smart\/smart_html\/index.html"},{"key":"134_CR2","unstructured":"Fyodor: Remote OS detection via TCP\/IP stack fingerprinting. http:\/\/www.insecure.org\/nmap\/nmap-fingerprinting-article.txt"},{"key":"134_CR3","unstructured":"Spangler, R.: Analysis of remote active operating system fingerprinting tools, ettercap, Nmap and other OS detection tools. http:\/\/www.packetwatch.net\/documents\/papers\/osdetection.pdf (2008)"},{"key":"134_CR4","unstructured":"Auffret, P.: SinFP, unification de la prise d\u2019empreinte passive et active des syst\u00e8mes d\u2019exploitation, SSTIC 2008. http:\/\/www.gomor.org\/bin\/view\/GomorOrg\/ConfSstic2008"},{"key":"134_CR5","unstructured":"Veysset, F., Courtay, O., Heen, O.: New tool and technique for remote operating system fingerprinting. http:\/\/www.ouah.org\/ring-full-paper.pdf (2002)"},{"key":"134_CR6","unstructured":"Smith, C., Grundl, P.: Know your enemy: passive fingerprinting. http:\/\/old.honeynet.org\/papers\/finger\/ (2002)"},{"key":"134_CR7","unstructured":"Berrueta, D.B.: A practical approach for defeating Nmap OS-fingerprinting. http:\/\/nmap.org\/misc\/defeat-nmap-osdetect.htm (2003)"},{"key":"134_CR8","unstructured":"Trifero, S., Callaway, D.: Linux stealth patch. http:\/\/www.innu.org\/~sean\/ (2002)"},{"key":"134_CR9","unstructured":"Rehmet, G.: FreeBSD blackhole. http:\/\/www.gsp.com\/cgi-bin\/man.cgi?section=4&topic=blackhole"},{"key":"134_CR10","unstructured":"McCabe, R.: IPlog. http:\/\/ojnk.sourceforge.net\/stuff\/iplog.readme (2001)"},{"key":"134_CR11","unstructured":"Hartmeier, D.: OpenBSD packet filter. http:\/\/www.openbsd.org\/faq\/pf\/index.html"},{"key":"134_CR12","unstructured":"Crenshaw, A.: OSfuscate: change your windows OS TCP\/IP fingerprint to confuse P0f, NetworkMiner, ettercap, Nmap and other OS detection tools. http:\/\/www.irongeek.com\/i.php?page=security\/osfuscate-change-your-windows-os-tcp-ip-fingerprint-to-confuse-p0f-networkminer-ettercap-nmap-and-other-os-detection-tools (2008)"},{"key":"134_CR13","unstructured":"Provos, N.: Honeyd: a virtual honeypot daemon. http:\/\/www.citi.umich.edu\/u\/provos\/papers\/honeyd-eabstract.pdf (2003)"},{"key":"134_CR14","unstructured":"Wang, K.: Frustrating OS fingerprinting with morph. http:\/\/www.synacklabs.net\/projects\/morph\/Wang-Morph-TheFifthHOPE.pdf (2004)"},{"key":"134_CR15","unstructured":"BridNet SSTIC 2005. http:\/\/www.bridnet.fr\/files\/23\/sstic2005_bridnet.pdf"},{"key":"134_CR16","unstructured":"Hynesim http:\/\/www.hynesim.org"},{"key":"134_CR17","unstructured":"A painless guide to CRC error detection. http:\/\/www.repairfaq.org\/filipg\/LINK\/F_crc_v3.html"},{"key":"134_CR18","unstructured":"CRC and how to reverse it. http:\/\/www.codebreakers-journal.com\/downloads\/cbj\/2004\/CBJ_1_1_2004 Anarchriz_CRC_and_how _to_Reverse_it.pdf"},{"key":"134_CR19","unstructured":"Veysset, F., Courtay, O., Heen, O.: D\u00e9tection des syst\u00e8mes d\u2019exploitation avec RINGv2 Actes SSTIC 2003"}],"container-title":["Journal in Computer Virology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-009-0134-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-009-0134-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-009-0134-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:45:43Z","timestamp":1559385943000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-009-0134-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9,3]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,11]]}},"alternative-id":["134"],"URL":"https:\/\/doi.org\/10.1007\/s11416-009-0134-4","relation":{},"ISSN":["1772-9890","1772-9904"],"issn-type":[{"value":"1772-9890","type":"print"},{"value":"1772-9904","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,9,3]]}}}