{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:03:34Z","timestamp":1775815414669,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/icccn.2016.7568486","type":"proceedings-article","created":{"date-parts":[[2016,9,15]],"date-time":"2016-09-15T16:53:48Z","timestamp":1473958428000},"page":"1-9","source":"Crossref","is-referenced-by-count":14,"title":["Active Profiling of Physical Devices at Internet Scale"],"prefix":"10.1109","author":[{"given":"Xuan","family":"Feng","sequence":"first","affiliation":[]},{"given":"Qiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Han","sequence":"additional","affiliation":[]},{"given":"Hongsong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Limin","family":"Sun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382233"},{"key":"ref32","article-title":"p0f: Passive os fingerprinting tool","author":"zalewski","year":"2006"},{"key":"ref31","article-title":"The present and future of xprobe2","volume":"27","author":"arkin","year":"2003","journal-title":"The Next Generation of Active Operation System Fingerprinting"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511426"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"ref10","author":"lyon","year":"2009","journal-title":"Nmap Network Scanning The Official Nmap Project Guide to Network Discovery and Security Scanning"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.17487\/rfc1305","article-title":"Network time protocol (version 3) specification, implementation and analysis","author":"mills","year":"1992"},{"key":"ref12","author":"bishop","year":"2006","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330124"},{"key":"ref14","year":"0"},{"key":"ref15","first-page":"149","article-title":"How to own the internet in your spare time","author":"staniford","year":"2002","journal-title":"USENIX Security Symposium"},{"key":"ref16","year":"0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879156"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2407400"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2014.6990358"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851196"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282415"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851196"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592579"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.102913.00020"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626295"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298315"},{"key":"ref8","year":"0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298316"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452542"},{"key":"ref9","first-page":"605","article-title":"Zmap: Fast internet-wide scanning and its security applications","author":"durumeric","year":"2013","journal-title":"Usenix Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref20","article-title":"Zippier zmap: internet-wide scanning at 10 gbps","author":"adrian","year":"2014","journal-title":"Proc 6th USENIX Workshop on Offensive Technologies"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504755"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195589"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2013.32"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398778"}],"event":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","location":"Waikoloa, HI, USA","start":{"date-parts":[[2016,8,1]]},"end":{"date-parts":[[2016,8,4]]}},"container-title":["2016 25th International Conference on Computer Communication and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7566809\/7568456\/07568486.pdf?arnumber=7568486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T11:13:15Z","timestamp":1568373195000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7568486\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icccn.2016.7568486","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}