{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T20:54:38Z","timestamp":1773694478291,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T00:00:00Z","timestamp":1760572800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T00:00:00Z","timestamp":1760572800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,16]]},"DOI":"10.1109\/iccp68926.2025.11427169","type":"proceedings-article","created":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T19:51:37Z","timestamp":1773431497000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Active Operating System Fingerprinting Attempts Using Machine Learning"],"prefix":"10.1109","author":[{"given":"Ioan","family":"P\u0103durean","sequence":"first","affiliation":[{"name":"&#x201C;George Emil Palade&#x201D; University of Medicine,Pharmacy, Science, and Technology of Targu Mures,Department of Electrical Engineering and Information Technology,Romania"}]},{"given":"B\u00e9la","family":"Genge","sequence":"additional","affiliation":[{"name":"&#x201C;George Emil Palade&#x201D; University of Medicine,Pharmacy, Science, and Technology of Targu Mures,Department of Electrical Engineering and Information Technology,Romania"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228647"},{"key":"ref2","article-title":"Toward undetected operating system fingerprinting","volume-title":"Proceedings of the First USENIX Workshop on Offensive Technologies, WOOT \u201807","author":"Greenwald"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC49757.2020.00020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICITSI.2015.7437688"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.22581\/muet1982.2101.19"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/b978-159749109-9\/50008-3"},{"key":"ref7","first-page":"73","article-title":"An overview of os fingerprinting tools on the internet","volume":"73","author":"Ruoshi","year":"2020","journal-title":"Network"},{"key":"ref8","first-page":"35","article-title":"Using neural networks to improve classical operating system fingerprinting techniques","volume":"8","author":"Sarraute","year":"2008","journal-title":"Electronic Journal of SADIO"},{"key":"ref9","article-title":"Fingerprinting methods avoided by nmap","author":"Lyon","year":"2008"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.86"},{"key":"ref11","article-title":"Calculul neuronal. Editura Casa C\u0103r\u0163ii de \u015etiin\u0163\u0103","author":"En\u0103chescu"},{"key":"ref12","article-title":"Optimizers in deep learning","author":"Musstafa","year":"2021"},{"key":"ref13","article-title":"Tcpreplay sample captures","author":"Klassen","year":"2025"},{"key":"ref14","article-title":"Samplecaptures - wireshark wiki","author":"Community","year":"2025"}],"event":{"name":"2025 IEEE 21st International Conference on Intelligent Computer Communication and Processing (ICCP)","location":"Cluj-Napoca, Romania","start":{"date-parts":[[2025,10,16]]},"end":{"date-parts":[[2025,10,18]]}},"container-title":["2025 IEEE 21st International Conference on Intelligent Computer Communication and Processing (ICCP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11427093\/11427059\/11427169.pdf?arnumber=11427169","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T20:10:33Z","timestamp":1773691833000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11427169\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,16]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iccp68926.2025.11427169","relation":{},"subject":[],"published":{"date-parts":[[2025,10,16]]}}}