{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T07:20:34Z","timestamp":1768548034124,"version":"3.49.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/icgs3.2019.8688018","type":"proceedings-article","created":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T02:09:15Z","timestamp":1555034955000},"page":"1-10","source":"Crossref","is-referenced-by-count":21,"title":["Identifying Vulnerabilities Using Internet-Wide Scanning Data"],"prefix":"10.1109","author":[{"given":"Jamie","family":"O'Hare","sequence":"first","affiliation":[{"name":"Edinburgh Napier University, School of Computing, Edinburgh, United Kingdom"}]},{"given":"Rich","family":"Macfarlane","sequence":"additional","affiliation":[{"name":"Edinburgh Napier University, School of Computing, Edinburgh, United Kingdom"}]},{"given":"Owen","family":"Lo","sequence":"additional","affiliation":[{"name":"Edinburgh Napier University, School of Computing, Edinburgh, United Kingdom"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2015.02.003"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEA.2010.209"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7695"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2839339"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IT-DREPS.2017.8277814"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004904"},{"key":"ref35","article-title":"Beyond Internet Scanning: Non-Intrusive Vulnerability Assessment of Internet-Facing Services","volume":"4","author":"genge","year":"2015","journal-title":"International Journal of Information Security Science"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1515\/macro-2015-0003"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"ref11","first-page":"404","article-title":"Contactless vulnerability analysis using Google and Shodan","volume":"23","author":"simon","year":"2017","journal-title":"Journal of Universal Computer Science"},{"key":"ref12","year":"2011","journal-title":"ZoomEye - Cyberspace Search Engine"},{"key":"ref13","article-title":"Inside the world's most dangerous search engine","author":"matherly","year":"2014","journal-title":"ShowMe-Con"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.102913.00020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2014.03.001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745467"},{"key":"ref17","year":"2017","journal-title":"Grey Noise Intelligence"},{"key":"ref18","article-title":"Zippier ZMap: Internet-wide scanning at 10 Gbps","author":"adrian","year":"2014","journal-title":"Proceedings of the 8th USENIX Conference on Offensive Technologies USENIX"},{"key":"ref19","article-title":"Mass scanning the Internet","volume":"22","author":"graham","year":"2014","journal-title":"DefCon"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2310221"},{"key":"ref4","article-title":"Tenable","year":"1998","journal-title":"Nessus"},{"key":"ref27","author":"o'hare","year":"2018","journal-title":"The Scout"},{"key":"ref3","article-title":"Greenbone Networks","year":"2005","journal-title":"Openvas"},{"key":"ref6","article-title":"Censys.io","year":"2015","journal-title":"Censys"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.30"},{"key":"ref5","article-title":"Shodan.io","year":"2009","journal-title":"SHODAN"},{"key":"ref8","first-page":"3","author":"matherly","year":"2017","journal-title":"Complete Guide to Shodan"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"ref2","author":"perlroth","year":"2017","journal-title":"Cyberattack hits ukraine then spreads internationally The New York Times"},{"key":"ref9","first-page":"65:1","article-title":"A Review of Network Vulnerabilities Scanning Tools: Types, Capabilities and Functioning","author":"tundis","year":"2018","journal-title":"Proceedings of International Conference on Availability Reliability and Security"},{"key":"ref1","author":"panetta","year":"2016","journal-title":"Gartner's Top 10 Security Predictions 2016"},{"key":"ref20","article-title":"Masscan: designing my own crypto","author":"graham","year":"2013","journal-title":"Errata Security"},{"key":"ref22","first-page":"740","article-title":"Service Identification of Internet-Connected Devices Based on Common Platform Enumeration","volume":"14","author":"na","year":"2018","journal-title":"Journal of Information Processing Systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5041-1_40"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1262"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2017.7921992"},{"key":"ref26","author":"dulaunoy","year":"2016","journal-title":"cve-search project"},{"key":"ref25","author":"sanguino","year":"2017","journal-title":"Software Vulnerability Analysis Using CPE and CVE"}],"event":{"name":"2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)","location":"London, UK","start":{"date-parts":[[2019,1,16]]},"end":{"date-parts":[[2019,1,18]]}},"container-title":["2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8672787\/8688013\/08688018.pdf?arnumber=8688018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:37:45Z","timestamp":1755909465000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8688018\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/icgs3.2019.8688018","relation":{},"subject":[],"published":{"date-parts":[[2019,1]]}}}