{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:07:02Z","timestamp":1770224822551,"version":"3.49.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,2]]},"DOI":"10.1109\/icmlc51923.2020.9469571","type":"proceedings-article","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T20:35:02Z","timestamp":1625517302000},"page":"143-150","source":"Crossref","is-referenced-by-count":10,"title":["Operating System Classification: A Minimalist Approach"],"prefix":"10.1109","author":[{"given":"KYLE","family":"MILLAR","sequence":"first","affiliation":[]},{"given":"ADRIEL","family":"CHENG","sequence":"additional","affiliation":[]},{"given":"HONG GUNN","family":"CHEW","sequence":"additional","affiliation":[]},{"given":"CHENG-CHEW","family":"LIM","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983091"},{"key":"ref11","author":"merrill","year":"2016","journal-title":"Liberal moderate or conservative? see how Facebook labels you"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110309"},{"key":"ref13","first-page":"1086","article-title":"Smartphone reconnaissance: Op erating system identification","author":"ruffing","year":"2016","journal-title":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.139"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312647"},{"key":"ref16","author":"zalewski","year":"2014","journal-title":"P0f V3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2016.131"},{"key":"ref3","article-title":"The present and future of Xprobe2: The next generation of active operating system fingerprinting","author":"arkin","year":"2003","journal-title":"The Sys-Security Group"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1093\/sf\/53.2.181"},{"key":"ref5","article-title":"Analyzing affiliation networks","author":"borgatti","year":"2011","journal-title":"The SAGE Handbook of Social Network Analysis"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012487302797"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663745"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228647"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2017.7969609"},{"key":"ref9","article-title":"Nmap Network Scanning: The official Nmap Project Guide to Network Discovery and Security Scanning","author":"lyon","year":"2009","journal-title":"Insecure"}],"event":{"name":"2020 International Conference on Machine Learning and Cybernetics (ICMLC)","location":"Adelaide, Australia","start":{"date-parts":[[2020,12,2]]},"end":{"date-parts":[[2020,12,2]]}},"container-title":["2020 International Conference on Machine Learning and Cybernetics (ICMLC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9469511\/9469036\/09469571.pdf?arnumber=9469571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T22:23:00Z","timestamp":1628547780000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9469571\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,2]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icmlc51923.2020.9469571","relation":{},"subject":[],"published":{"date-parts":[[2020,12,2]]}}}