{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:51:58Z","timestamp":1774540318840,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/infcom.2012.6195544","type":"proceedings-article","created":{"date-parts":[[2012,5,24]],"date-time":"2012-05-24T22:26:40Z","timestamp":1337898400000},"page":"1728-1736","source":"Crossref","is-referenced-by-count":9,"title":["Firewall fingerprinting"],"prefix":"10.1109","author":[{"given":"Amir R.","family":"Khakpour","sequence":"first","affiliation":[]},{"given":"Joshua W.","family":"Hulst","sequence":"additional","affiliation":[]},{"family":"Zihui Ge","sequence":"additional","affiliation":[]},{"given":"Alex X.","family":"Liu","sequence":"additional","affiliation":[]},{"family":"Dan Pei","sequence":"additional","affiliation":[]},{"family":"Jia Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"0","journal-title":"Tcpdump public repository"},{"key":"22","article-title":"A robust classifier for passive TCP\/IP fingerprinting","author":"beverly","year":"0","journal-title":"Proc PAM 2004"},{"key":"17","year":"0","journal-title":"Mz-traffic Generator"},{"key":"23","first-page":"975","article-title":"Probability estimates for multi-class classification by pairwise coupling","volume":"5","author":"wu","year":"2004","journal-title":"Journal of Machine Learning Research"},{"key":"18","year":"0","journal-title":"HPING"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(99)00083-5"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383075"},{"key":"16","first-page":"135","article-title":"Packet classification using tuple space search","author":"srinivasan","year":"0","journal-title":"Proc ACM SIGCOMM 1999"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863980"},{"key":"14","article-title":"Packet classification on multiple fields","author":"gupta","year":"0","journal-title":"Proc ACM SIGCOMM 1999"},{"key":"11","article-title":"Performance evaluation of firewalls in gigabit-networks","author":"funke","year":"0","journal-title":"Proc Symposium on Performance Evaluation of Computer and Telecommunication Systems 1999"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/40.820051"},{"key":"21","article-title":"Toward undetected operating system fingerprinting","author":"greenwald","year":"0","journal-title":"Proc USENIX Workshop on Offensive Technologies 2007"},{"key":"3","author":"faydor","year":"0","journal-title":"Nmap Free Network Security Scanner"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932163"},{"key":"2","year":"2011","journal-title":"Cisco Firewall Services Module DoS Vulnerability"},{"key":"1","author":"goodin","year":"2010","journal-title":"Hacker Pierces Hardware Firewalls with Web Page"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2000.884700"},{"key":"7","year":"0","journal-title":"Snacktime A Perl Solution for Remote OS Fingerprinting"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2009.5347095"},{"key":"5","author":"zalewski","year":"0","journal-title":"P0f"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270338"},{"key":"9","author":"millard","year":"2003","journal-title":"Best Firewalls for Big Enterprises"},{"key":"8","article-title":"Defeating TCP\/IP stack fingerprinting","author":"smart","year":"0","journal-title":"Proc of USENIX Security 2000"}],"event":{"name":"IEEE INFOCOM 2012 - IEEE Conference on Computer Communications","location":"Orlando, FL, USA","start":{"date-parts":[[2012,3,25]]},"end":{"date-parts":[[2012,3,30]]}},"container-title":["2012 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6189419\/6195452\/06195544.pdf?arnumber=6195544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T16:38:48Z","timestamp":1490114328000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6195544\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/infcom.2012.6195544","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}