{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T06:30:27Z","timestamp":1725777027006},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/iwcmc.2016.7577111","type":"proceedings-article","created":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T18:01:42Z","timestamp":1475172102000},"page":"516-522","source":"Crossref","is-referenced-by-count":1,"title":["Optimizing internet scanning for assessing industrial systems exposure"],"prefix":"10.1109","author":[{"given":"Jerome","family":"Francois","sequence":"first","affiliation":[]},{"given":"Abdelkader","family":"Lahmadi","sequence":"additional","affiliation":[]},{"given":"Valentin","family":"Giannini","sequence":"additional","affiliation":[]},{"given":"Damien","family":"Cupif","sequence":"additional","affiliation":[]},{"given":"Frederic","family":"Beck","sequence":"additional","affiliation":[]},{"given":"Bertrand","family":"Wallrich","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/505733.505737"},{"year":"2009","author":"lyon","journal-title":"Nmap Network Scanning The Official Nmap Project Guide to Network Discovery and Security Scanning","key":"ref11"},{"key":"ref12","first-page":"25","article-title":"ScanSSH - Scanning the Internet for SSH Servers","author":"provos","year":"2001","journal-title":"Proc 15th USENIX Systems Administration Conf"},{"key":"ref13","article-title":"An Observatory for the SSLiverse","author":"eckersley","year":"2010","journal-title":"J B A observatory for the SSLiverse"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TNET.2012.2231434"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TNET.2013.2297678"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/2542049"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/978-3-642-38998-6_8"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/2516930.2516947"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/1852666.1852690"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/2380790.2380805"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/MSP.2011.67"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/978-3-642-04798-5_6"},{"year":"2013","author":"abd hary","article-title":"Electric Grid Vulnerability: Industry Responses Reveal Security Gaps","key":"ref5"},{"key":"ref8","article-title":"Zmap: Fast internet-wide scanning and its security applications","author":"durumeric","year":"2013","journal-title":"USENIX Security Symposium"},{"key":"ref7","article-title":"Sp 800-82. guide to industrial control systems (ics) security: Supervisory control and data acquisition (scada) systems, distributed control systems (des), and other control system configurations such as programmable logic controllers (plc)","author":"stouffer","year":"2011","journal-title":"Gaithersburg MD United States Tech Rep"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/MSP.2013.96"},{"year":"2010","author":"weiss","journal-title":"Protecting Industrial Control Systems from Electronic Threats","key":"ref1"},{"year":"0","author":"graham","article-title":"MASSCAN: Mass IP port scanner, accessed on 07\/01\/2016","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/978-3-642-14379-3_12"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/2810103.2813703"},{"key":"ref21","article-title":"Quantitatively assessing and visualising industrial system attack surfaces","author":"leverett","year":"2011","journal-title":"University of Cambridge Darwin College"}],"event":{"name":"2016 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2016,9,5]]},"location":"Paphos, Cyprus","end":{"date-parts":[[2016,9,9]]}},"container-title":["2016 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7571053\/7577016\/07577111.pdf?arnumber=7577111","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T22:55:20Z","timestamp":1476226520000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7577111\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2016.7577111","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}