{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T23:13:50Z","timestamp":1772147630325,"version":"3.50.1"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB3105001"],"award-info":[{"award-number":["2022YFB3105001"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["4222026"],"award-info":[{"award-number":["4222026"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,19]]},"DOI":"10.1109\/iwqos57198.2023.10188692","type":"proceedings-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T17:21:00Z","timestamp":1690478460000},"page":"1-10","source":"Crossref","is-referenced-by-count":10,"title":["Which Doors Are Open: Reinforcement Learning-based Internet-wide Port Scanning"],"prefix":"10.1109","author":[{"given":"Guanglei","family":"Song","sequence":"first","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China"}]},{"given":"Lin","family":"He","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China"}]},{"given":"Tianyun","family":"Zhao","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Beijing,China"}]},{"given":"Yirui","family":"Luo","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China"}]},{"given":"Yichao","family":"Wu","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China"}]},{"given":"Linna","family":"Fan","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China"}]},{"given":"Chenglong","family":"Li","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China"}]},{"given":"Zhiliang","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China"}]},{"given":"Jiahai","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"3111","article-title":"LZR: Identifying unexpected internet services","volume-title":"30th USENIX Security Symposium","author":"Izhikevich","year":"2021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987445"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131405"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278564"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3145040"},{"key":"ref7","article-title":"AddrMiner: A comprehensive global active IPv6 address discovery system","volume-title":"USENIX Annual Technical Conference (USENIX ATC)","author":"Song","year":"2022"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.03.010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488794"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488912"},{"key":"ref11","article-title":"ZMap: Fast internet-wide scanning and its security applications","volume-title":"22nd USENIX Security Symposium","author":"Durumeric","year":"2013"},{"key":"ref12","volume-title":"Masscan: Mass ip port scanner","author":"Graham","year":"2014"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00015"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278568"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23049"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813707"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131401"},{"key":"ref18","article-title":"DROWN: breaking TLS using sslv2","volume-title":"25th USENIX Security Symposium","author":"Aviram","year":"2016"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.39"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23342"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.55"},{"key":"ref22","first-page":"307","article-title":"Global measurement of DNS manipulation","volume-title":"26th USENIX Security Symposium","author":"Pearce","year":"2017"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"ref24","first-page":"1033","article-title":"Youve got vulnerability: Exploring effective vulnerability notifications","volume-title":"25th USENIX Security Symposium","author":"Li","year":"2016"},{"key":"ref25","volume-title":"Nmap network scanning: The official Nmap project guide to network discovery and security scanning. Insecure","author":"Lyon","year":"2008"},{"key":"ref26","volume-title":"The zmap project","author":"Durumeric","year":"2020"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544249"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/9781119723950.ch21"},{"key":"ref29","volume-title":"Censys search","year":"2022"},{"key":"ref30","volume-title":"Port selection data and strategies","year":"2022"},{"key":"ref31","volume-title":"Understanding denial-of-service attacks","year":"2019"},{"key":"ref32","volume-title":"What is a ddos attack and how does it work?","year":"2022"},{"key":"ref33","volume-title":"An observatory for the ssliverse. talk at defcon 18","author":"Eckersley","year":"2010"},{"key":"ref34","first-page":"85","article-title":"Improving passive packet capture: Beyond device polling","volume-title":"Proceedings of SANE","volume":"2004","author":"Deri"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851207"},{"key":"ref36","first-page":"101","article-title":"netmap: A novel framework for fast packet I\/O","volume-title":"2012 USENIX Annual Technical Conference","author":"Rizzo","year":"2012"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879156"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3213232.3213234"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3472951.3473505"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278564"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131405"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS49365.2020.9212980"},{"key":"ref43","volume-title":"Search engine for the internet of everything","author":"Matherly"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2896816"},{"key":"ref45","volume-title":"The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research","author":"Dittrich","year":"2012"}],"event":{"name":"2023 IEEE\/ACM 31st International Symposium on Quality of Service (IWQoS)","location":"Orlando, FL, USA","start":{"date-parts":[[2023,6,19]]},"end":{"date-parts":[[2023,6,21]]}},"container-title":["2023 IEEE\/ACM 31st International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10188660\/10188690\/10188692.pdf?arnumber=10188692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T15:09:10Z","timestamp":1709305750000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10188692\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,19]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/iwqos57198.2023.10188692","relation":{},"subject":[],"published":{"date-parts":[[2023,6,19]]}}}