{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:02:25Z","timestamp":1729627345937,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/ntms.2016.7792461","type":"proceedings-article","created":{"date-parts":[[2016,12,24]],"date-time":"2016-12-24T12:24:56Z","timestamp":1482582296000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["Modeling of IP Scanning Activities with Hidden Markov Models: Darknet Case Study"],"prefix":"10.1109","author":[{"given":"Giulia","family":"De Santis","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Abdelkader","family":"Lahmadi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jerome","family":"Francois","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Olivier","family":"Festor","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195589"},{"key":"ref11","article-title":"Identifying coordination of network scans using probed address structure","author":"mazel","year":"2016","journal-title":"Traffic Monitoring and Analysis-8th International Workshop TMA 2016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04989-7_13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-68768-1_2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2497690"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.02.005"},{"key":"ref6","article-title":"Smart home automation: Gsm security system design & implementation","author":"isa","year":"2015","journal-title":"3rd Conference on Electronics and Telecommunications (PACET15)"},{"key":"ref5","article-title":"ZMap: Fast internet-wide scanning and its security applications","volume":"2013","author":"durumeric","year":"2013","journal-title":"Usenix Security"},{"article-title":"Masscan: Mass ip port scanner","year":"2014","author":"graham","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2014.03.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.9"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-662-44885-4_5","article-title":"A study on advanced persistent threats","volume":"8735","author":"chen","year":"2014","journal-title":"Communications and Multimedia Security Ser Lecture Notes in Computer Science"},{"key":"ref9","first-page":"65","article-title":"An internet-wide view of internet-wide scanning","author":"durumeric","year":"2014","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"}],"event":{"name":"2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2016,11,21]]},"location":"Larnaca, Cyprus","end":{"date-parts":[[2016,11,23]]}},"container-title":["2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7791100\/7792416\/07792461.pdf?arnumber=7792461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T22:30:08Z","timestamp":1568673008000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7792461\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ntms.2016.7792461","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}