{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:20:02Z","timestamp":1762003202535,"version":"build-2065373602"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/pimrc.2017.8292628","type":"proceedings-article","created":{"date-parts":[[2018,2,15]],"date-time":"2018-02-15T21:31:53Z","timestamp":1518730313000},"page":"1-7","source":"Crossref","is-referenced-by-count":12,"title":["A first empirical look on internet-scale exploitations of IoT devices"],"prefix":"10.1109","author":[{"given":"Mario","family":"Galluscio","sequence":"first","affiliation":[]},{"given":"Nataliia","family":"Neshenko","sequence":"additional","affiliation":[]},{"given":"Elias","family":"Bou-Harb","sequence":"additional","affiliation":[]},{"given":"Yongliang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Nasir","family":"Ghani","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Crichigno","sequence":"additional","affiliation":[]},{"given":"Georges","family":"Kaddoum","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_28"},{"key":"ref32","first-page":"8","article-title":"The dark oracle: Perspective-aware unused and unreachable address discovery","volume":"6","author":"cooke","year":"2006","journal-title":"NSDI"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"1496","DOI":"10.1109\/SURV.2013.102913.00020","article-title":"Cyber scanning: a comprehensive survey","volume":"16","author":"elias","year":"2014","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.09.008"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.015"},{"journal-title":"Shodan the search engine for","year":"0","author":"matherly","key":"ref35"},{"key":"ref34","first-page":"2","article-title":"Programming with libpcap-sniffing the network from our own application","author":"martin garcia","year":"2008","journal-title":"Hakin9-Computer Security Magazine"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.62"},{"journal-title":"Connected tvs fridge help launch global cy-berattack","year":"2015","author":"griggs","key":"ref11"},{"journal-title":"what you need to know about the botnet behind recent major ddos attacks Symantec","year":"0","key":"ref12"},{"journal-title":"Hajime worm battles mirai for control of the internet of things","year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834095"},{"key":"ref15","article-title":"The current state of access control for smart devices in homes","author":"ur","year":"2014","journal-title":"Workshop on Home Usable Privacy and Security (HUPS)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3055245.3055251"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920276"},{"key":"ref19","first-page":"95","article-title":"A large-scale analysis of the security of embedded firmwares","author":"costin","year":"2014","journal-title":"Usenix Security"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.05.012"},{"journal-title":"Smart cities-international case studies","year":"0","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2497690"},{"journal-title":"Internet of things applications part 2 The mining industry","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2704"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849283"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s16111872"},{"key":"ref8","article-title":"Hacking iot: A case study on baby monitor exposures and vulnerabilities","author":"stanislav","year":"2015","journal-title":"RapidIO"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600363CM"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.13"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.016"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23149"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.24.522"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2014.03.001"},{"journal-title":"Profiliot A machine learning approach for IoT device identification based on network traffic analysis","year":"2017","author":"meidan","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3055186.3055192"},{"key":"ref26","article-title":"Network telescopes: Technical report","author":"david","year":"2004","journal-title":"Department of Computer Science and Engineering University of California"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664277"}],"event":{"name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","start":{"date-parts":[[2017,10,8]]},"location":"Montreal, QC","end":{"date-parts":[[2017,10,13]]}},"container-title":["2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8288420\/8292162\/08292628.pdf?arnumber=8292628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T02:09:29Z","timestamp":1570759769000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8292628\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/pimrc.2017.8292628","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}