{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:08Z","timestamp":1750220348107,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T00:00:00Z","timestamp":1637280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,19]]},"DOI":"10.1145\/3502300.3502305","type":"proceedings-article","created":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T23:23:40Z","timestamp":1643325820000},"page":"33-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Automatic Smart Device Identification Based on Web Fingerprint and Neural Network"],"prefix":"10.1145","author":[{"given":"Le","family":"Yao","sequence":"first","affiliation":[{"name":"Institute of System Engineering AMS.PLA, China"}]},{"given":"Honglin","family":"Zhuang","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Science and Technology on Information System Security, China"}]},{"given":"Qianye","family":"Su","sequence":"additional","affiliation":[{"name":"Naval Research Institute of PLA, China"}]},{"given":"Zhechao","family":"Lin","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Science and Technology on Information System Security, China"}]},{"given":"Jiaxiang","family":"Gu","sequence":"additional","affiliation":[{"name":"Institute of System Engineering AMS.PLA, China"}]}],"member":"320","published-online":{"date-parts":[[2022,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","article-title":"\u201cCyberspace resource surveying and mapping: concept and technology","author":"Guo L.","year":"2018","unstructured":"L. Guo , Y. N. Guo , M. Q. Su , Y. M. Shang , Y. J. Zhu , P. Zhang , et.al. \u201cCyberspace resource surveying and mapping: concept and technology ,\u201d Journal of Cyber Security , 2018 , pp. 1 - 14 . L. Guo, Y. N. Guo, M. Q. Su, Y. M. Shang, Y. J. Zhu, P. Zhang, et.al. \u201cCyberspace resource surveying and mapping: concept and technology,\u201d Journal of Cyber Security, 2018, pp. 1-14.","journal-title":"Journal of Cyber Security"},{"key":"e_1_3_2_1_2_1","first-page":"1","volume-title":"Network scanning technology revealed","author":"Li R. M.","year":"2012","unstructured":"R. M. Li , \u201c Network scanning technology revealed ,\u201d Machinery Industry Press , 2012 , pp. 1 - 18 . R. M. Li, \u201cNetwork scanning technology revealed,\u201d Machinery Industry Press, 2012, pp. 1-18."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/3083187.3084020"},{"key":"e_1_3_2_1_4_1","volume-title":"The applications of deep learning on traffic identification","author":"Wang Z.","year":"2015","unstructured":"Z. Wang , \u201c The applications of deep learning on traffic identification \u201d ( 2015 ). Z. Wang, \u201cThe applications of deep learning on traffic identification\u201d (2015)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.5555\/3277203.3277228"},{"issue":"8","key":"e_1_3_2_1_6_1","first-page":"98","article-title":"Fingerprint generation of IoT devices based on the characteristics of the login interface","volume":"11","author":"Zhang S. S.","year":"2020","unstructured":"S. S. Zhang , and J. Huang . \u201c Fingerprint generation of IoT devices based on the characteristics of the login interface ,\u201d Cyberspace Security , 2020 , vol. 11 , no. 8 , pp. 98 - 102 . S. S. Zhang, and J.Huang. \u201cFingerprint generation of IoT devices based on the characteristics of the login interface,\u201d Cyberspace Security, 2020, vol. 11, no. 8, pp. 98-102.","journal-title":"Cyberspace Security"},{"issue":"5","key":"e_1_3_2_1_7_1","first-page":"1003","article-title":"Identification method of specific type of Internet of Things terminal based on WEB information","volume":"50","author":"Ren C. L.","year":"2017","unstructured":"C. L. Ren , Y. Gu , J. Cui , S. Liu , H. S. Zhu , and L M. Sun , \u201c Identification method of specific type of Internet of Things terminal based on WEB information ,\u201d Communications Technology , 2017 , vol. 50 , no. 5 , pp. 1003 - 1009 . C. L. Ren, Y. Gu, J. Cui, S. Liu, H. S. Zhu, and L M. Sun, \u201cIdentification method of specific type of Internet of Things terminal based on WEB information,\u201d Communications Technology, 2017, vol. 50, no. 5, pp. 1003-1009.","journal-title":"Communications Technology"},{"issue":"04","key":"e_1_3_2_1_8_1","first-page":"562","article-title":"Network space terminal equipment identification based on K-means based on cosine measure","volume":"33","author":"Cao L. C.","year":"2016","unstructured":"L. C. Cao , J. J. Cao , X. Cui , and K. Li . \u201c Network space terminal equipment identification based on K-means based on cosine measure ,\u201d Journal of University of Chinese Academy of Sciences , 2016 , vol. 33 , no. 04 , pp. 562 - 569 . L. C. Cao, J. J. Cao, X. Cui, and K. Li. \u201cNetwork space terminal equipment identification based on K-means based on cosine measure,\u201d Journal of University of Chinese Academy of Sciences, 2016, vol. 33, no. 04, pp. 562-569.","journal-title":"Journal of University of Chinese Academy of Sciences"},{"issue":"12","key":"e_1_3_2_1_9_1","first-page":"3604","article-title":"Summary of network protocol identification technology","volume":"39","author":"Feng W. B.","year":"2019","unstructured":"W. B. Feng , Z. Hong , L. F. Wu , and M. L. Lin . \u201c Summary of network protocol identification technology ,\u201d Journal of Computer Applications , 2019 , vol. 39 , no. 12 , pp. 3604 - 3614 . W. B. Feng, Z. Hong, L. F. Wu, and M. L. Lin. \u201cSummary of network protocol identification technology,\u201d Journal of Computer Applications, 2019, vol. 39, no. 12, pp. 3604-3614.","journal-title":"Journal of Computer Applications"},{"issue":"12","key":"e_1_3_2_1_10_1","first-page":"3604","article-title":"Summary of network protocol identification technology","volume":"39","author":"Feng W. B.","year":"2019","unstructured":"W. B. Feng , Z. Hong , L. F. Wu , and M. L. Lin . \u201c Summary of network protocol identification technology ,\u201d Journal of Computer Applications , 2019 , vol. 39 , no. 12 , pp. 3604 - 3614 . W. B. Feng, Z. Hong, L. F. Wu, and M. L. Lin. \u201cSummary of network protocol identification technology,\u201d Journal of Computer Applications, 2019, vol. 39, no. 12, pp. 3604-3614.","journal-title":"Journal of Computer Applications"},{"unstructured":"Shodan. 2014. The search engine for Internet-connected devices. (2014). https: \/\/www.shodan.io\/  Shodan. 2014. The search engine for Internet-connected devices. (2014). https: \/\/www.shodan.io\/","key":"e_1_3_2_1_11_1"},{"unstructured":"Censys. 2016. A search engine for devices and networks based on Internet-wide scanning. (2016). https:\/\/censys.io\/  Censys. 2016. A search engine for devices and networks based on Internet-wide scanning. (2016). https:\/\/censys.io\/","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","first-page":"409","volume-title":"Research on Detection and Identification Technology of Intelligent Devices in Cyberspace: A Survey,\" 2021 4th International Conference on Artificial Intelligence and Big Data (ICAIBD)","author":"Yao L.","year":"2021","unstructured":"L. Yao , H. Zhuang , Z. Lin , J. Gu , F. Wang and Q. Chen , \" Research on Detection and Identification Technology of Intelligent Devices in Cyberspace: A Survey,\" 2021 4th International Conference on Artificial Intelligence and Big Data (ICAIBD) , 2021 , pp. 409 - 418 L. Yao, H. Zhuang, Z. Lin, J. Gu, F. Wang and Q. Chen, \"Research on Detection and Identification Technology of Intelligent Devices in Cyberspace: A Survey,\" 2021 4th International Conference on Artificial Intelligence and Big Data (ICAIBD), 2021, pp. 409-418"},{"key":"e_1_3_2_1_14_1","volume-title":"Towards Automated Dynamic Analysis for Linux-based Embedded Firmware. In Network and Distributed System Security Symposium (NDSS)","author":"Chen Daming D","year":"2016","unstructured":"Daming D Chen , Manuel Egele , Maverick Woo , and David Brumley . 2016 . Towards Automated Dynamic Analysis for Linux-based Embedded Firmware. In Network and Distributed System Security Symposium (NDSS) Daming D Chen, Manuel Egele, Maverick Woo, and David Brumley. 2016. Towards Automated Dynamic Analysis for Linux-based Embedded Firmware. In Network and Distributed System Security Symposium (NDSS)"},{"key":"e_1_3_2_1_15_1","volume-title":"23rd USENIX Security Symposium","author":"Costin Andrei","year":"2014","unstructured":"Andrei Costin , Jonas Zaddach , Aur\u00e9lien Francillon , and Davide Balzarotti . 2014 . A Large-Scale Analysis of the Security of Embedded Firmwares . In 23rd USENIX Security Symposium . San Diego, CA, 95\u2013110 Andrei Costin, Jonas Zaddach, Aur\u00e9lien Francillon, and Davide Balzarotti. 2014. A Large-Scale Analysis of the Security of Embedded Firmwares. In 23rd USENIX Security Symposium. San Diego, CA, 95\u2013110"},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"Under the Concealing Surface","volume":"2020","author":"Song JinKe","unstructured":"JinKe Song , Qiang Li , Haining Wang , Limin Sun . Under the Concealing Surface : Detecting and Understanding Live Webcams in the Wild. Measurement and Modeling of Computer Systems , 2020 , pp. 1 - 25 JinKe Song,Qiang Li,Haining Wang,Limin Sun. Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild. Measurement and Modeling of Computer Systems,2020, pp.1-25","journal-title":"Detecting and Understanding Live Webcams in the Wild. Measurement and Modeling of Computer Systems"}],"event":{"acronym":"BDSIC 2021","name":"BDSIC 2021: 2021 3rd International Conference on Big-data Service and Intelligent Computation","location":"Xiamen China"},"container-title":["Proceedings of the 2021 3rd International Conference on Big-data Service and Intelligent Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3502300.3502305","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3502300.3502305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:05Z","timestamp":1750191425000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3502300.3502305"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,19]]},"references-count":16,"alternative-id":["10.1145\/3502300.3502305","10.1145\/3502300"],"URL":"https:\/\/doi.org\/10.1145\/3502300.3502305","relation":{},"subject":[],"published":{"date-parts":[[2021,11,19]]},"assertion":[{"value":"2022-01-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}