{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T19:13:48Z","timestamp":1770837228323,"version":"3.50.1"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:00:00Z","timestamp":1558310400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:00:00Z","timestamp":1558310400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5,20]]},"DOI":"10.23919\/ifipnetworking.2019.8816853","type":"proceedings-article","created":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T21:35:56Z","timestamp":1567114556000},"page":"1-9","source":"Crossref","is-referenced-by-count":6,"title":["The Curious Case of Port 0"],"prefix":"10.23919","author":[{"given":"Mark","family":"Luchs","sequence":"first","affiliation":[{"name":"Delft University of Technology, Delft, CD, 2628, The Netherlands"}]},{"given":"Christian","family":"Doerr","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, CD, 2628, The Netherlands"}]}],"member":"263","reference":[{"key":"ref4","article-title":"Earth vs. the giant spider: Amazingly true stories of real penetration tests","author":"havelt","year":"2011","journal-title":"DEFCON-19"},{"key":"ref3","article-title":"Spike in traffic with TCP source port zero has some researchers worried","author":"constantin","year":"2013","journal-title":"PCWorld"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879149"},{"key":"ref6","author":"zalewski","year":"2016","journal-title":"p0f passive fingerprinter"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2016.7792471"},{"key":"ref5","author":"lyon","year":"2018","journal-title":"nmap Security Scanner"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.05.012"},{"key":"ref7","author":"arkin","year":"2002","journal-title":"Xprobe v2 0 a &#x201C;fuzzy&#x201D; approach to remote active operating system fingerprinting"},{"key":"ref2","article-title":"Port 0 OS fingerprinting","author":"jones","year":"2003","journal-title":"Nmap mailing list"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098985"},{"key":"ref1","year":"1994","journal-title":"RFC 1700 - Assigned Number"}],"event":{"name":"2019 IFIP Networking Conference (IFIP Networking)","location":"Warsaw, Poland","start":{"date-parts":[[2019,5,20]]},"end":{"date-parts":[[2019,5,22]]}},"container-title":["2019 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8811689\/8816828\/08816853.pdf?arnumber=8816853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T20:32:39Z","timestamp":1756153959000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8816853\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,20]]},"references-count":11,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking.2019.8816853","relation":{},"subject":[],"published":{"date-parts":[[2019,5,20]]}}}