{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:11:41Z","timestamp":1767337901692},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,3]]},"DOI":"10.23919\/ifipnetworking62109.2024.10619808","type":"proceedings-article","created":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T17:18:52Z","timestamp":1723742332000},"page":"222-230","source":"Crossref","is-referenced-by-count":3,"title":["I Know Who You Scanned Last Summer: Mapping the Landscape of Internet-Wide Scanners"],"prefix":"10.23919","author":[{"given":"Julian","family":"Mayer","sequence":"first","affiliation":[{"name":"Esslingen University of Applied Sciences,Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Markus","family":"Schramm","sequence":"additional","affiliation":[{"name":"Esslingen University of Applied Sciences,Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lukas","family":"Bechtel","sequence":"additional","affiliation":[{"name":"Esslingen University of Applied Sciences,Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nils","family":"Lohmiller","sequence":"additional","affiliation":[{"name":"Esslingen University of Applied Sciences,Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sabrina","family":"Kaniewski","sequence":"additional","affiliation":[{"name":"Esslingen University of Applied Sciences,Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Menth","sequence":"additional","affiliation":[{"name":"University of T&#x00FC;bingen,Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tobias","family":"Heer","sequence":"additional","affiliation":[{"name":"Esslingen University of Applied Sciences,Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241275"},{"key":"ref2","article-title":"An Internet-Wide View of Internet-Wide Scanning","volume-title":"USENIX Security Symposium","author":"Durumeric","year":"2014"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2017.8002909"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196537"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355595"},{"key":"ref6","article-title":"Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope","volume-title":"USENIX Security Symposium","author":"Hiesgen","year":"2022"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988691"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/madweb.2021.23009"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/ICS2015.3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906943"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3338499.3357361"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2020.2979183"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2016.7792471"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3249474"},{"article-title":"Ipinfo.io","volume-title":"IPinfo","year":"2023","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6864"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0793"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC49757.2020.00020"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23488"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3424214"},{"key":"ref22","article-title":"ZMap: Fast Internet-Wide Scanning and Its Security Applications","volume-title":"USENIX Security Symposium","author":"Durumeric","year":"2013"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/sym10050151"},{"key":"ref24","article-title":"Zippier ZMap: Internet-Wide Scanning at 10 Gbps","volume-title":"USENIX Workshop on Offensive Technologies","author":"Adrian","year":"2014"},{"volume-title":"Censys: How a University Project became a Major Commercial Security Platform","year":"2022","author":"Dickson","key":"ref25"},{"volume-title":"Nmap Network Scanning: Official Nmap Project Guide to Network Discovery and Security Scanning","year":"2008","author":"Lyon","key":"ref26"},{"volume-title":"Redis Security Notice: Heap Overflow Vulnerabilities","year":"2023","key":"ref27"},{"volume-title":"Communication & Distributed Systems","author":"Aachen","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6335"},{"volume-title":"Academy for Internet Research","key":"ref30"},{"volume-title":"driftnet.io","key":"ref31","article-title":"Analyzing your Exposure Starts with one Click"},{"article-title":"Censys Internet Scanning Intro","volume-title":"Censys","year":"2024","key":"ref32"}],"event":{"name":"2024 IFIP Networking Conference (IFIP Networking)","start":{"date-parts":[[2024,6,3]]},"location":"Thessaloniki, Greece","end":{"date-parts":[[2024,6,6]]}},"container-title":["2024 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10619708\/10619055\/10619808.pdf?arnumber=10619808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T05:42:41Z","timestamp":1723786961000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10619808\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,3]]},"references-count":32,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking62109.2024.10619808","relation":{},"subject":[],"published":{"date-parts":[[2024,6,3]]}}}