{"id":"https://openalex.org/W3175818510","doi":"https://doi.org/10.1109/icccs52626.2021.9449258","title":"Identify IoT Devices through Web Interface Characteristics","display_name":"Identify IoT Devices through Web Interface Characteristics","publication_year":2021,"publication_date":"2021-04-23","ids":{"openalex":"https://openalex.org/W3175818510","doi":"https://doi.org/10.1109/icccs52626.2021.9449258","mag":"3175818510"},"language":"en","primary_location":{"id":"doi:10.1109/icccs52626.2021.9449258","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs52626.2021.9449258","pdf_url":null,"source":{"id":"https://openalex.org/S4306498809","display_name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052875941","display_name":"Hui Cheng","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hui Cheng","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101888614","display_name":"Weiyu Dong","orcid":"https://orcid.org/0000-0001-6137-7782"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Weiyu Dong","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031326818","display_name":"Yan Zheng","orcid":"https://orcid.org/0000-0002-2173-1764"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yan Zheng","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112574920","display_name":"Bo Lv","orcid":"https://orcid.org/0009-0001-5155-966X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bo Lv","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5052875941"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.232,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.73227171,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"405","last_page":"410"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7666935920715332},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7085348963737488},{"id":"https://openalex.org/keywords/vendor","display_name":"Vendor","score":0.6381412148475647},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.6149684190750122},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6145731210708618},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.526740550994873},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5046736001968384},{"id":"https://openalex.org/keywords/web-of-things","display_name":"Web of Things","score":0.48760905861854553},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.4309622049331665},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.41760891675949097},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38359779119491577},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08976221084594727}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7666935920715332},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7085348963737488},{"id":"https://openalex.org/C2777338717","wikidata":"https://www.wikidata.org/wiki/Q1762621","display_name":"Vendor","level":2,"score":0.6381412148475647},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.6149684190750122},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6145731210708618},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.526740550994873},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5046736001968384},{"id":"https://openalex.org/C95349148","wikidata":"https://www.wikidata.org/wiki/Q2814098","display_name":"Web of Things","level":3,"score":0.48760905861854553},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.4309622049331665},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.41760891675949097},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38359779119491577},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08976221084594727},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccs52626.2021.9449258","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs52626.2021.9449258","pdf_url":null,"source":{"id":"https://openalex.org/S4306498809","display_name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2562876364","https://openalex.org/W2768718335","https://openalex.org/W2888774481","https://openalex.org/W2895909303","https://openalex.org/W2901909474","https://openalex.org/W2970940899","https://openalex.org/W3003450250","https://openalex.org/W3003615384","https://openalex.org/W3036531843","https://openalex.org/W3039471162","https://openalex.org/W4287752965","https://openalex.org/W6730584882","https://openalex.org/W6753952642"],"related_works":["https://openalex.org/W2478661203","https://openalex.org/W2004830053","https://openalex.org/W3008115697","https://openalex.org/W2616027277","https://openalex.org/W4244900363","https://openalex.org/W2534204780","https://openalex.org/W2969710819","https://openalex.org/W2780921688","https://openalex.org/W4383264551","https://openalex.org/W2900617588"],"abstract_inverted_index":{"With":[0],"the":[1,5,9,13,16,25,28,31,44,78,84,88,92,98,102,109,118,140],"continuous":[2],"expansion":[3],"of":[4,8,11,15,18,27,46,59,80,87,91,108,157],"business":[6],"scale":[7],"Internet":[10,17,79,119],"Things,":[12,81],"concept":[14],"Everything":[19],"has":[20,41],"been":[21,38],"deeply":[22],"rooted":[23],"in":[24],"hearts":[26],"people.":[29],"At":[30],"same":[32],"time,":[33],"various":[34],"security":[35,61],"issues":[36],"have":[37],"exposed,":[39],"which":[40,82],"greatly":[42],"affected":[43],"trust":[45],"enterprises":[47],"and":[48,51,105,122,130,144],"users.":[49],"Discovering":[50],"identifying":[52],"IoT":[53,60,151],"devices":[54,76,135,152],"as":[55],"an":[56,154],"important":[57],"part":[58],"should":[62],"be":[63],"taken":[64],"seriously.":[65],"In":[66],"this":[67],"paper,":[68],"we":[69],"propose":[70],"a":[71,124],"new":[72],"method":[73,149],"for":[74,120],"classifying":[75],"on":[77,117],"uses":[83],"data":[85],"characteristics":[86],"main":[89],"page":[90],"device's":[93],"web":[94],"interface":[95],"to":[96],"classify":[97],"vendor":[99],"name,":[100],"even":[101],"product":[103],"name":[104],"other":[106],"information":[107],"device.":[110],"We":[111],"randomly":[112],"selected":[113],"IP":[114],"address":[115],"ranges":[116],"scanning,":[121],"obtained":[123],"training":[125],"set":[126],"containing":[127],"80,000":[128],"entries":[129],"covering":[131],"more":[132],"than":[133],"1,000":[134],"from":[136],"74":[137],"vendors.":[138],"Using":[139],"random":[141],"forest":[142],"algorithm":[143],"proceeding":[145],"10-fold":[146],"cross-validation,":[147],"our":[148],"classified":[150],"with":[153],"accuracy":[155],"rate":[156],"over":[158],"97.5%.":[159]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
