{"id":"https://openalex.org/W2936423181","doi":"https://doi.org/10.1109/icgs3.2019.8688018","title":"Identifying Vulnerabilities Using Internet-Wide Scanning Data","display_name":"Identifying Vulnerabilities Using Internet-Wide Scanning Data","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2936423181","doi":"https://doi.org/10.1109/icgs3.2019.8688018","mag":"2936423181"},"language":"en","primary_location":{"id":"doi:10.1109/icgs3.2019.8688018","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icgs3.2019.8688018","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://napier-surface.worktribe.com/1500093/1/Identifying%20Vulnerabilities%20Using%20Internet-wide%20Scanning%20Data","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054416349","display_name":"Jamie O'Hare","orcid":null},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"education","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Jamie O'Hare","raw_affiliation_strings":["Edinburgh Napier University, School of Computing, Edinburgh, United Kingdom","School of Computing, Edinburgh Napier University, Edinburgh, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Edinburgh Napier University, School of Computing, Edinburgh, United Kingdom","institution_ids":["https://openalex.org/I251738"]},{"raw_affiliation_string":"School of Computing, Edinburgh Napier University, Edinburgh, United Kingdom","institution_ids":["https://openalex.org/I251738"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001347188","display_name":"Rich Macfarlane","orcid":null},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"education","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Rich Macfarlane","raw_affiliation_strings":["Edinburgh Napier University, School of Computing, Edinburgh, United Kingdom","School of Computing, Edinburgh Napier University, Edinburgh, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Edinburgh Napier University, School of Computing, Edinburgh, United Kingdom","institution_ids":["https://openalex.org/I251738"]},{"raw_affiliation_string":"School of Computing, Edinburgh Napier University, Edinburgh, United Kingdom","institution_ids":["https://openalex.org/I251738"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023024505","display_name":"Owen Lo","orcid":"https://orcid.org/0000-0003-0201-6498"},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"education","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Owen Lo","raw_affiliation_strings":["Edinburgh Napier University, School of Computing, Edinburgh, United Kingdom","School of Computing, Edinburgh Napier University, Edinburgh, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Edinburgh Napier University, School of Computing, Edinburgh, United Kingdom","institution_ids":["https://openalex.org/I251738"]},{"raw_affiliation_string":"School of Computing, Edinburgh Napier University, Edinburgh, United Kingdom","institution_ids":["https://openalex.org/I251738"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5054416349"],"corresponding_institution_ids":["https://openalex.org/I251738"],"apc_list":null,"apc_paid":null,"fwci":1.7684,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.85963166,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.8121461868286133},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7704455852508545},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7096269130706787},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5548958778381348},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5238054990768433},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4951898157596588},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.46324530243873596},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3746573030948639}],"concepts":[{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.8121461868286133},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7704455852508545},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7096269130706787},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5548958778381348},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5238054990768433},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4951898157596588},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.46324530243873596},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3746573030948639},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/icgs3.2019.8688018","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icgs3.2019.8688018","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)","raw_type":"proceedings-article"},{"id":"pmh:oai:napier-surface.worktribe.com:1500093","is_oa":true,"landing_page_url":"https://napier-surface.worktribe.com/1500093/1/Identifying%20Vulnerabilities%20Using%20Internet-wide%20Scanning%20Data","pdf_url":null,"source":{"id":"https://openalex.org/S4306400544","display_name":"Research Output (Edinburgh Napier University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I251738","host_organization_name":"Edinburgh Napier University","host_organization_lineage":["https://openalex.org/I251738"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"},{"id":"pmh:oai:repository@napier.ac.uk:1500093","is_oa":true,"landing_page_url":"http://researchrepository.napier.ac.uk/Output/1500093","pdf_url":null,"source":{"id":"https://openalex.org/S4306402591","display_name":"Edinburgh Napier Research Repository (Edinburgh Napier University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I251738","host_organization_name":"Edinburgh Napier University","host_organization_lineage":["https://openalex.org/I251738"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"acceptedVersion"}],"best_oa_location":{"id":"pmh:oai:napier-surface.worktribe.com:1500093","is_oa":true,"landing_page_url":"https://napier-surface.worktribe.com/1500093/1/Identifying%20Vulnerabilities%20Using%20Internet-wide%20Scanning%20Data","pdf_url":null,"source":{"id":"https://openalex.org/S4306400544","display_name":"Research Output (Edinburgh Napier University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I251738","host_organization_name":"Edinburgh Napier University","host_organization_lineage":["https://openalex.org/I251738"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"},"sustainable_development_goals":[{"score":0.4000000059604645,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1558012247","https://openalex.org/W1983442091","https://openalex.org/W1985424295","https://openalex.org/W1991741227","https://openalex.org/W2001637908","https://openalex.org/W2004810532","https://openalex.org/W2112736324","https://openalex.org/W2121654697","https://openalex.org/W2124628099","https://openalex.org/W2170924378","https://openalex.org/W2308209756","https://openalex.org/W2410471282","https://openalex.org/W2566216656","https://openalex.org/W2612537416","https://openalex.org/W2613483333","https://openalex.org/W2615111321","https://openalex.org/W2623492889","https://openalex.org/W2733684447","https://openalex.org/W2745141831","https://openalex.org/W2786245267","https://openalex.org/W2811327923","https://openalex.org/W2887920472","https://openalex.org/W4294352778","https://openalex.org/W6678359333","https://openalex.org/W6698258751","https://openalex.org/W6741329323","https://openalex.org/W6754517360"],"related_works":["https://openalex.org/W2393340519","https://openalex.org/W3118510577","https://openalex.org/W4298219515","https://openalex.org/W2021298062","https://openalex.org/W2185499427","https://openalex.org/W1883246888","https://openalex.org/W2371301679","https://openalex.org/W2527966616","https://openalex.org/W4200316191","https://openalex.org/W2188018701"],"abstract_inverted_index":{"Internet-wide":[0,29,96],"scanning":[1,30,97,159],"projects":[2],"such":[3,172],"as":[4,52,66,69,86,173],"Shodan":[5],"and":[6,11,38,129,147,151,180,206,218],"Censys,":[7],"scan":[8],"the":[9,44,59,70,118,130,166,177,204],"Internet":[10],"collect":[12],"active":[13,88,157,170],"reconnaissance":[14],"results":[15,160,205],"for":[16],"online":[17],"devices.":[18,181],"Access":[19],"to":[20,35,49,55,83,102,134,176,202,222,232,237],"this":[21,62,85,154],"information":[22,63],"is":[23,47,64,99,140],"provided":[24],"through":[25,117],"associated":[26,148,167],"websites.":[27],"The":[28,90],"data":[31,126],"can":[32,161],"be":[33,162],"used":[34],"identify":[36,50,136,224],"devices":[37,72],"services":[39,51,188],"which":[40,124],"are":[41,73],"exposed":[42],"on":[43,82,186],"Internet.":[45],"It":[46],"possible":[48,141,174],"being":[53,75],"susceptible":[54],"known-vulnerabilities":[56,196],"by":[57,142],"analysing":[58,143],"data.":[60],"Analysing":[61],"classed":[65],"passive":[67],"reconnaissance,":[68],"target":[71,178],"not":[74],"directly":[76],"communicated":[77],"with.":[78],"This":[79,110,139],"paper":[80],"goes":[81],"define":[84],"contactless":[87],"reconnaissance.":[89],"vulnerability":[91,158,212],"identification":[92],"functionality":[93],"in":[94],"these":[95,115],"tools":[98,214],"currently":[100],"limited":[101],"a":[103,121],"small":[104],"number":[105],"of":[106,120,169,230],"high":[107],"profile":[108],"vulnerabilities.":[109,138],"work":[111],"looks":[112],"towards":[113],"extending":[114],"features":[116],"creation":[119],"tool":[122],"Scout":[123,219],"combines":[125],"from":[127],"Censys":[128],"National":[131],"Vulnerability":[132,150],"Database":[133],"passively":[135],"potential":[137,195],"Common":[144,149],"Platform":[145],"Enumerations":[146],"Exposures.":[152],"Through":[153],"novel":[155],"approach,":[156],"gained,":[163],"while":[164],"mitigating":[165],"issues":[168],"scanning,":[171],"disruption":[175],"network":[179],"In":[182],"initial":[183],"experiments":[184,201],"performed":[185],"2571":[187],"across":[189],"7":[190],"local":[191],"academic":[192],"intuitions,":[193],"12967":[194],"were":[197,215],"identified.":[198],"More":[199],"focused":[200],"evaluate":[203],"compare":[207],"accuracy":[208],"with":[209,226],"industry":[210],"standard":[211],"assessment":[213],"carried":[216],"out":[217],"was":[220],"found":[221],"successfully":[223],"vulnerabilities":[225],"an":[227],"effectiveness":[228],"score":[229],"up":[231],"74":[233],"percent":[234],"when":[235],"compared":[236],"OpenVAS.":[238]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
