{"id":"https://openalex.org/W2513401617","doi":"https://doi.org/10.1109/icufn.2016.7537162","title":"Performance evaluation of network scanning tools with operation of firewall","display_name":"Performance evaluation of network scanning tools with operation of firewall","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2513401617","doi":"https://doi.org/10.1109/icufn.2016.7537162","mag":"2513401617"},"language":"en","primary_location":{"id":"doi:10.1109/icufn.2016.7537162","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icufn.2016.7537162","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077399255","display_name":"Sun-Young Im","orcid":"https://orcid.org/0000-0002-5603-9575"},"institutions":[{"id":"https://openalex.org/I57664883","display_name":"Ajou University","ror":"https://ror.org/03tzb2h73","country_code":"KR","type":"education","lineage":["https://openalex.org/I57664883"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Sun-young Im","raw_affiliation_strings":["Dept. of Computer Engineering, Aiou University, Suwon, Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Engineering, Aiou University, Suwon, Korea","institution_ids":["https://openalex.org/I57664883"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026159346","display_name":"Seunghun Shin","orcid":"https://orcid.org/0000-0001-7022-6732"},"institutions":[{"id":"https://openalex.org/I57664883","display_name":"Ajou University","ror":"https://ror.org/03tzb2h73","country_code":"KR","type":"education","lineage":["https://openalex.org/I57664883"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seung-Hun Shin","raw_affiliation_strings":["University College, Ajou University, Suwon, Korea"],"affiliations":[{"raw_affiliation_string":"University College, Ajou University, Suwon, Korea","institution_ids":["https://openalex.org/I57664883"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112634178","display_name":"Ki Yeol Ryu","orcid":null},"institutions":[{"id":"https://openalex.org/I57664883","display_name":"Ajou University","ror":"https://ror.org/03tzb2h73","country_code":"KR","type":"education","lineage":["https://openalex.org/I57664883"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Ki Yeol Ryu","raw_affiliation_strings":["Dept. of Software, Ajou University, Suwon, Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of Software, Ajou University, Suwon, Korea","institution_ids":["https://openalex.org/I57664883"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065984213","display_name":"Byeong\u2010hee Roh","orcid":"https://orcid.org/0000-0003-2509-4210"},"institutions":[{"id":"https://openalex.org/I57664883","display_name":"Ajou University","ror":"https://ror.org/03tzb2h73","country_code":"KR","type":"education","lineage":["https://openalex.org/I57664883"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Byeong-hee Roh","raw_affiliation_strings":["Dept. of Computer Engineering, Aiou University, Suwon, Korea","Dept. of Software, Ajou University, Suwon, Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Engineering, Aiou University, Suwon, Korea","institution_ids":["https://openalex.org/I57664883"]},{"raw_affiliation_string":"Dept. of Software, Ajou University, Suwon, Korea","institution_ids":["https://openalex.org/I57664883"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5077399255"],"corresponding_institution_ids":["https://openalex.org/I57664883"],"apc_list":null,"apc_paid":null,"fwci":1.7372,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.86399903,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"1","issue":null,"first_page":"876","last_page":"881"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.746039628982544},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.6519947648048401},{"id":"https://openalex.org/keywords/network-performance","display_name":"Network performance","score":0.5400344729423523},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.46486908197402954},{"id":"https://openalex.org/keywords/networking-hardware","display_name":"Networking hardware","score":0.4416186809539795},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4230573773384094},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39903131127357483},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37039685249328613},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12551477551460266}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.746039628982544},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.6519947648048401},{"id":"https://openalex.org/C203274722","wikidata":"https://www.wikidata.org/wiki/Q7001161","display_name":"Network performance","level":2,"score":0.5400344729423523},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.46486908197402954},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.4416186809539795},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4230573773384094},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39903131127357483},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37039685249328613},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12551477551460266},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icufn.2016.7537162","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icufn.2016.7537162","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5199999809265137}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322094","display_name":"National Security Research Institute","ror":"https://ror.org/03ysstz10"},{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1510110825","https://openalex.org/W1680545717","https://openalex.org/W1966809779","https://openalex.org/W1974882621","https://openalex.org/W1988774297","https://openalex.org/W2047784240","https://openalex.org/W2112700013","https://openalex.org/W2122590816","https://openalex.org/W2124628099","https://openalex.org/W2170924378","https://openalex.org/W2184306774","https://openalex.org/W2283142110","https://openalex.org/W2331211786","https://openalex.org/W2534481600","https://openalex.org/W2541049357","https://openalex.org/W2553652196","https://openalex.org/W6637426264"],"related_works":["https://openalex.org/W2357071520","https://openalex.org/W2366078844","https://openalex.org/W2373857385","https://openalex.org/W2353277512","https://openalex.org/W2386241775","https://openalex.org/W2216846933","https://openalex.org/W2393572678","https://openalex.org/W2767706040","https://openalex.org/W2622536366","https://openalex.org/W2016269938"],"abstract_inverted_index":{"As":[0],"the":[1,7,13,39,46,52,69,75,101,118,145,155,168,184,188],"number":[2,134,156],"of":[3,15,71,77,103,135,147,157,164,187],"devices":[4,19,40,72,158],"connected":[5],"to":[6,17,37,170],"Internet":[8],"has":[9,22],"been":[10,23,35],"exponentially":[11],"increasing,":[12],"degree":[14],"threats":[16,189],"those":[18],"and":[20,41,80,99,112,127,143,194],"networks":[21,42],"also":[24,83],"increasing.":[25],"Various":[26],"network":[27,61,106,119,136,152,191],"scanning":[28,62,107,120,125,192],"tools,":[29,63],"which":[30,87],"use":[31],"fingerprinting":[32,195],"techniques,":[33],"have":[34],"developed":[36],"make":[38],"secure":[43],"by":[44,190],"providing":[45],"information":[47,70],"on":[48,117],"its":[49,85],"status.":[50],"However,":[51],"tools":[53,108,121,126,149,180,193],"may":[54],"be":[55,89],"used":[56,90,105],"for":[57,91],"malicious":[58],"purposes.":[59],"Using":[60],"attackers":[64],"can":[65,88],"not":[66],"only":[67,132],"obtain":[68],"such":[73,109],"as":[74,110,178,181,183],"name":[76],"OS,":[78],"version,":[79],"sessions":[81],"but":[82],"find":[84],"vulnerabilities":[86],"further":[92],"cyber-attacks.":[93],"In":[94,138],"this":[95,139,165],"paper,":[96,140],"we":[97,141],"compare":[98,142],"analyze":[100,144],"performances":[102,146],"widely":[104],"Nmap":[111],"Nessus.":[113],"The":[114,162],"existing":[115],"researches":[116],"analyzed":[122],"a":[123],"specific":[124],"they":[128,175],"assumed":[129],"there":[130],"are":[131,176],"small":[133],"devices.":[137],"several":[148],"in":[150],"practical":[151,185],"environments":[153],"with":[154],"more":[159],"than":[160],"40.":[161],"results":[163],"paper":[166],"provide":[167],"direction":[169],"prevent":[171],"possible":[172],"attacks":[173],"when":[174],"utilized":[177],"attack":[179],"well":[182],"understanding":[186],"techniques.":[196]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
