{"id":"https://openalex.org/W2952198025","doi":"https://doi.org/10.1155/2019/6045251","title":"A Novel Device Identification Method Based on Passive Measurement","display_name":"A Novel Device Identification Method Based on Passive Measurement","publication_year":2019,"publication_date":"2019-06-23","ids":{"openalex":"https://openalex.org/W2952198025","doi":"https://doi.org/10.1155/2019/6045251","mag":"2952198025"},"language":"en","primary_location":{"id":"doi:10.1155/2019/6045251","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2019/6045251","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/6045251.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2019/6045251.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100637915","display_name":"Wei Sun","orcid":"https://orcid.org/0000-0002-5165-6806"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Sun","raw_affiliation_strings":["Beijing Jiaotong University, School of Computer and Information Technology, Beijing 100044, China"],"affiliations":[{"raw_affiliation_string":"Beijing Jiaotong University, School of Computer and Information Technology, Beijing 100044, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100397061","display_name":"Hao Zhang","orcid":"https://orcid.org/0000-0003-3877-7512"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Zhang","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing 100093, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101775557","display_name":"Lijun Cai","orcid":"https://orcid.org/0000-0002-9665-592X"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li-jun Cai","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing 100093, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101522685","display_name":"Aimin Yu","orcid":"https://orcid.org/0000-0002-5521-4757"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ai-min Yu","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing 100093, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110292528","display_name":"Jinqiao Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin-qiao Shi","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, School of Cyberspace Security, Beijing 100876, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, School of Cyberspace Security, Beijing 100876, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102722080","display_name":"Jianguo Jiang","orcid":"https://orcid.org/0000-0002-0947-9500"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian-guo Jiang","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing 100093, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100637915"],"corresponding_institution_ids":["https://openalex.org/I21193070"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.3537,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.61966463,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8290889859199524},{"id":"https://openalex.org/keywords/intranet","display_name":"Intranet","score":0.7506905794143677},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6097912788391113},{"id":"https://openalex.org/keywords/networking-hardware","display_name":"Networking hardware","score":0.5879130363464355},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5378057360649109},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.48411428928375244},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4834050238132477},{"id":"https://openalex.org/keywords/nat","display_name":"Nat","score":0.45716771483421326},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37977343797683716},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1839648187160492}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8290889859199524},{"id":"https://openalex.org/C2778059363","wikidata":"https://www.wikidata.org/wiki/Q483426","display_name":"Intranet","level":3,"score":0.7506905794143677},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6097912788391113},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.5879130363464355},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5378057360649109},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.48411428928375244},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4834050238132477},{"id":"https://openalex.org/C182516595","wikidata":"https://www.wikidata.org/wiki/Q376660","display_name":"Nat","level":2,"score":0.45716771483421326},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37977343797683716},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1839648187160492},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2019/6045251","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2019/6045251","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/6045251.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:74b32e0e8ae94077bdbf7a933deb9d89","is_oa":true,"landing_page_url":"https://doaj.org/article/74b32e0e8ae94077bdbf7a933deb9d89","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2019 (2019)","raw_type":"article"},{"id":"pmh:oai:hindawi.com:10.1155/2019/6045251","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/6045251","pdf_url":null,"source":{"id":"https://openalex.org/S4306400340","display_name":"Hindawi Journal of Chemistry (Hindawi)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210126990","host_organization_name":"Hindawi (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210126990"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Research Article"}],"best_oa_location":{"id":"doi:10.1155/2019/6045251","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2019/6045251","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/6045251.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2952198025.pdf","grobid_xml":"https://content.openalex.org/works/W2952198025.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W1997129315","https://openalex.org/W2001107619","https://openalex.org/W2019319336","https://openalex.org/W2053163860","https://openalex.org/W2104599106","https://openalex.org/W2133131640","https://openalex.org/W2162408068","https://openalex.org/W2808451969","https://openalex.org/W2808681425","https://openalex.org/W2884705561","https://openalex.org/W2897812612","https://openalex.org/W2901014412","https://openalex.org/W2902007313","https://openalex.org/W2903590454","https://openalex.org/W2903823816","https://openalex.org/W2907369926","https://openalex.org/W4240385084"],"related_works":["https://openalex.org/W2374107376","https://openalex.org/W4241047679","https://openalex.org/W562045822","https://openalex.org/W2379752699","https://openalex.org/W2383430300","https://openalex.org/W2355747264","https://openalex.org/W2493140802","https://openalex.org/W2363296837","https://openalex.org/W2386241775","https://openalex.org/W2393572678"],"abstract_inverted_index":{"Nowadays,":[0],"with":[1],"the":[2,36,45,51,58,62,87,143,160,167,182,195,226],"continuous":[3],"integration":[4],"of":[5,16,39,44,47,57,61,65,89,175,181,209],"production":[6],"network":[7,70,144,212],"and":[8,12,18,25,54,77,83,114,123,139,163,219],"business":[9],"network,":[10],"more":[11,13],"Industrial":[14],"Internet":[15],"Things":[17],"Internal":[19],"Office":[20],"Network":[21],"have":[22],"been":[23],"interconnected":[24],"evolved":[26],"into":[27],"a":[28,131,150],"large-scale":[29,98],"enterprise-level":[30],"intraindustry":[31],"network.":[32,41],"Terminal":[33],"devices":[34,141,162,169,193,210,218,224],"are":[35,64,107,119,170,191,222],"basic":[37],"units":[38],"internal":[40,105],"Accurate":[42],"identification":[43],"type":[46],"device":[48,63,184],"corresponding":[49],"to":[50,97,121,137,158,202],"IP":[52],"address":[53],"detailed":[55],"description":[56],"communication":[59],"behavior":[60],"great":[66],"significance":[67],"for":[68],"conducting":[69],"security":[71],"risk":[72],"assessment,":[73],"hidden":[74],"danger":[75],"investigation,":[76],"threat":[78],"warning.":[79],"Traditional":[80],"cyberspace":[81],"surveying":[82],"mapping":[84],"techniques":[85],"take":[86],"form":[88],"active":[90,126],"measurement,":[91],"but":[92],"they":[93,118],"cannot":[94],"be":[95,203],"transplanted":[96],"intranet.":[99],"Resources":[100],"or":[101],"specific":[102],"targets":[103],"in":[104,142,205,211],"networks":[106],"often":[108],"protected":[109],"by":[110,125,172,178],"firewalls,":[111],"VPNs,":[112],"gateways,":[113],"other":[115],"technologies,":[116],"so":[117],"difficult":[120],"analyze":[122],"determine":[124,159],"measurement.":[127],"In":[128],"this":[129],"paper,":[130],"passive":[132],"measurement":[133],"method":[134,155,199],"is":[135,156,187],"proposed":[136],"identify":[138],"characterize":[140],"through":[145],"real":[146],"traffic":[147],"data.":[148],"Firstly,":[149],"new":[151],"graph":[152],"structure":[153],"mining":[154],"used":[157],"server-like":[161,192,223],"host-like":[164],"devices;":[165],"then,":[166],"NAT-like":[168,183,196,217,227],"determined":[171,188],"quantitative":[173],"analysis":[174,180],"traffic;":[176],"finally,":[177],"qualitative":[179],"traffic,":[185,214],"it":[186],"whether":[189,220],"there":[190,221],"behind":[194,225],"device.":[197],"This":[198],"will":[200],"prove":[201],"useful":[204],"identifying":[206],"all":[207],"kinds":[208],"data":[213],"detecting":[215],"unauthorized":[216],"devices.":[228]},"counts_by_year":[{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
