Device fingerprinting for cyber-physical systems: a survey
The continued growth of the cyber-physical system (CPS) and Internet of Things
technologies raises device security and monitoring concerns. For device identification …
technologies raises device security and monitoring concerns. For device identification …
Browsers fingerprinting motives, methods, and countermeasures
With the continuous and aggressive competition in advertising businesses, uncontrollably
desires have emerged to identify and classify consumers. It is proven that companies must …
desires have emerged to identify and classify consumers. It is proven that companies must …
NONYM! ZER: mitigation framework for browser fingerprinting
Not only recent compelled cookies regulations have radically restrained their threats but
also increased people awareness has played a fundamental part. This has placed huge …
also increased people awareness has played a fundamental part. This has placed huge …
Desktop and mobile operating system fingerprinting based on IPv6 protocol using machine learning algorithms
Operating system (OS) fingerprinting tools are essential to network security because of their
relationship to vulnerability scanning and penetrating testing. Although OS identification is …
relationship to vulnerability scanning and penetrating testing. Although OS identification is …
CGA Configuration Detection Method of IPv6 Nodes by Combining Active Probing with Passive Sniffing
L Zhang, J Sun, J Yan, Y Guo… - 2022 IEEE 22nd …, 2022 - ieeexplore.ieee.org
To ensure the security of neighbor discovery messages and processes, IPv6 subnets are
increasingly deploying secure neighbor discovery (SEND) mechanisms. Although the …
increasingly deploying secure neighbor discovery (SEND) mechanisms. Although the …
Determining OS and applications by DNS traffic analysis
I Voronov, K Gnezdilov - 2021 IEEE Conference of Russian …, 2021 - ieeexplore.ieee.org
DNS-protocol is a protocol that allows you to get IP-address of websites to establish
connection between a server and a client device. Today this protocol is still used …
connection between a server and a client device. Today this protocol is still used …
Internet User Trackers and Where to Find Them
V Teze, E Nazaruka - Applied Computer Systems, 2022 - sciendo.com
In the modern online world, users are often asked for a permission to track their actions as a
permission to “allow cookies”. The gathered information could be very valuable for a …
permission to “allow cookies”. The gathered information could be very valuable for a …