Device fingerprinting for cyber-physical systems: a survey

V Kumar, K Paul - ACM Computing Surveys, 2023 - dl.acm.org
The continued growth of the cyber-physical system (CPS) and Internet of Things
technologies raises device security and monitoring concerns. For device identification …

Browsers fingerprinting motives, methods, and countermeasures

A ElBanna, N Abdelbaki - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
With the continuous and aggressive competition in advertising businesses, uncontrollably
desires have emerged to identify and classify consumers. It is proven that companies must …

NONYM! ZER: mitigation framework for browser fingerprinting

A ElBanna, N Abdelbaki - 2019 IEEE 19th International …, 2019 - ieeexplore.ieee.org
Not only recent compelled cookies regulations have radically restrained their threats but
also increased people awareness has played a fundamental part. This has placed huge …

Desktop and mobile operating system fingerprinting based on IPv6 protocol using machine learning algorithms

S Salah, MA Alhawa, R Zaghal - International Journal of …, 2022 - inderscienceonline.com
Operating system (OS) fingerprinting tools are essential to network security because of their
relationship to vulnerability scanning and penetrating testing. Although OS identification is …

CGA Configuration Detection Method of IPv6 Nodes by Combining Active Probing with Passive Sniffing

L Zhang, J Sun, J Yan, Y Guo… - 2022 IEEE 22nd …, 2022 - ieeexplore.ieee.org
To ensure the security of neighbor discovery messages and processes, IPv6 subnets are
increasingly deploying secure neighbor discovery (SEND) mechanisms. Although the …

Determining OS and applications by DNS traffic analysis

I Voronov, K Gnezdilov - 2021 IEEE Conference of Russian …, 2021 - ieeexplore.ieee.org
DNS-protocol is a protocol that allows you to get IP-address of websites to establish
connection between a server and a client device. Today this protocol is still used …

Internet User Trackers and Where to Find Them

V Teze, E Nazaruka - Applied Computer Systems, 2022 - sciendo.com
In the modern online world, users are often asked for a permission to track their actions as a
permission to “allow cookies”. The gathered information could be very valuable for a …

[引用][C] TCP/IP stack transport layer performance, privacy, and security issues

OO Felix - World Journal of Advanced …, 2024 - World Journal of Advanced …