TCP/IP stack fingerprinting

Known as: Active OS fingerprinting, OS Fingerprinting, Os fingerprint 
TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2000-2018
051020002018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
The task of MRI fingerprinting is to identify tissue parameters from complex-valued MRI signals. The prevalent approach is… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
2016
2016
Widespread adoption of indoor positioning systems based on WiFi fingerprinting is at present hindered by the large efforts… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
2014
2014
Traditional TCP/IP fingerprinting tools (e.g., nmap) are poorly suited for Internet-wide use due to the large amount of traffic… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
2010
2010
A large number of algal biofuels projects rely on a lipid screening technique for selecting a particular algal strain with which… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2008
2008
The ubiquity of firewalls using Network Address Translation and Port Address Translation (NAT/PAT), stateful inspection, and… (More)
Is this relevant?
2007
2007
Tools for active remote operating system fingerprinting generate many packets and are easily detected by host and network… (More)
  • table 1
  • table 2
  • table 4
Is this relevant?
2004
2004
A tool for TCP stack testing and TCP/IP fingerprinting (a.k.a. OS detection) is introduced. While tools presently exist to do… (More)
  • table 3
  • table 4
  • table 1
  • table 2
  • table 5
Is this relevant?
2004
2004
Many nework security problems can be solved in a centralized TCP (CTCP) architecture, in which an organization's edge router… (More)
  • figure 1
  • figure 3
  • figure 2
  • table 1
  • figure 4
Is this relevant?
2003
2003
With more widespread use of tools (such as fragrouter and fragroute[11]) that exploit differences in common operating systems to… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
2002
2002
Information gathering is an essential part of acute vulnerability assessment, especially when the whole process is automated. In… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?