Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,260,056 papers from all fields of science
Search
Sign In
Create Free Account
TCP/IP stack fingerprinting
Known as:
Passive OS Fingerprinting
, OS fingerprinting
, Active OS fingerprinting
Expand
TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Device fingerprint
Fingerprint (computing)
FreeBSD
Network Access Control
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
A comparative study on user characteristics of fixed and wireless network based on DHCP
Deliang Chang
,
Li Xing
,
Qianli Zhang
IEEE Information Technology, Networking…
2016
Corpus ID: 14701627
Internet is playing a more and more important role in today's society. Wireless network and mobile devices are becoming part of…
Expand
Review
2014
Review
2014
Fluvial sediment fingerprinting: literature review and annotated bibliography
J. E. Williamson
,
A. Haj
,
J. Stamm
,
J. Valder
,
Vicki L. Prautzch
2014
Corpus ID: 128442706
..........................................................................................................................................................
2012
2012
Improving WLAN-based indoor mobile positioning using sparsity
M. Pourhomayoun
,
M. Fowler
Asilomar Conference on Signals, Systems and…
2012
Corpus ID: 2051000
Growing demand for Indoor Localization and Navigation, and the increasing importance of Location Based Services (LBS…
Expand
2011
2011
Digital Whistleblowing in Restricted Environments
Graeme Bell
Journal of Digital Information
2011
Corpus ID: 18321265
The exposure of an organisation’s illegal or unethical practices is often known as whistleblowing. It is currently a high…
Expand
2010
2010
The limits of automatic OS fingerprint generation
David W. Richardson
,
S. Gribble
,
Tadayoshi Kohno
Security and Artificial Intelligence
2010
Corpus ID: 14085306
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant…
Expand
2004
2004
Remote OS Detection Based on TCP/IP Stack Fingerprinting
Jianhua Li
2004
Corpus ID: 203678986
Remote OS detection is an important technique in information network system security, because it closed links with security holes…
Expand
2004
2004
SYNSCAN : Towards Complete TCP / IP Fingerprinting
Greg Taleck
2004
Corpus ID: 13189647
A tool for TCP stack testing and TCP/IP fingerprinting (a.k.a. OS detection) is introduced. While tools presently exist to do…
Expand
2004
2004
Combining Port Knocking and Passive OS Fingerprinting with fwknop
Michael Rash
Login: The Usenix Magazine
2004
Corpus ID: 57663210
mbr@cipherdyne.org I T WA S A R O U N D 2 : 4 5 A . M . O N E S U M M E R night in 2002 and I had finally finished. My shiny new…
Expand
Highly Cited
2003
Highly Cited
2003
Ambiguity Resolution via Passive OS Fingerprinting
Greg Taleck
International Symposium on Recent Advances in…
2003
Corpus ID: 14677645
With more widespread use of tools (such as fragrouter and fragroute [11]) that exploit differences in common operating systems to…
Expand
2003
2003
Use of AFLP fingerprinting to analyze genetic variation within and between populations of Fusarium spp. derived from Egyptian cotton cultivars [Gossypium barbadense L.]
K. Abd-Elsalam
,
F. Schnieder
,
J. Verreet
,
Khalil
,
A. Asran-Amal
2003
Corpus ID: 91066297
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE