Publisher
Springer Nature Switzerland
Reference30 articles.
1. Antonakakis, M., et al.: Understanding the mirai botnet. In: Proceedings of USENIX Security 2017, Vancouver, BC, pp. 1093–1110 (2017)
2. Benson, K., Dainotti, A., Claffy, K., Snoeren, A.C., Kallitsis, M.: Leveraging internet background radiation for opportunistic network analysis. In: Proceedings of ACM IMC 2015, Tokyo, Japan, pp. 423–436 (2015)
3. Censys: OPT out of data collection. https://support.censys.io/hc/en-us/articles/360043177092-Opt-Out-of-Scanning. Accessed Jan 2024
4. Collins, M.P., Hussain, A., Schwab, S.: Identifying and differentiating acknowledged scanners in network traffic. In: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 567–574 (2023). https://doi.org/10.1109/EuroSPW59978.2023.00069
5. Cui, T., Gou, G., Xiong, G.: 6GCVAE: gated convolutional variational autoencoder for IPv6 target generation. In: Proceedings of PAKDD 2020, Singapore (2020)