2020
DOI: 10.1007/978-981-15-6048-4_23
|View full text |Cite
|
Sign up to set email alerts
|

IOT Search Engines: Study of Data Collection Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Network port scanning moreover as vulnerability scanning is associate degree information-gathering technique, however once applied by anonymous people, these are viewed as a prelude to associate degree attack. Network scanning processes, like port scans and ping sweeps, come details regarding that information science addresses map to active live hosts and therefore the kind of services they supply [28]. It can be done in an easy way by using the available scanning tools like nmap [29], Angry Ip Scanner [30], Advanced Port Scanner [31].…”
Section: Network Port Scanningmentioning
confidence: 99%
“…Network port scanning moreover as vulnerability scanning is associate degree information-gathering technique, however once applied by anonymous people, these are viewed as a prelude to associate degree attack. Network scanning processes, like port scans and ping sweeps, come details regarding that information science addresses map to active live hosts and therefore the kind of services they supply [28]. It can be done in an easy way by using the available scanning tools like nmap [29], Angry Ip Scanner [30], Advanced Port Scanner [31].…”
Section: Network Port Scanningmentioning
confidence: 99%