{"id":"https://openalex.org/W2124628099","doi":"https://doi.org/10.1002/sec.1262","title":"ShoVAT: Shodan\u2010based vulnerability assessment tool for Internet\u2010facing services","display_name":"ShoVAT: Shodan\u2010based vulnerability assessment tool for Internet\u2010facing services","publication_year":2015,"publication_date":"2015-05-11","ids":{"openalex":"https://openalex.org/W2124628099","doi":"https://doi.org/10.1002/sec.1262","mag":"2124628099"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.1262","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075396323","display_name":"B\u00e9la Genge","orcid":"https://orcid.org/0000-0003-1390-479X"},"institutions":[{"id":"https://openalex.org/I4210090415","display_name":"Universitatea Petru Maior din T\u00eergu Mure\u015f","ror":"https://ror.org/009maf963","country_code":"RO","type":"education","lineage":["https://openalex.org/I4210090415"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"B\u00e9la Genge","raw_affiliation_strings":["Petru Maior University of T\u00eergu Mure\u015f Department of Informatics T\u00eergu, Mure\u015f Romania"],"affiliations":[{"raw_affiliation_string":"Petru Maior University of T\u00eergu Mure\u015f Department of Informatics T\u00eergu, Mure\u015f Romania","institution_ids":["https://openalex.org/I4210090415"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027662141","display_name":"Enachescu Calin","orcid":null},"institutions":[{"id":"https://openalex.org/I4210090415","display_name":"Universitatea Petru Maior din T\u00eergu Mure\u015f","ror":"https://ror.org/009maf963","country_code":"RO","type":"education","lineage":["https://openalex.org/I4210090415"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"C\u0103lin En\u0103chescu","raw_affiliation_strings":["Petru Maior University of T\u00eergu Mure\u015f Department of Informatics T\u00eergu, Mure\u015f Romania"],"affiliations":[{"raw_affiliation_string":"Petru Maior University of T\u00eergu Mure\u015f Department of Informatics T\u00eergu, Mure\u015f Romania","institution_ids":["https://openalex.org/I4210090415"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":null,"fwci":14.426,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":95,"citation_normalized_percentile":{"value":0.999978,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"9","issue":"15","first_page":"2696","last_page":"2714"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9977,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9947,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.86431104},{"id":"https://openalex.org/keywords/identification","display_name":"Identification","score":0.57983214}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.86431104},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.84162974},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.73275805},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.67752963},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.63212025},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.57983214},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4523299},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.41738302},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3364703},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.059720367},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.1262","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.64}],"grants":[{"funder":"https://openalex.org/F4320338080","funder_display_name":"European Social Fund","award_id":"POSDRU/159/1.5/S/133652"}],"datasets":[],"versions":[],"referenced_works_count":22,"referenced_works":["https://openalex.org/W1532958566","https://openalex.org/W1533833275","https://openalex.org/W1556693480","https://openalex.org/W1598169875","https://openalex.org/W1835037302","https://openalex.org/W1977891450","https://openalex.org/W1983442091","https://openalex.org/W1983616772","https://openalex.org/W2008679317","https://openalex.org/W2026991376","https://openalex.org/W2095373093","https://openalex.org/W2105103777","https://openalex.org/W2106847544","https://openalex.org/W2107609241","https://openalex.org/W2114398364","https://openalex.org/W2144489971","https://openalex.org/W2154513962","https://openalex.org/W2295043193","https://openalex.org/W2623492889","https://openalex.org/W2949170220","https://openalex.org/W3122401678","https://openalex.org/W4237097554"],"related_works":["https://openalex.org/W3157230915","https://openalex.org/W2947584067","https://openalex.org/W2789975780","https://openalex.org/W2370114625","https://openalex.org/W230721595","https://openalex.org/W2280562859","https://openalex.org/W2062873522","https://openalex.org/W1883246888","https://openalex.org/W1756374135","https://openalex.org/W1496728123"],"abstract_inverted_index":{"Abstract":[0],"Shodan":[1,32,55],"has":[2],"been":[3],"acknowledged":[4],"as":[5],"one":[6],"of":[7,53,62,101,163,168],"the":[8,18,28,51,99,102,140],"most":[9],"popular":[10],"search":[11],"engines":[12],"available":[13],"today,":[14],"designed":[15],"to":[16,21,81,89,142],"crawl":[17],"Internet":[19],"and":[20,57,88,108,126,132,165],"index":[22],"discovered":[23],"services.":[24],"This":[25],"paper":[26],"expands":[27],"features":[29],"exposed":[30],"by":[31],"with":[33,98,124],"advanced":[34],"vulnerability":[35,45,115,137],"assessment":[36,46],"capabilities":[37],"embedded":[38],"into":[39],"a":[40,166],"novel":[41,77,107],"tool":[42,47],"called":[43],"Shodan\u2010based":[44],"(ShoVAT).":[48],"ShoVAT":[49,104],"takes":[50],"output":[52],"traditional":[54],"queries":[56],"performs":[58],"an":[59],"in\u2010depth":[60],"analysis":[61,138],"service\u2010specific":[63],"data,":[64],"that":[65],"is,":[66],"service":[67,130,136],"banners.":[68],"It":[69],"embodies":[70],"specially":[71],"crafted":[72],"algorithms":[73],"which":[74],"rely":[75],"on":[76,150],"in\u2010memory":[78],"data":[79],"structures":[80],"automatically":[82],"reconstruct":[83],"Common":[84],"Platform":[85],"Enumeration":[86],"names":[87],"proficiently":[90],"extract":[91],"vulnerabilities":[92],"from":[93],"National":[94],"Vulnerability":[95],"Database.":[96],"Compared":[97],"state":[100],"art,":[103],"brings":[105],"several":[106],"significant":[109],"contributions":[110],"because":[111],"it":[112,118,133],"encompasses":[113],"automated":[114],"identification":[116],"techniques,":[117],"can":[119],"return":[120],"highly":[121],"accurate":[122],"results":[123,164],"customized":[125],"even":[127],"purposefully":[128],"modified":[129],"banners,":[131],"supports":[134],"historical":[135],"without":[139],"need":[141],"deploy":[143],"additional":[144],"monitoring":[145],"infrastructures.":[146],"The":[147],"experiments":[148],"performed":[149],"1501":[151],"services":[152],"in":[153],"12":[154],"different":[155,158],"institutions":[156],"across":[157],"sectors":[159],"revealed":[160],"high":[161],"accuracy":[162],"total":[167],"3922":[169],"known":[170],"vulnerabilities.":[171],"Copyright":[172],"\u00a9":[173],"2015":[174],"John":[175],"Wiley":[176],"&":[177],"Sons,":[178],"Ltd.":[179]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2124628099","counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":20},{"year":2020,"cited_by_count":20},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":1}],"updated_date":"2025-02-16T03:36:19.821324","created_date":"2016-06-24"}