IoT and the Risk of Internet Exposure: Risk Assessment Using Shodan Queries
暂无分享,去创建一个
[1] Kai Simon. Vulnerability Analysis Using Google and Shodan , 2016, CANS.
[2] Paul M Williams. Distinguishing Internet-facing ICS devices using PLC programming information , 2014 .
[3] Hsinchun Chen,et al. Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT) , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.
[4] Barry E. Mullins,et al. Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices , 2014, Int. J. Crit. Infrastructure Prot..