On Usability of Hash Fingerprinting for Endpoint Application Identification
| dc.contributor.author | Heino Jenny | |
| dc.contributor.author | Gupta Ayush | |
| dc.contributor.author | Hakkala Antti | |
| dc.contributor.author | Virtanen Seppo | |
| dc.contributor.organization | fi=kyberturvallisuusteknologia|en=Cyber Security Engineering| | |
| dc.contributor.organization | fi=tietotekniikan laitos|en=Department of Computing| | |
| dc.contributor.organization-code | 1.2.246.10.2458963.20.28753843706 | |
| dc.contributor.organization-code | 1.2.246.10.2458963.20.85312822902 | |
| dc.converis.publication-id | 175959688 | |
| dc.converis.url | https://research.utu.fi/converis/portal/Publication/175959688 | |
| dc.date.accessioned | 2022-10-28T14:16:45Z | |
| dc.date.available | 2022-10-28T14:16:45Z | |
| dc.format.pagerange | 38 | |
| dc.format.pagerange | 43 | |
| dc.identifier.eisbn | 978-1-6654-9952-1 | |
| dc.identifier.isbn | 978-1-6654-9953-8 | |
| dc.identifier.olddbid | 187338 | |
| dc.identifier.oldhandle | 10024/170432 | |
| dc.identifier.uri | https://www.utupub.fi/handle/11111/42430 | |
| dc.identifier.url | https://ieeexplore.ieee.org/document/9850305 | |
| dc.identifier.urn | URN:NBN:fi-fe2022091258788 | |
| dc.language.iso | en | |
| dc.okm.affiliatedauthor | Heino, Jenny | |
| dc.okm.affiliatedauthor | Hakkala, Antti | |
| dc.okm.affiliatedauthor | Virtanen, Seppo | |
| dc.okm.discipline | 213 Electronic, automation and communications engineering, electronics | en_GB |
| dc.okm.discipline | 213 Sähkö-, automaatio- ja tietoliikennetekniikka, elektroniikka | fi_FI |
| dc.okm.internationalcopublication | not an international co-publication | |
| dc.okm.internationality | International publication | |
| dc.okm.type | A4 Conference Article | |
| dc.publisher.country | United States | en_GB |
| dc.publisher.country | Yhdysvallat (USA) | fi_FI |
| dc.publisher.country-code | US | |
| dc.relation.conference | IEEE International Conference on Cyber Security and Resilience | |
| dc.relation.doi | 10.1109/CSR54599.2022.9850305 | |
| dc.source.identifier | https://www.utupub.fi/handle/10024/170432 | |
| dc.title | On Usability of Hash Fingerprinting for Endpoint Application Identification | |
| dc.title.book | Proceedings of the 2022 IEEE International Conference on Cyber Security and Resilience (CSR) | |
| dc.year.issued | 2022 |
Tiedostot
1 - 1 / 1
Ladataan...
- Name:
- On_Usability_of_Hash_Fingerprinting_for_Endpoint_Application_Identification_IEEE_CSR (1).pdf
- Size:
- 637.6 KB
- Format:
- Adobe Portable Document Format