Assessing the Security of Campus Networks: The Case of Seven Universities
The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers have no complete picture of the network security because of its special management and the rapid growth of network assets. In this investigati...
Saved in:
Published in | Sensors (Basel, Switzerland) Vol. 21; no. 1; p. 306 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Switzerland
MDPI AG
05.01.2021
MDPI |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers have no complete picture of the network security because of its special management and the rapid growth of network assets. In this investigation, the security of campus networks belonging to seven universities in Wuhan was investigated. A tool called “WebHunt” was designed for campus networks, and with its help, the network security risks were found. Differently from existing tools for network probing, WebHunt can adopt the network scale and special rules of the campus network. According to the characteristics of campus websites, a series of functions were integrated into WebHunt, including reverse resolution of domain names, active network detection and fingerprint identification for software assets. Besides, WebHunt builds its vulnerability intelligence database with a knowledge graph structure and locates the vulnerabilities through matching knowledge graph information. Security assessments of seven universities presents WebHunt’s applicability for campus networks. Besides, it also shows that many security risks are concealed in campus networks, such as non-compliance IP addresses and domain names, system vulnerabilities and so on. The security reports containing risks have been sent to the relevant universities, and positive feedback was received. |
---|---|
AbstractList | The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers have no complete picture of the network security because of its special management and the rapid growth of network assets. In this investigation, the security of campus networks belonging to seven universities in Wuhan was investigated. A tool called “WebHunt” was designed for campus networks, and with its help, the network security risks were found. Differently from existing tools for network probing, WebHunt can adopt the network scale and special rules of the campus network. According to the characteristics of campus websites, a series of functions were integrated into WebHunt, including reverse resolution of domain names, active network detection and fingerprint identification for software assets. Besides, WebHunt builds its vulnerability intelligence database with a knowledge graph structure and locates the vulnerabilities through matching knowledge graph information. Security assessments of seven universities presents WebHunt’s applicability for campus networks. Besides, it also shows that many security risks are concealed in campus networks, such as non-compliance IP addresses and domain names, system vulnerabilities and so on. The security reports containing risks have been sent to the relevant universities, and positive feedback was received. The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers have no complete picture of the network security because of its special management and the rapid growth of network assets. In this investigation, the security of campus networks belonging to seven universities in Wuhan was investigated. A tool called "WebHunt" was designed for campus networks, and with its help, the network security risks were found. Differently from existing tools for network probing, WebHunt can adopt the network scale and special rules of the campus network. According to the characteristics of campus websites, a series of functions were integrated into WebHunt, including reverse resolution of domain names, active network detection and fingerprint identification for software assets. Besides, WebHunt builds its vulnerability intelligence database with a knowledge graph structure and locates the vulnerabilities through matching knowledge graph information. Security assessments of seven universities presents WebHunt's applicability for campus networks. Besides, it also shows that many security risks are concealed in campus networks, such as non-compliance IP addresses and domain names, system vulnerabilities and so on. The security reports containing risks have been sent to the relevant universities, and positive feedback was received.The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers have no complete picture of the network security because of its special management and the rapid growth of network assets. In this investigation, the security of campus networks belonging to seven universities in Wuhan was investigated. A tool called "WebHunt" was designed for campus networks, and with its help, the network security risks were found. Differently from existing tools for network probing, WebHunt can adopt the network scale and special rules of the campus network. According to the characteristics of campus websites, a series of functions were integrated into WebHunt, including reverse resolution of domain names, active network detection and fingerprint identification for software assets. Besides, WebHunt builds its vulnerability intelligence database with a knowledge graph structure and locates the vulnerabilities through matching knowledge graph information. Security assessments of seven universities presents WebHunt's applicability for campus networks. Besides, it also shows that many security risks are concealed in campus networks, such as non-compliance IP addresses and domain names, system vulnerabilities and so on. The security reports containing risks have been sent to the relevant universities, and positive feedback was received. |
Author | Zheng, Rui Jiang, Zhengwei Wang, Qiuyun Fu, Jianming Ma, Hao |
AuthorAffiliation | 2 Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; wangqiuyun@iie.ac.cn (Q.W.); jiangzhengwei@iie.ac.cn (Z.J.) 3 School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China 1 Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China; zr_12f@whu.edu.cn (R.Z.); 15827331132@163.com (H.M.) |
AuthorAffiliation_xml | – name: 1 Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China; zr_12f@whu.edu.cn (R.Z.); 15827331132@163.com (H.M.) – name: 2 Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; wangqiuyun@iie.ac.cn (Q.W.); jiangzhengwei@iie.ac.cn (Z.J.) – name: 3 School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China |
Author_xml | – sequence: 1 givenname: Rui orcidid: 0000-0002-9592-3283 surname: Zheng fullname: Zheng, Rui – sequence: 2 givenname: Hao surname: Ma fullname: Ma, Hao – sequence: 3 givenname: Qiuyun surname: Wang fullname: Wang, Qiuyun – sequence: 4 givenname: Jianming surname: Fu fullname: Fu, Jianming – sequence: 5 givenname: Zhengwei surname: Jiang fullname: Jiang, Zhengwei |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/33466335$$D View this record in MEDLINE/PubMed |
BookMark | eNptkktvEzEQgC1URB9w4A-glbjAIdT2eHdtDkhVxCNSBYe2Z8v2zqYOm3WwvUH99zikRG3FyY_5_M3YnlNyNIYRCXnN6AcARc8TZ5RRoM0zcsIEFzPJOT16MD8mpymtKOUAIF-QYwDRNAD1CVlcpIQp-XFZ5VusrtBN0ee7KvTV3Kw3U6q-Y_4d4s_0sbouwNwk3AWvcItjdTP6Lcbks8f0kjzvzZDw1f14Rm6-fL6ef5td_vi6mF9czpxoVJ6BsBagca4zdeck5U3PqHI1OAZlbZztKGDLpbKyZdRaK6BvBZemlp1iEs7IYu_tglnpTfRrE-90MF7_3QhxqU3M3g2oDbRCdQKlaJUwNVNgrLOmrltOwQIW16e9azPZNXYOxxzN8Ej6ODL6W70MW922qlagiuDdvSCGXxOmrNc-ORwGM2KYkua7zCWvqgv69gm6ClMcy1PtqAakalVTqDcPKzqU8u_HCvB-D7gYUorYHxBG9a4b9KEbCnv-hHU-m-zD7jJ--M-JP_VatGs |
CitedBy_id | crossref_primary_10_3390_ijgi10120835 crossref_primary_10_1109_ACCESS_2024_3476481 crossref_primary_10_1109_TDSC_2023_3324646 crossref_primary_10_1155_2022_3401074 crossref_primary_10_32604_jnm_2022_034830 crossref_primary_10_1007_s00500_023_08115_x crossref_primary_10_1155_2022_1703167 crossref_primary_10_1155_2022_6854344 |
Cites_doi | 10.1145/1298306.1298314 10.14722/ndss.2018.23105 10.1002/sec.1262 10.1109/ICSESS.2015.7339231 10.1109/SmartCity.2015.63 10.1016/j.na.2009.02.002 10.1109/MS.2015.77 10.1109/ANCS.2013.6665187 |
ContentType | Journal Article |
Copyright | 2021. This work is licensed under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2021 by the authors. 2021 |
Copyright_xml | – notice: 2021. This work is licensed under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2021 by the authors. 2021 |
DBID | AAYXX CITATION NPM 3V. 7X7 7XB 88E 8FI 8FJ 8FK ABUWG AFKRA AZQEC BENPR CCPQU DWQXO FYUFA GHDGH K9. M0S M1P PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQQKQ PQUKI PRINS 7X8 5PM DOA |
DOI | 10.3390/s21010306 |
DatabaseName | CrossRef PubMed ProQuest Central (Corporate) Health & Medical Collection ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Databases ProQuest One Community College ProQuest Central Korea Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Health & Medical Complete (Alumni) ProQuest Health & Medical Collection Medical Database ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ: Directory of Open Access Journals |
DatabaseTitle | CrossRef PubMed Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Central China ProQuest Central ProQuest Health & Medical Research Collection Health Research Premium Collection Health and Medicine Complete (Alumni Edition) ProQuest Central Korea Health & Medical Research Collection ProQuest Central (New) ProQuest Medical Library (Alumni) ProQuest One Academic Eastern Edition ProQuest Hospital Collection Health Research Premium Collection (Alumni) ProQuest Hospital Collection (Alumni) ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
DatabaseTitleList | MEDLINE - Academic PubMed Publicly Available Content Database CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1424-8220 |
ExternalDocumentID | oai_doaj_org_article_a3749d4e84794a5193abcba557203b3e PMC7795939 33466335 10_3390_s21010306 |
Genre | Journal Article |
GeographicLocations | China |
GeographicLocations_xml | – name: China |
GrantInformation_xml | – fundername: NSFC grantid: U1636107 – fundername: National Key R&D Program of China grantid: 2016YFB0801004 – fundername: NSFC grantid: 61972297 |
GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS AENEX AFKRA AFZYC ALIPV ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE IAO ITC KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PQQKQ PROAC PSQYO RNS RPM TUS UKHRP XSB ~8M 3V. ABJCF ARAPS HCIFZ KB. M7S NPM PDBOC 7XB 8FK AZQEC DWQXO K9. PJZUB PKEHL PPXIY PQEST PQUKI PRINS 7X8 5PM PUEGO |
ID | FETCH-LOGICAL-c469t-34bb336ccda5dc8026f109c53c13dc8acbd03e7289b8710bbb43f7428a58d9183 |
IEDL.DBID | M48 |
ISSN | 1424-8220 |
IngestDate | Wed Aug 27 01:31:24 EDT 2025 Thu Aug 21 14:32:30 EDT 2025 Fri Jul 11 13:45:55 EDT 2025 Fri Jul 25 20:16:13 EDT 2025 Wed Feb 19 02:29:16 EST 2025 Tue Jul 01 03:56:00 EDT 2025 Thu Apr 24 22:58:21 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | threat intelligence vulnerability detection campus network network assets |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c469t-34bb336ccda5dc8026f109c53c13dc8acbd03e7289b8710bbb43f7428a58d9183 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
ORCID | 0000-0002-9592-3283 |
OpenAccessLink | http://journals.scholarsportal.info/openUrl.xqy?doi=10.3390/s21010306 |
PMID | 33466335 |
PQID | 2476389796 |
PQPubID | 2032333 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_a3749d4e84794a5193abcba557203b3e pubmedcentral_primary_oai_pubmedcentral_nih_gov_7795939 proquest_miscellaneous_2479419395 proquest_journals_2476389796 pubmed_primary_33466335 crossref_primary_10_3390_s21010306 crossref_citationtrail_10_3390_s21010306 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20210105 |
PublicationDateYYYYMMDD | 2021-01-05 |
PublicationDate_xml | – month: 1 year: 2021 text: 20210105 day: 5 |
PublicationDecade | 2020 |
PublicationPlace | Switzerland |
PublicationPlace_xml | – name: Switzerland – name: Basel |
PublicationTitle | Sensors (Basel, Switzerland) |
PublicationTitleAlternate | Sensors (Basel) |
PublicationYear | 2021 |
Publisher | MDPI AG MDPI |
Publisher_xml | – name: MDPI AG – name: MDPI |
References | Cao (ref_34) 2016; 4 ref_14 ref_36 ref_12 ref_11 ref_32 ref_31 Genge (ref_8) 2016; 9 Khademi (ref_30) 2015; 32 ref_19 ref_18 Boranbayev (ref_13) 2009; 71 ref_17 ref_39 ref_16 ref_38 ref_15 ref_37 Yan (ref_33) 2016; 33 ref_25 ref_23 ref_22 ref_21 ref_20 ref_41 ref_40 ref_1 ref_3 ref_2 Wei (ref_24) 2018; 39 ref_29 ref_28 ref_27 ref_26 ref_9 ref_5 Nan (ref_35) 2018; 45 ref_4 ref_7 Simon (ref_10) 2017; 23 ref_6 |
References_xml | – ident: ref_7 – ident: ref_28 – ident: ref_9 – ident: ref_25 doi: 10.1145/1298306.1298314 – ident: ref_36 doi: 10.14722/ndss.2018.23105 – volume: 33 start-page: 679 year: 2016 ident: ref_33 article-title: An efficient method of web fingerprint identification publication-title: J. Univ. Chin. Acad. Sci. – ident: ref_5 – ident: ref_3 – volume: 4 start-page: 562 year: 2016 ident: ref_34 article-title: Cyberspace device identification based on K-means with cosine distance measure publication-title: J. Univ. Chin. Acad. Sci. – ident: ref_26 – volume: 9 start-page: 2696 year: 2016 ident: ref_8 article-title: ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services publication-title: Secur. Commun. Netw. doi: 10.1002/sec.1262 – ident: ref_11 – volume: 23 start-page: 404 year: 2017 ident: ref_10 article-title: Contactless Vulnerability Analysis using Google and Shodan publication-title: J. UCS – ident: ref_16 – ident: ref_32 doi: 10.1109/ICSESS.2015.7339231 – ident: ref_39 – ident: ref_40 – ident: ref_14 – ident: ref_1 – ident: ref_18 – ident: ref_21 – ident: ref_37 doi: 10.1109/SmartCity.2015.63 – ident: ref_6 – volume: 45 start-page: 141 year: 2018 ident: ref_35 article-title: Web Server Fingerprint Identification Technology Based on KNN and GBDT publication-title: Comput. Sci. – volume: 71 start-page: e1633 year: 2009 ident: ref_13 article-title: Defining methodologies for developing J2EE web-based information systems publication-title: Nonlinear Anal. Theory Methods Appl. doi: 10.1016/j.na.2009.02.002 – ident: ref_4 – ident: ref_31 – ident: ref_29 – ident: ref_27 – ident: ref_2 – ident: ref_12 – volume: 32 start-page: 46 year: 2015 ident: ref_30 article-title: An empirical evaluation of web-based fingerprinting publication-title: IEEE Softw. doi: 10.1109/MS.2015.77 – ident: ref_41 – ident: ref_15 – ident: ref_38 – ident: ref_17 – ident: ref_19 – ident: ref_22 – ident: ref_23 doi: 10.1109/ANCS.2013.6665187 – volume: 39 start-page: 70 year: 2018 ident: ref_24 article-title: Detection and analysis of campus network common server database publication-title: J. Commun. – ident: ref_20 |
SSID | ssj0023338 |
Score | 2.3651125 |
Snippet | The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers... |
SourceID | doaj pubmedcentral proquest pubmed crossref |
SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
StartPage | 306 |
SubjectTerms | campus network College campuses Colleges & universities Efficiency Internet network assets Network security Search engines Security management Software Statistical analysis Statistical methods threat intelligence Traffic congestion Traffic flow URLs vulnerability detection |
SummonAdditionalLinks | – databaseName: DOAJ: Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PS8MwFA6ykx7E306nRPHgpaxdkjbxpuKYgrvMwW4lSRMUpBO7_f--13ZllYEXb23yaNP38pr3Na_fI-RGK89U5n3AjXUAUOIYy7xkgRPWxUoKL8s_vF_H8WjKX2ZitlbqC3PCKnrgSnF9zRKuMu4kUqFrjDe0sUYLgfuHhjl8-8KatwJTNdRigLwqHiEGoL5fALDBelpxa_UpSfo3RZa_EyTXVpzhHtmtQ0V6Xw1xn2y5_IDsrBEIHpLnas8WjikEcnRSF6Ojc09xU2FZ0HGV5l3cUZgQ0Fg47JwgbxNtkjIALR-R6fDp7XEU1MURAguIdhEwbgxjsbWZFpmVAKV8FCormI0YnGtrspC5BPCUAUwUGmM484CDpRYyU-DIx6STz3N3SqhTPJZgFGGF5zLiBvyeh96A3hVPwqhLbldKS23NHI4FLD5TQBCo37TRb5dcN6JfFV3GJqEH1HwjgAzXZQPYPa3tnv5l9y7preyW1m5XpAOeYASWKLjHVdMNDoO7IDp382UpozhcTokuOanM3IyEMQ4RGIOepDUBWkNt9-Qf7yUpd4JF25k6-49nOyfbA0ydwS89okc6i--lu4DYZ2Euy2n-A7FsAZQ priority: 102 providerName: Directory of Open Access Journals – databaseName: ProQuest Technology Collection dbid: 8FG link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1NT9wwEB2120t7QEC_QpfKVD30EpGs7cTmggB1gUrlQpG4RbZjAxJKKNn9_51JvClbod6SeJRY9ow9zzN5A_DV6MB1HUIqrPMIUIqCyrzUqZfOF1rJoPo_vH9eFGdX4se1vI4Hbl1Mq1ytif1CXbeOzsj3Z6KkzbXUxeHD75SqRlF0NZbQeAmvctxpKKVLzU9HwMURfw1sQhyh_X6H8IaqahVre1BP1f-cf_lvmuSTfWe-CRvRYWRHwwxvwQvfbMObJzSCb-F8iNziNUN3jl3GknSsDYxCC8uOXQzJ3t0BQ7XAh52nxktib2JjagZi5ndwNf_-6-QsjSUSUoe4dpFyYS3nhXO1kbVTCKhCnmknucs53htn64z7ElGVRWSUWWsFD4iGlZGq1mjO72HStI3_CMxrUSicGulkECoXFq1fZMEKXWtRZnkC31aDVrnIH05lLO4rxBE0vtU4vgl8GUUfBtKM54SOaeRHAeK57h-0jzdVNJvK8BK_L7wiInxD3qaxzhopKXpsuU9gupq3KhpfV_1VlQT2xmY0G4qFmMa3y15GC3ydlgl8GKZ57AnnAv0wji3lmgKsdXW9pbm77am5SyrdzvXO_7v1CV7PKDWGTnLkFCaLx6XfRd9mYT_3CvwH8A75dQ priority: 102 providerName: ProQuest |
Title | Assessing the Security of Campus Networks: The Case of Seven Universities |
URI | https://www.ncbi.nlm.nih.gov/pubmed/33466335 https://www.proquest.com/docview/2476389796 https://www.proquest.com/docview/2479419395 https://pubmed.ncbi.nlm.nih.gov/PMC7795939 https://doaj.org/article/a3749d4e84794a5193abcba557203b3e |
Volume | 21 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Pb9MwFH7ajwsc0Pi5bqMyiAOXQFrbsY2EEEMrA2kVYlTqLbIdG5CmFJpW2v77vZek0YJ64BIlsRNbz3b8vjz7-wBeWRO5KWJMhPMBAUqWkcxLkQTpQ2a0jLre4X0xzc5n4utczndgo7HZGrDaCu1IT2q2vHpz_ffmAw7494Q4EbK_rRC2kFpWtgv7OCEpEjK4EF0wYcx5LWhNe7oSnA_ThmCo_2hvWqrZ-7e5nP-unLwzFU0O4EHrQ7KPTaM_hJ1QPoL7d5gFH8OXJpiL5ww9PHbZqtSxRWQUbVhXbNqs_67eMewpeLMKlHhJhE6sW62BMPoJzCZnPz6dJ61qQuIR6q4SLpzjPPO-sLLwGjFWHKXGS-5HHK-td0XKg0Kg5RAspc45wSMCZG2lLgyO8KewVy7KcAgsGJFpbC3pZRR6JBx-EEQanTCFESodDeD1xmi5bynFSdniKkdoQfbNO_sO4GWX9U_Do7Et0ylZvstA1Nf1jcXyZ96OpNxyheWLoIkb35IDap13VkoKKDseBnCyabd8053ysVDkmimDZbzoknEkUXjElmGxrvMYga8zcgDPmmbuasK5QNeMY4rqdYBeVfsp5e9fNVu3IjV3bo7-o9xjuDemJTP0h0eewN5quQ7P0edZuSHsqrnCo558HsL-6dn02_dh_f9gWPf1W--DAv0 |
linkProvider | Scholars Portal |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3dTxQxEJ8gPqgPBr9gFbEaTXzZsHdtd7ckxAh43gncC5DwtrTdVk3ILrB3Mf5T_o3M7JecIb7xtrvTdJvpTDu_znQG4L1Wnqvc-1AY6xCgxDGVeclDJ62LVSp9Wt_wPpzG4xPx7VSeLsGf7i4MhVV2a2K9UOelpTPyzaFIaHNNVPzp4jKkqlHkXe1KaDRise9-_0LIVm1P9nB-PwyHoy_Hu-OwrSoQWoSCs5ALYziPrc21zG2KGMQPImUltwOO79qaPOIuQSBiEExExhjBPQLIVMs0V6gB2O89uC847uR0M330tQd4HPFek70IidFmhXCKqnjFC3teXRrgNnv237DMG_vcaAUetwYq-9xI1BNYcsVTeHQjbeEzmDSeYnxmaD6yo7YEHis9I1fGvGLTJri82mIohvixckQ8omxRrA8FQYz-HE7uhHkvYLkoC7cGzCkRpygK0kov0oEwuNqIyBuhciWSaBDAx45pmW3zlVPZjPMMcQvxN-v5G8C7vulFk6TjtkY7xPm-AeXVrj-UV9-zVk0zzRP8v3ApJd7XZN1qY42WkrzVhrsA1rt5y1plr7K_ohnA256Makq-F124cl63UQK7UzKA1Waa-5FwLtDu40hJFgRgYaiLlOLnjzoVeEKl4rl6-f9hvYEH4-PDg-xgMt1_BQ-HFJZDp0hyHZZnV3P3Gu2qmdmohZnB2V1rzzXAYTaG |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VrYTggHgT2oJBIHGJNru2kxgJoZZ21aWwqiiVegu2Y0OlKmmbXVX9a_w6ZvKiiypuvSWxlVjjGXs-z2Q-gDdaea5y70NhrEOAEsdE85KHTloXq1T6tP7D--ss3j0Un4_k0Qr87v6FobTKbk2sF-q8tHRGPhyLhDbXRMVD36ZF7G9PPp6ehcQgRZHWjk6jUZE9d3mB8K36MN3GuX47Hk92vn_aDVuGgdAiLJyHXBjDeWxtrmVuU8QjfhQpK7kdcbzX1uQRdwmCEoPAIjLGCO4RTKZaprlCa8D33oLVhFDRAFa3dmb733q4xxH9NbWMOFfRsEJwRZxe8dIOWBMFXOfd_pukeWXXm9yHe627yjYb_XoAK654CHevFDF8BNMmbozXDJ1JdtAS4rHSMwpsLCo2a1LNq_cMlRIfVo4aD6h2FOsTQxCxP4bDGxHfExgUZeGeAXNKxCkqhrTSi3QkDK49IvJGqFyJJBoF8K4TWmbb6uVEonGSIYoh-Wa9fAN43Xc9bUp2XNdpiyTfd6Aq2_WD8vxn1hptpnmC3xcupTL8mnxdbazRUlLs2nAXwHo3b1lr-lX2V1EDeNU3o9FSJEYXrlzUfZTA1ykZwNNmmvuRcC7QC-TYkiwpwNJQl1uK4191YfCEiOO5ev7_Yb2E22g52ZfpbG8N7owpR4eOlOQ6DObnC7eBTtbcvGi1mcGPmzagP0aFPBg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Assessing+the+Security+of+Campus+Networks%3A+The+Case+of+Seven+Universities&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Zheng%2C+Rui&rft.au=Ma%2C+Hao&rft.au=Wang%2C+Qiuyun&rft.au=Fu%2C+Jianming&rft.date=2021-01-05&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=21&rft.issue=1&rft_id=info:doi/10.3390%2Fs21010306&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |