Assessing the Security of Campus Networks: The Case of Seven Universities

The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers have no complete picture of the network security because of its special management and the rapid growth of network assets. In this investigati...

Full description

Saved in:
Bibliographic Details
Published inSensors (Basel, Switzerland) Vol. 21; no. 1; p. 306
Main Authors Zheng, Rui, Ma, Hao, Wang, Qiuyun, Fu, Jianming, Jiang, Zhengwei
Format Journal Article
LanguageEnglish
Published Switzerland MDPI AG 05.01.2021
MDPI
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers have no complete picture of the network security because of its special management and the rapid growth of network assets. In this investigation, the security of campus networks belonging to seven universities in Wuhan was investigated. A tool called “WebHunt” was designed for campus networks, and with its help, the network security risks were found. Differently from existing tools for network probing, WebHunt can adopt the network scale and special rules of the campus network. According to the characteristics of campus websites, a series of functions were integrated into WebHunt, including reverse resolution of domain names, active network detection and fingerprint identification for software assets. Besides, WebHunt builds its vulnerability intelligence database with a knowledge graph structure and locates the vulnerabilities through matching knowledge graph information. Security assessments of seven universities presents WebHunt’s applicability for campus networks. Besides, it also shows that many security risks are concealed in campus networks, such as non-compliance IP addresses and domain names, system vulnerabilities and so on. The security reports containing risks have been sent to the relevant universities, and positive feedback was received.
AbstractList The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers have no complete picture of the network security because of its special management and the rapid growth of network assets. In this investigation, the security of campus networks belonging to seven universities in Wuhan was investigated. A tool called “WebHunt” was designed for campus networks, and with its help, the network security risks were found. Differently from existing tools for network probing, WebHunt can adopt the network scale and special rules of the campus network. According to the characteristics of campus websites, a series of functions were integrated into WebHunt, including reverse resolution of domain names, active network detection and fingerprint identification for software assets. Besides, WebHunt builds its vulnerability intelligence database with a knowledge graph structure and locates the vulnerabilities through matching knowledge graph information. Security assessments of seven universities presents WebHunt’s applicability for campus networks. Besides, it also shows that many security risks are concealed in campus networks, such as non-compliance IP addresses and domain names, system vulnerabilities and so on. The security reports containing risks have been sent to the relevant universities, and positive feedback was received.
The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers have no complete picture of the network security because of its special management and the rapid growth of network assets. In this investigation, the security of campus networks belonging to seven universities in Wuhan was investigated. A tool called "WebHunt" was designed for campus networks, and with its help, the network security risks were found. Differently from existing tools for network probing, WebHunt can adopt the network scale and special rules of the campus network. According to the characteristics of campus websites, a series of functions were integrated into WebHunt, including reverse resolution of domain names, active network detection and fingerprint identification for software assets. Besides, WebHunt builds its vulnerability intelligence database with a knowledge graph structure and locates the vulnerabilities through matching knowledge graph information. Security assessments of seven universities presents WebHunt's applicability for campus networks. Besides, it also shows that many security risks are concealed in campus networks, such as non-compliance IP addresses and domain names, system vulnerabilities and so on. The security reports containing risks have been sent to the relevant universities, and positive feedback was received.The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers have no complete picture of the network security because of its special management and the rapid growth of network assets. In this investigation, the security of campus networks belonging to seven universities in Wuhan was investigated. A tool called "WebHunt" was designed for campus networks, and with its help, the network security risks were found. Differently from existing tools for network probing, WebHunt can adopt the network scale and special rules of the campus network. According to the characteristics of campus websites, a series of functions were integrated into WebHunt, including reverse resolution of domain names, active network detection and fingerprint identification for software assets. Besides, WebHunt builds its vulnerability intelligence database with a knowledge graph structure and locates the vulnerabilities through matching knowledge graph information. Security assessments of seven universities presents WebHunt's applicability for campus networks. Besides, it also shows that many security risks are concealed in campus networks, such as non-compliance IP addresses and domain names, system vulnerabilities and so on. The security reports containing risks have been sent to the relevant universities, and positive feedback was received.
Author Zheng, Rui
Jiang, Zhengwei
Wang, Qiuyun
Fu, Jianming
Ma, Hao
AuthorAffiliation 2 Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; wangqiuyun@iie.ac.cn (Q.W.); jiangzhengwei@iie.ac.cn (Z.J.)
3 School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
1 Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China; zr_12f@whu.edu.cn (R.Z.); 15827331132@163.com (H.M.)
AuthorAffiliation_xml – name: 1 Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China; zr_12f@whu.edu.cn (R.Z.); 15827331132@163.com (H.M.)
– name: 2 Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; wangqiuyun@iie.ac.cn (Q.W.); jiangzhengwei@iie.ac.cn (Z.J.)
– name: 3 School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
Author_xml – sequence: 1
  givenname: Rui
  orcidid: 0000-0002-9592-3283
  surname: Zheng
  fullname: Zheng, Rui
– sequence: 2
  givenname: Hao
  surname: Ma
  fullname: Ma, Hao
– sequence: 3
  givenname: Qiuyun
  surname: Wang
  fullname: Wang, Qiuyun
– sequence: 4
  givenname: Jianming
  surname: Fu
  fullname: Fu, Jianming
– sequence: 5
  givenname: Zhengwei
  surname: Jiang
  fullname: Jiang, Zhengwei
BackLink https://www.ncbi.nlm.nih.gov/pubmed/33466335$$D View this record in MEDLINE/PubMed
BookMark eNptkktvEzEQgC1URB9w4A-glbjAIdT2eHdtDkhVxCNSBYe2Z8v2zqYOm3WwvUH99zikRG3FyY_5_M3YnlNyNIYRCXnN6AcARc8TZ5RRoM0zcsIEFzPJOT16MD8mpymtKOUAIF-QYwDRNAD1CVlcpIQp-XFZ5VusrtBN0ee7KvTV3Kw3U6q-Y_4d4s_0sbouwNwk3AWvcItjdTP6Lcbks8f0kjzvzZDw1f14Rm6-fL6ef5td_vi6mF9czpxoVJ6BsBagca4zdeck5U3PqHI1OAZlbZztKGDLpbKyZdRaK6BvBZemlp1iEs7IYu_tglnpTfRrE-90MF7_3QhxqU3M3g2oDbRCdQKlaJUwNVNgrLOmrltOwQIW16e9azPZNXYOxxzN8Ej6ODL6W70MW922qlagiuDdvSCGXxOmrNc-ORwGM2KYkua7zCWvqgv69gm6ClMcy1PtqAakalVTqDcPKzqU8u_HCvB-D7gYUorYHxBG9a4b9KEbCnv-hHU-m-zD7jJ--M-JP_VatGs
CitedBy_id crossref_primary_10_3390_ijgi10120835
crossref_primary_10_1109_ACCESS_2024_3476481
crossref_primary_10_1109_TDSC_2023_3324646
crossref_primary_10_1155_2022_3401074
crossref_primary_10_32604_jnm_2022_034830
crossref_primary_10_1007_s00500_023_08115_x
crossref_primary_10_1155_2022_1703167
crossref_primary_10_1155_2022_6854344
Cites_doi 10.1145/1298306.1298314
10.14722/ndss.2018.23105
10.1002/sec.1262
10.1109/ICSESS.2015.7339231
10.1109/SmartCity.2015.63
10.1016/j.na.2009.02.002
10.1109/MS.2015.77
10.1109/ANCS.2013.6665187
ContentType Journal Article
Copyright 2021. This work is licensed under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2021 by the authors. 2021
Copyright_xml – notice: 2021. This work is licensed under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2021 by the authors. 2021
DBID AAYXX
CITATION
NPM
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQQKQ
PQUKI
PRINS
7X8
5PM
DOA
DOI 10.3390/s21010306
DatabaseName CrossRef
PubMed
ProQuest Central (Corporate)
Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Databases
ProQuest One Community College
ProQuest Central Korea
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
ProQuest Health & Medical Collection
Medical Database
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ: Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Central China
ProQuest Central
ProQuest Health & Medical Research Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
Health & Medical Research Collection
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList
MEDLINE - Academic
PubMed
Publicly Available Content Database
CrossRef

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_a3749d4e84794a5193abcba557203b3e
PMC7795939
33466335
10_3390_s21010306
Genre Journal Article
GeographicLocations China
GeographicLocations_xml – name: China
GrantInformation_xml – fundername: NSFC
  grantid: U1636107
– fundername: National Key R&D Program of China
  grantid: 2016YFB0801004
– fundername: NSFC
  grantid: 61972297
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFKRA
AFZYC
ALIPV
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
IAO
ITC
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
3V.
ABJCF
ARAPS
HCIFZ
KB.
M7S
NPM
PDBOC
7XB
8FK
AZQEC
DWQXO
K9.
PJZUB
PKEHL
PPXIY
PQEST
PQUKI
PRINS
7X8
5PM
PUEGO
ID FETCH-LOGICAL-c469t-34bb336ccda5dc8026f109c53c13dc8acbd03e7289b8710bbb43f7428a58d9183
IEDL.DBID M48
ISSN 1424-8220
IngestDate Wed Aug 27 01:31:24 EDT 2025
Thu Aug 21 14:32:30 EDT 2025
Fri Jul 11 13:45:55 EDT 2025
Fri Jul 25 20:16:13 EDT 2025
Wed Feb 19 02:29:16 EST 2025
Tue Jul 01 03:56:00 EDT 2025
Thu Apr 24 22:58:21 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords threat intelligence
vulnerability detection
campus network
network assets
Language English
License https://creativecommons.org/licenses/by/4.0
Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c469t-34bb336ccda5dc8026f109c53c13dc8acbd03e7289b8710bbb43f7428a58d9183
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0002-9592-3283
OpenAccessLink http://journals.scholarsportal.info/openUrl.xqy?doi=10.3390/s21010306
PMID 33466335
PQID 2476389796
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_a3749d4e84794a5193abcba557203b3e
pubmedcentral_primary_oai_pubmedcentral_nih_gov_7795939
proquest_miscellaneous_2479419395
proquest_journals_2476389796
pubmed_primary_33466335
crossref_primary_10_3390_s21010306
crossref_citationtrail_10_3390_s21010306
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20210105
PublicationDateYYYYMMDD 2021-01-05
PublicationDate_xml – month: 1
  year: 2021
  text: 20210105
  day: 5
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Basel
PublicationTitle Sensors (Basel, Switzerland)
PublicationTitleAlternate Sensors (Basel)
PublicationYear 2021
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References Cao (ref_34) 2016; 4
ref_14
ref_36
ref_12
ref_11
ref_32
ref_31
Genge (ref_8) 2016; 9
Khademi (ref_30) 2015; 32
ref_19
ref_18
Boranbayev (ref_13) 2009; 71
ref_17
ref_39
ref_16
ref_38
ref_15
ref_37
Yan (ref_33) 2016; 33
ref_25
ref_23
ref_22
ref_21
ref_20
ref_41
ref_40
ref_1
ref_3
ref_2
Wei (ref_24) 2018; 39
ref_29
ref_28
ref_27
ref_26
ref_9
ref_5
Nan (ref_35) 2018; 45
ref_4
ref_7
Simon (ref_10) 2017; 23
ref_6
References_xml – ident: ref_7
– ident: ref_28
– ident: ref_9
– ident: ref_25
  doi: 10.1145/1298306.1298314
– ident: ref_36
  doi: 10.14722/ndss.2018.23105
– volume: 33
  start-page: 679
  year: 2016
  ident: ref_33
  article-title: An efficient method of web fingerprint identification
  publication-title: J. Univ. Chin. Acad. Sci.
– ident: ref_5
– ident: ref_3
– volume: 4
  start-page: 562
  year: 2016
  ident: ref_34
  article-title: Cyberspace device identification based on K-means with cosine distance measure
  publication-title: J. Univ. Chin. Acad. Sci.
– ident: ref_26
– volume: 9
  start-page: 2696
  year: 2016
  ident: ref_8
  article-title: ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services
  publication-title: Secur. Commun. Netw.
  doi: 10.1002/sec.1262
– ident: ref_11
– volume: 23
  start-page: 404
  year: 2017
  ident: ref_10
  article-title: Contactless Vulnerability Analysis using Google and Shodan
  publication-title: J. UCS
– ident: ref_16
– ident: ref_32
  doi: 10.1109/ICSESS.2015.7339231
– ident: ref_39
– ident: ref_40
– ident: ref_14
– ident: ref_1
– ident: ref_18
– ident: ref_21
– ident: ref_37
  doi: 10.1109/SmartCity.2015.63
– ident: ref_6
– volume: 45
  start-page: 141
  year: 2018
  ident: ref_35
  article-title: Web Server Fingerprint Identification Technology Based on KNN and GBDT
  publication-title: Comput. Sci.
– volume: 71
  start-page: e1633
  year: 2009
  ident: ref_13
  article-title: Defining methodologies for developing J2EE web-based information systems
  publication-title: Nonlinear Anal. Theory Methods Appl.
  doi: 10.1016/j.na.2009.02.002
– ident: ref_4
– ident: ref_31
– ident: ref_29
– ident: ref_27
– ident: ref_2
– ident: ref_12
– volume: 32
  start-page: 46
  year: 2015
  ident: ref_30
  article-title: An empirical evaluation of web-based fingerprinting
  publication-title: IEEE Softw.
  doi: 10.1109/MS.2015.77
– ident: ref_41
– ident: ref_15
– ident: ref_38
– ident: ref_17
– ident: ref_19
– ident: ref_22
– ident: ref_23
  doi: 10.1109/ANCS.2013.6665187
– volume: 39
  start-page: 70
  year: 2018
  ident: ref_24
  article-title: Detection and analysis of campus network common server database
  publication-title: J. Commun.
– ident: ref_20
SSID ssj0023338
Score 2.3651125
Snippet The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers...
SourceID doaj
pubmedcentral
proquest
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage 306
SubjectTerms campus network
College campuses
Colleges & universities
Efficiency
Internet
network assets
Network security
Search engines
Security management
Software
Statistical analysis
Statistical methods
threat intelligence
Traffic congestion
Traffic flow
URLs
vulnerability detection
SummonAdditionalLinks – databaseName: DOAJ: Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PS8MwFA6ykx7E306nRPHgpaxdkjbxpuKYgrvMwW4lSRMUpBO7_f--13ZllYEXb23yaNP38pr3Na_fI-RGK89U5n3AjXUAUOIYy7xkgRPWxUoKL8s_vF_H8WjKX2ZitlbqC3PCKnrgSnF9zRKuMu4kUqFrjDe0sUYLgfuHhjl8-8KatwJTNdRigLwqHiEGoL5fALDBelpxa_UpSfo3RZa_EyTXVpzhHtmtQ0V6Xw1xn2y5_IDsrBEIHpLnas8WjikEcnRSF6Ojc09xU2FZ0HGV5l3cUZgQ0Fg47JwgbxNtkjIALR-R6fDp7XEU1MURAguIdhEwbgxjsbWZFpmVAKV8FCormI0YnGtrspC5BPCUAUwUGmM484CDpRYyU-DIx6STz3N3SqhTPJZgFGGF5zLiBvyeh96A3hVPwqhLbldKS23NHI4FLD5TQBCo37TRb5dcN6JfFV3GJqEH1HwjgAzXZQPYPa3tnv5l9y7preyW1m5XpAOeYASWKLjHVdMNDoO7IDp382UpozhcTokuOanM3IyEMQ4RGIOepDUBWkNt9-Qf7yUpd4JF25k6-49nOyfbA0ydwS89okc6i--lu4DYZ2Euy2n-A7FsAZQ
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: ProQuest Technology Collection
  dbid: 8FG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1NT9wwEB2120t7QEC_QpfKVD30EpGs7cTmggB1gUrlQpG4RbZjAxJKKNn9_51JvClbod6SeJRY9ow9zzN5A_DV6MB1HUIqrPMIUIqCyrzUqZfOF1rJoPo_vH9eFGdX4se1vI4Hbl1Mq1ytif1CXbeOzsj3Z6KkzbXUxeHD75SqRlF0NZbQeAmvctxpKKVLzU9HwMURfw1sQhyh_X6H8IaqahVre1BP1f-cf_lvmuSTfWe-CRvRYWRHwwxvwQvfbMObJzSCb-F8iNziNUN3jl3GknSsDYxCC8uOXQzJ3t0BQ7XAh52nxktib2JjagZi5ndwNf_-6-QsjSUSUoe4dpFyYS3nhXO1kbVTCKhCnmknucs53htn64z7ElGVRWSUWWsFD4iGlZGq1mjO72HStI3_CMxrUSicGulkECoXFq1fZMEKXWtRZnkC31aDVrnIH05lLO4rxBE0vtU4vgl8GUUfBtKM54SOaeRHAeK57h-0jzdVNJvK8BK_L7wiInxD3qaxzhopKXpsuU9gupq3KhpfV_1VlQT2xmY0G4qFmMa3y15GC3ydlgl8GKZ57AnnAv0wji3lmgKsdXW9pbm77am5SyrdzvXO_7v1CV7PKDWGTnLkFCaLx6XfRd9mYT_3CvwH8A75dQ
  priority: 102
  providerName: ProQuest
Title Assessing the Security of Campus Networks: The Case of Seven Universities
URI https://www.ncbi.nlm.nih.gov/pubmed/33466335
https://www.proquest.com/docview/2476389796
https://www.proquest.com/docview/2479419395
https://pubmed.ncbi.nlm.nih.gov/PMC7795939
https://doaj.org/article/a3749d4e84794a5193abcba557203b3e
Volume 21
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Pb9MwFH7ajwsc0Pi5bqMyiAOXQFrbsY2EEEMrA2kVYlTqLbIdG5CmFJpW2v77vZek0YJ64BIlsRNbz3b8vjz7-wBeWRO5KWJMhPMBAUqWkcxLkQTpQ2a0jLre4X0xzc5n4utczndgo7HZGrDaCu1IT2q2vHpz_ffmAw7494Q4EbK_rRC2kFpWtgv7OCEpEjK4EF0wYcx5LWhNe7oSnA_ThmCo_2hvWqrZ-7e5nP-unLwzFU0O4EHrQ7KPTaM_hJ1QPoL7d5gFH8OXJpiL5ww9PHbZqtSxRWQUbVhXbNqs_67eMewpeLMKlHhJhE6sW62BMPoJzCZnPz6dJ61qQuIR6q4SLpzjPPO-sLLwGjFWHKXGS-5HHK-td0XKg0Kg5RAspc45wSMCZG2lLgyO8KewVy7KcAgsGJFpbC3pZRR6JBx-EEQanTCFESodDeD1xmi5bynFSdniKkdoQfbNO_sO4GWX9U_Do7Et0ylZvstA1Nf1jcXyZ96OpNxyheWLoIkb35IDap13VkoKKDseBnCyabd8053ysVDkmimDZbzoknEkUXjElmGxrvMYga8zcgDPmmbuasK5QNeMY4rqdYBeVfsp5e9fNVu3IjV3bo7-o9xjuDemJTP0h0eewN5quQ7P0edZuSHsqrnCo558HsL-6dn02_dh_f9gWPf1W--DAv0
linkProvider Scholars Portal
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3dTxQxEJ8gPqgPBr9gFbEaTXzZsHdtd7ckxAh43gncC5DwtrTdVk3ILrB3Mf5T_o3M7JecIb7xtrvTdJvpTDu_znQG4L1Wnqvc-1AY6xCgxDGVeclDJ62LVSp9Wt_wPpzG4xPx7VSeLsGf7i4MhVV2a2K9UOelpTPyzaFIaHNNVPzp4jKkqlHkXe1KaDRise9-_0LIVm1P9nB-PwyHoy_Hu-OwrSoQWoSCs5ALYziPrc21zG2KGMQPImUltwOO79qaPOIuQSBiEExExhjBPQLIVMs0V6gB2O89uC847uR0M330tQd4HPFek70IidFmhXCKqnjFC3teXRrgNnv237DMG_vcaAUetwYq-9xI1BNYcsVTeHQjbeEzmDSeYnxmaD6yo7YEHis9I1fGvGLTJri82mIohvixckQ8omxRrA8FQYz-HE7uhHkvYLkoC7cGzCkRpygK0kov0oEwuNqIyBuhciWSaBDAx45pmW3zlVPZjPMMcQvxN-v5G8C7vulFk6TjtkY7xPm-AeXVrj-UV9-zVk0zzRP8v3ApJd7XZN1qY42WkrzVhrsA1rt5y1plr7K_ohnA256Makq-F124cl63UQK7UzKA1Waa-5FwLtDu40hJFgRgYaiLlOLnjzoVeEKl4rl6-f9hvYEH4-PDg-xgMt1_BQ-HFJZDp0hyHZZnV3P3Gu2qmdmohZnB2V1rzzXAYTaG
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VrYTggHgT2oJBIHGJNru2kxgJoZZ21aWwqiiVegu2Y0OlKmmbXVX9a_w6ZvKiiypuvSWxlVjjGXs-z2Q-gDdaea5y70NhrEOAEsdE85KHTloXq1T6tP7D--ss3j0Un4_k0Qr87v6FobTKbk2sF-q8tHRGPhyLhDbXRMVD36ZF7G9PPp6ehcQgRZHWjk6jUZE9d3mB8K36MN3GuX47Hk92vn_aDVuGgdAiLJyHXBjDeWxtrmVuU8QjfhQpK7kdcbzX1uQRdwmCEoPAIjLGCO4RTKZaprlCa8D33oLVhFDRAFa3dmb733q4xxH9NbWMOFfRsEJwRZxe8dIOWBMFXOfd_pukeWXXm9yHe627yjYb_XoAK654CHevFDF8BNMmbozXDJ1JdtAS4rHSMwpsLCo2a1LNq_cMlRIfVo4aD6h2FOsTQxCxP4bDGxHfExgUZeGeAXNKxCkqhrTSi3QkDK49IvJGqFyJJBoF8K4TWmbb6uVEonGSIYoh-Wa9fAN43Xc9bUp2XNdpiyTfd6Aq2_WD8vxn1hptpnmC3xcupTL8mnxdbazRUlLs2nAXwHo3b1lr-lX2V1EDeNU3o9FSJEYXrlzUfZTA1ykZwNNmmvuRcC7QC-TYkiwpwNJQl1uK4191YfCEiOO5ev7_Yb2E22g52ZfpbG8N7owpR4eOlOQ6DObnC7eBTtbcvGi1mcGPmzagP0aFPBg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Assessing+the+Security+of+Campus+Networks%3A+The+Case+of+Seven+Universities&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Zheng%2C+Rui&rft.au=Ma%2C+Hao&rft.au=Wang%2C+Qiuyun&rft.au=Fu%2C+Jianming&rft.date=2021-01-05&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=21&rft.issue=1&rft_id=info:doi/10.3390%2Fs21010306&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon