@inproceedings{0df1ee42e3384fdcae1fd560e3eaacd3,
title = "Anonymous port scanning: Performing network reconnaissance through Tor",
abstract = "The anonymizing network Tor is examined as one method of anonymizing port scanning tools and avoiding identification and retaliation. Performing anonymized port scans through Tor is possible using Nmap, but parallelization of the scanning processes is required to accelerate the scan rate.",
keywords = "Anonymization, Scanning, Tor",
author = "Rodney Rohrmann and Patton, {Mark W.} and Hsinchun Chen",
note = "Publisher Copyright: {\textcopyright} 2016 IEEE.; 14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015 ; Conference date: 28-09-2016 Through 30-09-2016",
year = "2016",
month = nov,
day = "15",
doi = "10.1109/ISI.2016.7745475",
language = "English (US)",
series = "IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "217",
editor = "Wenji Mao and Wang, {G. Alan} and Lina Zhou and Lisa Kaati",
booktitle = "IEEE International Conference on Intelligence and Security Informatics",
}