Publisher
Springer International Publishing
Reference27 articles.
1. Apthorpe, N., Reisman, D., Feamster, N.: A smart home is no castle: Privacy vulnerabilities of encrypted IOT traffic. arXiv preprint arXiv:1705.06805 (2017)
2. Bezawada, B., Bachani, M., Peterson, J., Shirazi, H., Ray, I., Ray, I.: Behavioral fingerprinting of IOT devices. In: Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, pp. 41–50. ACM (2018)
3. Bialek, W., Nemenman, I., Tishby, N.: Predictability, complexity, and learning. Neural Comput. 13(11), 2409–2463 (2001)
4. Fagan, M., Megas, K., Scarfone, K., Matthew, S.: Core cybersecurity feature baseline for securable IOT devices. Technical report, National Institute of Standards and Technology (2019)
5. Group, C.C.W.: The c2 consensus on IOT device security baseline capabilities. Technical report, Consumer Technology Association (2019)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献