Author:
Tam Anthony,Alaca Furkan,Barrera David
Publisher
Springer Nature Switzerland
Reference23 articles.
1. Antonakakis, M., et al.: Understanding the Mirai botnet. In: USENIX Security Symposium, August 2017
2. de Graaf, R., Aycock, J., Jacobson, M.: Improved port knocking with strong authentication. In: Annual Computer Security Applications Conference (2005)
3. Dong, K., et al.: Real-time execution of trigger-action connection for home Internet-of-Things. In: IEEE INFOCOM 2022 - IEEE Conf. on Computer Communications (2022)
4. Goutam, S., Enck, W., Reaves, B.: Hestia: simple least privilege network policies for smart homes. In: ACM WiSec (2019)
5. Hamza, A., Ranathunga, D., Gharakheili, H.H., Roughan, M., Sivaraman, V.: Clear as MUD: generating, validating and applying IoT behavioral profiles. In: ACM SIGCOMM Workshop on IoT Security and Privacy (2018)