Author:
Baddula Mounika,Ray Biplob,ElKhodr Mahmoud,Anwar Adnan,Hettiarachchi Pushpika
Publisher
Springer Nature Switzerland
Reference15 articles.
1. Abomhara, M., Køien, G.M.: Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber Secur. Mobi. 4, 65–88 (2015)
2. Acar, A., et al.: Peek-a-Boo: i see your smart home activities, even encrypted! In: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 207–218 (2020)
3. Apthorpe, N., Huang, D.Y., Reisman, D., Narayanan, A., Feamster, N.: Keeping the smart home private with smart(er) IoT traffic shaping. arXiv preprint arXiv:1812.00955 (2018)
4. Ashibani, Y., Mahmoud, Q.H.: A user authentication model for IoT networks based on app traffic patterns. In: 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 632–638. IEEE (2018)
5. Chowdhury, M., Ray, B., Chowdhury, S., Rajasegarar, S.: A novel insider attack and machine learning based detection for the internet of things. ACM Tran. IoT 2(4), 1–23 (2021)