Funder
US Department of Homeland Security (DHS) Science and Technology (S&T)
Reference17 articles.
1. An analysis of clustering objectives for feature selection applied to encrypted traffic identification
2. Behavioral Fingerprinting of IoT Devices
3. Shuaike Dong Zhou Li Di Tang Jiongyi Chen Menghan Sun and Kehuan Zhang. 2019. Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks. arXiv preprint 1909 00104 (2019) 1--12. Shuaike Dong Zhou Li Di Tang Jiongyi Chen Menghan Sun and Kehuan Zhang. 2019. Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks. arXiv preprint 1909 00104 (2019) 1--12.
4. Traffic classification using clustering algorithms
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. URLink: Using Names As Sole Internet Addresses to Tackle Scanning Attacks in IoT;Proceedings of the First International Workshop on Security and Privacy of Sensing Systems;2023-11-12
2. ZBDS2023: A multi location Zigbee dataset to build innovative IoT Intrusion Detection Systems;2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob);2023-06-21
3. Protocol-agnostic IoT Device Classification on Encrypted Traffic Using Link-Level Flows;Proceedings of Cyber-Physical Systems and Internet of Things Week 2023;2023-05-09
4. ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes;Applied Cryptography and Network Security;2022