1. IoT Inspector. https://iot-inspector.princeton.edu/ 2019. (Accessed on 05/08/2019). IoT Inspector. https://iot-inspector.princeton.edu/ 2019. (Accessed on 05/08/2019).
2. Acar A. Fereidooni H. Abera T. Sikder A. K. Miettinen M. Aksu H. Conti M. Sadeghi A.-R. and Uluagac A. S. Peek-a-Boo: I see your smart home activities even encrypted! arXiv preprint arXiv:1808.02741 (2018). Acar A. Fereidooni H. Abera T. Sikder A. K. Miettinen M. Aksu H. Conti M. Sadeghi A.-R. and Uluagac A. S. Peek-a-Boo: I see your smart home activities even encrypted! arXiv preprint arXiv:1808.02741 (2018).
3. SoK: Security Evaluation of Home-Based IoT Deployments
4. Amar Y. Haddadi H. Mortier R. Brown A. Colley J. A. and Crabtree A. An analysis of home iot network traffic and behaviour. CoRR abs/1803.05368 (2018). Amar Y. Haddadi H. Mortier R. Brown A. Colley J. A. and Crabtree A. An analysis of home iot network traffic and behaviour. CoRR abs/1803.05368 (2018).
5. Apthorpe N. Reisman D. Sundaresan S. Narayanan A. and Feamster N. Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic. arXiv preprint arXiv:1708.05044 (2017). Apthorpe N. Reisman D. Sundaresan S. Narayanan A. and Feamster N. Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic. arXiv preprint arXiv:1708.05044 (2017).