4.0 Article

IoTBeholder: A Privacy Snooping Attack on User Habitual Behaviors from Smart Home Wi-Fi Traffic

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Proceedings Paper Computer Science, Hardware & Architecture

Pinpointing Hidden IoT Devices via Spatial-temporal Traffic Fingerprinting

Xiaobo Ma et al.

IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (2020)

Proceedings Paper Computer Science, Hardware & Architecture

IOTGAZE: IoT Security Enforcement via Wireless Context Analysis

Tianbo Gu et al.

IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Classifying IoT Devices in Smart Environments Using Network Traffic Characteristics

Arunan Sivanathan et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2019)

Article Computer Science, Artificial Intelligence

Internet of Things for enabling smart environments: A technology-centric perspective

Caries Gomez et al.

JOURNAL OF AMBIENT INTELLIGENCE AND SMART ENVIRONMENTS (2019)

Proceedings Paper Computer Science, Information Systems

Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach

Jingjing Ren et al.

IMC'19: PROCEEDINGS OF THE 2019 ACM INTERNET MEASUREMENT CONFERENCE (2019)

Proceedings Paper Computer Science, Hardware & Architecture

HOMESNITCH: Behavior Transparency and Control for Smart Home IoT Devices

T. J. OConnor et al.

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19) (2019)

Proceedings Paper Computer Science, Theory & Methods

DeviceMien: Network Device Behavior Modeling for Identifying Unknown IoT Devices

Jorge Ortiz et al.

PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION (IOTDI '19) (2019)

Article Computer Science, Information Systems

Enhancing Attention-Based LSTM With Position Context for Aspect-Level Sentiment Classification

Jiangfeng Zeng et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Hardware & Architecture

E-Eye: Hidden Electronics Recognition through mmWave Nonlinear Effects

Zhengxiong Li et al.

SENSYS'18: PROCEEDINGS OF THE 16TH CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS (2018)

Proceedings Paper Computer Science, Theory & Methods

Detecting Wireless Spy Cameras Via Stimulating and Probing

Tian Liu et al.

MOBISYS'18: PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES (2018)

Article Computer Science, Information Systems

Traffic Analysis of Encrypted Messaging Services: Apple iMessage and Beyond

Scott E. Coull et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2014)

Article Geochemistry & Geophysics

Through-the-Wall Sensing of Personnel Using Passive Bistatic WiFi Radar at Standoff Distances

Kevin Chetty et al.

IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING (2012)

Article Women's Studies

Intimate partner violence, technology, and stalking

Cynthia Southworth et al.

VIOLENCE AGAINST WOMEN (2007)

Article Computer Science, Information Systems

Indoor location tracking using RSSI readings from a single Wi-Fi access point

G. V. Zaruba et al.

WIRELESS NETWORKS (2007)

Article Computer Science, Theory & Methods

Inferring Internet denial-of-service activity

David Moore et al.

ACM TRANSACTIONS ON COMPUTER SYSTEMS (2006)

Article Computer Science, Information Systems

LANDMARC: Indoor location sensing using active RFID

LM Ni et al.

WIRELESS NETWORKS (2004)

Article Computer Science, Artificial Intelligence

SPADE: An efficient algorithm for mining frequent sequences

MJ Zaki

MACHINE LEARNING (2001)