Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis, International Journal of Digital Evidence, vol.2, issue.3, pp.1-5, 2004. ,
Extracting concepts from file names; a new file clustering criterion, Proceedings of the 20th International Conference on Software Engineering, 1998. ,
DOI : 10.1109/ICSE.1998.671105
URL : http://www.csi.uottawa.ca/~tcl/papers/ICSE/ICSE98Anquetil.pdf
Automated Classification and Analysis of Internet Malware, International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2007. ,
DOI : 10.1007/978-3-540-74320-0_10
Leveraging USB to Establish Host Identity Using Commodity Devices, Proceedings 2014 Network and Distributed System Security Symposium, 2014. ,
DOI : 10.14722/ndss.2014.23238
URL : http://ix.cs.uoregon.edu/~butler/pubs/ndss14.pdf
Pattern Recognition and Machine Learning, Machine Learning, 2006. ,
Selection of relevant features and examples in machine learning, Artificial Intelligence, vol.97, issue.1-2, pp.245-271, 1997. ,
DOI : 10.1016/S0004-3702(97)00063-5
Fingerprinting Web Application Platforms by Variations in PNG Implementations, 2014. ,
Performance Evaluation of Computer and Communication Systems, 2011. ,
DOI : 10.1201/b16328
Towards Automated Dynamic Analysis for Linux-based Embedded Firmware, Proceedings 2016 Network and Distributed System Security Symposium, 2016. ,
DOI : 10.14722/ndss.2016.23415
A Large-Scale Analysis of the Security of Embedded Firmwares, USENIX Security Symposium, 2014. ,
Automated Dynamic Firmware Analysis at Scale, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ASIA CCS '16, 2016. ,
DOI : 10.1109/PST.2014.6890946
Identifying unique devices through wireless fingerprinting, Proceedings of the first ACM conference on Wireless network security , WiSec '08, 2008. ,
DOI : 10.1145/1352533.1352542
URL : http://www.cs.berkeley.edu/~chiayuan/pubs/wireless_fingerprinting_wisec08.pdf
A few useful things to know about machine learning, Communications of the ACM, vol.55, issue.10, pp.78-87, 2012. ,
DOI : 10.1145/2347736.2347755
Free Riding in Peer-to-Peer Networks, IEEE Internet Computing, vol.13, issue.2, pp.92-98, 2009. ,
DOI : 10.1109/MIC.2009.33
Sensor and Data Fusion: A Tool for Information Assessment and Decision Making, 2004. ,
DOI : 10.1117/3.563340
Remote Physical Device Fingerprinting. Dependable and Secure Computing, IEEE Transactions on, vol.2, issue.2, pp.93-108, 2005. ,
DOI : 10.1109/sp.2005.18
URL : http://www.cs.washington.edu/homes/yoshi/papers/PDF/KoBrCl05PDF-lowres.pdf
Identifying Almost Identical Files Using Context Triggered Piecewise Hashing. Digital investigation, pp.91-97, 2006. ,
DOI : 10.1016/j.diin.2006.06.015
Evidence of Advanced Persistent Threat: A case study of malware for political espionage, 2011 6th International Conference on Malicious and Unwanted Software, 2011. ,
DOI : 10.1109/MALWARE.2011.6112333
Owning Your Home Network: Router Security Revisited, Web 2.0 Security and Privacy (W2SP), 2015. ,
IoTPOT: analysing the rise of IoT compromises, USENIX Workshop on Offensive Technologies (WOOT), 2015. ,
Learning and Classification of Malware Behavior, Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2008. ,
DOI : 10.1007/978-3-540-70542-0_6
A Machine Learning Approach to Android Malware Detection, 2012 European Intelligence and Security Informatics Conference, 2012. ,
DOI : 10.1109/EISIC.2012.34
Short Paper: TLS Ecosystems in Networked Devices vs. Web Servers, International Conference on Financial Cryptography and Data Security, p.2017 ,
HTTP Fingerprinting Advanced Assessment Techniques, Blackhat, 2003. ,
Understanding Machine Learning: From Theory to Algorithms, 2014. ,
DOI : 10.1017/CBO9781107298019
B@bel: Leveraging Email Delivery for Spam Mitigation, Usenix Security, 2012. ,
Function length as a tool for malware classification, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), 2008. ,
DOI : 10.1109/MALWARE.2008.4690860
Identify Technology on Websites ,
Automated generation of models for fast and precise detection of HTTP-based malware, 2014 Twelfth Annual International Conference on Privacy, Security and Trust, 2014. ,
DOI : 10.1109/PST.2014.6890946