C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, Ddos in the iot: Mirai and other botnets, vol.50, p.2017

. Radware, Brickerbot results in pdos attack, 2017.

A. K. Das, P. H. Pathak, C. Chuah, and P. Mohapatra, Uncovering privacy leakage in ble network traffic of wearable fitness trackers, 17th International Workshop on Mobile Computing Systems and Applications (HotMobile), 2016.

N. Apthorpe, D. Reisman, S. Sundaresan, A. Narayanan, and N. Feamster, Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic, CoRR, 2017.

V. Srinivasan, J. Stankovic, and K. Whitehouse, Protecting your daily in-home activity information from a wireless snooping attack, Proceedings of the 10th international conference on Ubiquitous computing, pp.202-211, 2008.

A. Acar, H. Fereidooni, T. Abera, A. K. Sikder, M. Miettinen et al., Peek-a-boo: I see your smart home activities, 2018.

M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A. Sadeghi et al., Iot sentinel: Automated device-type identification for security enforcement in iot, 37th International Conference on Distributed Computing Systems (ICDCS), 2017.

T. D. Nguyen, S. Marchal, M. Miettinen, M. H. Dang, N. Asokan et al., Dïot: A crowdsourced self-learning approach for detecting compromised iot devices, CoRR, 2018.

B. Bezawada, M. Bachani, J. Peterson, H. Shirazi, I. Ray et al., Iotsense: Behavioral fingerprinting of iot devices, CoRR, 2018.

L. Bernaille and R. Teixeira, Early recognition of encrypted applications, Passive and Active Network Measurement (PAM), 2007.
URL : https://hal.archives-ouvertes.fr/hal-01097556

M. Liberatore and B. N. Levine, Inferring the source of encrypted http connections, Conference on Computer and Communications Security (CCS), 2006.

W. M. Shbair, T. Cholez, J. François, and I. Chrisment, A Multi-Level Framework to Identify HTTPS Services, Network Operations and Management Symposium, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01273160

P. Brissaud, J. Francois, I. Chrisment, T. Cholez, and O. Bettan, Passive Monitoring of HTTPS Service Use, 14th International Conference on Network and Service Management (CNSM), 2018.
URL : https://hal.archives-ouvertes.fr/hal-01943936

A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, Blockchain for iot security and privacy: The case study of a smart home, International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops, 2017.

C. Perera, C. Mccormick, A. K. Bandara, B. A. Price, and B. Nuseibeh, Privacy-by-design framework for assessing internet of things applications and platforms, 6th International Conference on the Internet of Things (IoT), 2016.
URL : https://hal.archives-ouvertes.fr/hal-01364827

J. W. Wright, The change-making problem, J. ACM, vol.22, issue.1, pp.125-128, 1975.

,