, Ddos in the iot: Mirai and other botnets, vol.50, p.2017
Brickerbot results in pdos attack, 2017. ,
Uncovering privacy leakage in ble network traffic of wearable fitness trackers, 17th International Workshop on Mobile Computing Systems and Applications (HotMobile), 2016. ,
Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic, CoRR, 2017. ,
Protecting your daily in-home activity information from a wireless snooping attack, Proceedings of the 10th international conference on Ubiquitous computing, pp.202-211, 2008. ,
Peek-a-boo: I see your smart home activities, 2018. ,
Iot sentinel: Automated device-type identification for security enforcement in iot, 37th International Conference on Distributed Computing Systems (ICDCS), 2017. ,
Dïot: A crowdsourced self-learning approach for detecting compromised iot devices, CoRR, 2018. ,
Iotsense: Behavioral fingerprinting of iot devices, CoRR, 2018. ,
Early recognition of encrypted applications, Passive and Active Network Measurement (PAM), 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-01097556
Inferring the source of encrypted http connections, Conference on Computer and Communications Security (CCS), 2006. ,
A Multi-Level Framework to Identify HTTPS Services, Network Operations and Management Symposium, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01273160
Passive Monitoring of HTTPS Service Use, 14th International Conference on Network and Service Management (CNSM), 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01943936
Blockchain for iot security and privacy: The case study of a smart home, International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops, 2017. ,
Privacy-by-design framework for assessing internet of things applications and platforms, 6th International Conference on the Internet of Things (IoT), 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01364827
The change-making problem, J. ACM, vol.22, issue.1, pp.125-128, 1975. ,
,