暂无分享,去创建一个
Yuval Elovici | Asaf Shabtai | Nils Ole Tippenhauer | Martín Ochoa | Yair Meidan | Michael Bohadana | Juan David Guarnizo | A. Shabtai | Y. Elovici | Martín Ochoa | Yair Meidan | Michael Bohadana | J. Guarnizo
[1] John Thielens. Why APIs are central to a BYOD security strategy , 2013, Netw. Secur..
[2] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[3] Urs Gasser,et al. Don't Panic: Making Progress on the "Going Dark" Debate , 2016 .
[4] Nick Feamster,et al. A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic , 2017, ArXiv.
[5] Sachchidanand Singh,et al. Internet of Things (IoT): Security challenges, business opportunities & reference architecture for E-commerce , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[6] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[7] Leyla Bilge,et al. Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis , 2012, ACSAC '12.
[8] Ali A. Ghorbani,et al. Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection , 2007, Fifth Annual Conference on Communication Networks and Services Research (CNSR '07).
[9] Bill Morrow,et al. BYOD security challenges: control and protect your most sensitive data , 2012, Netw. Secur..
[10] Aiko Pras,et al. Flow whitelisting in SCADA networks , 2013, Int. J. Crit. Infrastructure Prot..
[11] Abdul Boztas,et al. Smart TV forensics: Digital traces on televisions , 2015, Digit. Investig..
[12] Lior Rokach,et al. Unknown malware detection using network traffic classification , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[13] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[14] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[15] Martín Casado,et al. The Effectiveness of Whitelisting: a User-Study , 2008, CEAS.
[16] 栄 久米原,et al. Wiresharkパケット解析リファレンス : Network Protocol Analyzer , 2009 .
[17] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[18] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[19] Mohd Taufik Abdullah,et al. A Review of Bring Your Own Device on Security Issues , 2015 .
[20] Katia Moskvitch. Securing IoT: In your smart home and your connected enterprise , 2017 .
[21] Riccardo Bonetto,et al. Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[22] Vijay Sivaraman,et al. Low-cost flow-based security solutions for smart-home IoT devices , 2016, International Workshop on Ant Colony Optimization and Swarm Intelligence.
[23] George C. Hadjichristofi,et al. Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).
[24] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[25] Ramjee Prasad,et al. Object Classification based Context Management for Identity Management in Internet of Things , 2013 .
[26] Wenke Lee,et al. Botnet Detection: Countering the Largest Security Threat , 2010, Botnet Detection.
[27] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[28] Steffen Fries,et al. Managed Certificate Whitelisting – A Basis for Internet of Things Security in Industrial Automation Applications , 2014 .
[29] Ahmad-Reza Sadeghi,et al. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[30] W. Timothy Strayer,et al. Botnet Detection Based on Network Behavior , 2008, Botnet Detection.
[31] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[32] Yuval Elovici,et al. ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis , 2017, SAC.