Tracing Your Smart-Home Devices Conversations: A Real World IoT Traffic Data-Set
暂无分享,去创建一个
Georgios Spathoulas | Marios Anagnostopoulos | Brais Viaño | Javier Augusto-Gonzalez | G. Spathoulas | J. Augusto-Gonzalez | Brais Viaño | M. Anagnostopoulos
[1] Peng Liu,et al. The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved , 2018, IEEE Internet of Things Journal.
[2] Marco Sacco,et al. An ontology-based framework for a Less Invasive Domestic Management System (LIDoMS) , 2020, 2020 16th International Conference on Intelligent Environments (IE).
[3] Georgios Kambourakis,et al. A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks , 2020, Symmetry.
[4] Yuval Elovici,et al. Detection of Unauthorized IoT Devices Using Machine Learning Techniques , 2017, ArXiv.
[5] Mousa Al-Akhras,et al. WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks , 2016, J. Sensors.
[6] Arnab Raha,et al. Powering the Internet of Things , 2014, 2014 IEEE/ACM International Symposium on Low Power Electronics and Design (ISLPED).
[7] Farookh Khadeer Hussain,et al. Real time dataset generation framework for intrusion detection systems in IoT , 2020, Future Gener. Comput. Syst..
[8] Vijay Sivaraman,et al. Classifying IoT Devices in Smart Environments Using Network Traffic Characteristics , 2019, IEEE Transactions on Mobile Computing.
[9] Ricardo A. Calix,et al. Cyber Security Tool Kit (CyberSecTK): A Python Library for Machine Learning and Cyber Security , 2020, Inf..
[10] S. Evangelatos,et al. Detection of abnormal behavior in smart-home environments , 2019, 2019 4th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM).
[11] Georgios Kambourakis,et al. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.
[12] Michael Devetsikiotis,et al. BLEBeacon: A Real-Subject Trial Dataset from Mobile Bluetooth Low Energy Beacons , 2018, ArXiv.
[13] Dimitrios Tzovaras,et al. From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes , 2019, 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
[14] Virender Ranga,et al. Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT , 2019, Wireless Personal Communications.
[15] David Walker,et al. Incremental consistent updates , 2013, HotSDN '13.
[16] Dimitrios Tzovaras,et al. GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control , 2018, Euro-CYBERSEC.
[17] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[18] Huiru Zheng,et al. Human Activity Detection in Smart Home Environment with Self-Adaptive Neural Networks , 2008, 2008 IEEE International Conference on Networking, Sensing and Control.
[19] Josef Hallberg,et al. The homeML suite: shareable datasets for smart home environments , 2013 .
[20] Yaohui Jin,et al. Characterizing Home Network Traffic: An Inside View , 2012, WASA.
[21] Savvas Papagiannidis,et al. A systematic review of the smart home literature: A user perspective , 2019, Technological Forecasting and Social Change.
[22] Dimitrios Tzovaras,et al. A Lightweight Cyber-Security Defense Framework for Smart Homes , 2020, 2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA).