Behavioral Fingerprinting of IoT Devices
暂无分享,去创建一个
Indrajit Ray | Indrakshi Ray | Bezawada Bruhadeshwar | Hossein Shirazi | Jordan Peterson | Maalvika Bachani | I. Ray | H. Shirazi | Bruhadeshwar Bezawada | I. Ray | Jordan Peterson | Maalvika Bachani
[1] Sergey Bratus,et al. Active behavioral fingerprinting of wireless devices , 2008, WiSec '08.
[2] Wouter Joosen,et al. Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication , 2016, ESSoS.
[3] Raheem A. Beyah,et al. Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems , 2016, NDSS.
[4] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[5] Peter L. Bartlett,et al. Boosting Algorithms as Gradient Descent , 1999, NIPS.
[6] Lior Rokach,et al. Data Mining with Decision Trees - Theory and Applications , 2007, Series in Machine Perception and Artificial Intelligence.
[7] Alex X. Liu,et al. High-Speed Flow Nature Identification , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.
[8] Amir R. Khakpour,et al. An Information-Theoretical Approach to High-Speed Flow Nature Identification , 2013, IEEE/ACM Transactions on Networking.
[9] Andreas Holzinger,et al. Data Mining with Decision Trees: Theory and Applications , 2015, Online Inf. Rev..
[10] J. Friedman. Stochastic gradient boosting , 2002 .
[11] Ke Gao,et al. A passive approach to wireless device fingerprinting , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[12] Chrisil Arackaparambil,et al. On the reliability of wireless fingerprinting using clock skews , 2010, WiSec '10.
[13] Damon McCoy,et al. Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting , 2006, USENIX Security Symposium.
[14] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[15] Nils Ole Tippenhauer,et al. IoTScanner: Detecting Privacy Threats in IoT Neighborhoods , 2017, IoTPTS@AsiaCCS.
[16] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[17] R. Lippmann,et al. Passive Operating System Identification From TCP / IP Packet Headers * , 2003 .
[18] Ahmad-Reza Sadeghi,et al. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[19] Raheem Beyah,et al. GTID: A Technique for Physical Device and Device Type Fingerprinting , 2015, IEEE Transactions on Dependable and Secure Computing.
[20] Radu State,et al. Automated Behavioral Fingerprinting , 2009, RAID.
[21] Felix C. Freiling,et al. Fingerprinting Mobile Devices Using Personalized Configurations , 2016, Proc. Priv. Enhancing Technol..
[22] Sneha Kumar Kasera,et al. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2010, IEEE Transactions on Mobile Computing.
[23] Raheem A. Beyah,et al. A passive technique for fingerprinting wireless devices with Wired-side Observations , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[24] Srinivasan Seshan,et al. 802.11 user fingerprinting , 2007, MobiCom '07.
[25] Nils Ole Tippenhauer,et al. IoTScanner: Detecting Privacy Threats in IoT Neighborhoods , 2017, IoTPTS@AsiaCCS.
[26] Alvin F. Martin,et al. The DET curve in assessment of detection task performance , 1997, EUROSPEECH.