RIDS: Radio Intrusion Detection and Diagnosis System for Wireless Communications in Smart Environment
暂无分享,去创建一个
Vincent Nicomette | Mohamed Kaâniche | Eric Alata | Guillaume Auriol | Pierre-François Gimenez | Jonathan Roux
[1] Christopher W. Badenhop,et al. The Z-Wave routing protocol and its security implications , 2017, Comput. Secur..
[2] Adi Shamir,et al. IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[3] Allen Kent,et al. Machine literature searching X. Machine language; factors underlying its design and development , 1955 .
[4] Yann Bachy,et al. Smart-TV security: risk analysis and experiments on Smart-TV communication channels , 2018, Journal of Computer Virology and Hacking Techniques.
[5] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[6] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[7] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[8] Nils Ole Tippenhauer,et al. IoTScanner: Detecting Privacy Threats in IoT Neighborhoods , 2017, IoTPTS@AsiaCCS.
[9] Srdjan Capkun,et al. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars , 2010, NDSS.
[10] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[11] Sofie Pollin,et al. SAIFE: Unsupervised Wireless Spectrum Anomaly Detection with Interpretable Features , 2018, 2018 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).
[12] Moustafa Youssef,et al. CoSDEO 2016 Keynote: A decade later — Challenges: Device-free passive localization for wireless environments , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[13] Ahmad-Reza Sadeghi,et al. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[14] Vincent Nicomette,et al. RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach , 2018, 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA).
[15] Henri Nurminen,et al. A Survey on Wireless Transmitter Localization Using Signal Strength Measurements , 2017, Wirel. Commun. Mob. Comput..
[16] Timothy J. O'Shea,et al. Recurrent Neural Radio Anomaly Detection , 2016, ArXiv.
[17] Yuval Elovici,et al. Detection of Unauthorized IoT Devices Using Machine Learning Techniques , 2017, ArXiv.
[18] Yi Tay,et al. Deep Learning based Recommender System: A Survey and New Perspectives , 2018 .
[19] Ron J. Weiss,et al. Unsupervised Speech Representation Learning Using WaveNet Autoencoders , 2019, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[20] Takehisa Yairi,et al. Anomaly Detection Using Autoencoders with Nonlinear Dimensionality Reduction , 2014, MLSDA'14.
[21] Aaron Schulman,et al. SweepSense: Sensing 5 GHz in 5 Milliseconds with Low-cost Radios , 2019, NSDI.
[22] F. Golatowski,et al. Weighted Centroid Localization in Zigbee-based Sensor Networks , 2007, 2007 IEEE International Symposium on Intelligent Signal Processing.
[23] Wali Khan Mashwani,et al. A survey on intrusion detection and prevention in wireless ad-hoc networks , 2020, J. Syst. Archit..
[24] Dawn Song,et al. Smart Locks: Lessons for Securing Commodity Internet of Things Devices , 2016, AsiaCCS.
[25] Yunsick Sung. Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators , 2016, Entropy.
[26] Luca Benini,et al. Anomaly Detection using Autoencoders in High Performance Computing Systems , 2018, DDC@AI*IA.
[27] Chao Li,et al. Anomaly detection of spectrum in wireless communication via deep auto-encoders , 2017, The Journal of Supercomputing.
[28] Yi Zhou,et al. Understanding the Mirai Botnet , 2017, USENIX Security Symposium.
[29] Adi Shamir,et al. Extended Functionality Attacks on IoT Devices: The Case of Smart Lights , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[30] Jeffrey M. Voas,et al. Learning Internet-of-Things Security "Hands-On" , 2016, IEEE Security & Privacy.
[31] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.