N-baiot—network-based detection of iot botnet attacks using deep autoencoders Y Meidan, M Bohadana, Y Mathov, Y Mirsky, A Shabtai, D Breitenbacher, ... IEEE Pervasive Computing 17 (3), 12-22, 2018 | 1314 | 2018 |
ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis Y Meidan, M Bohadana, A Shabtai, JD Guarnizo, M Ochoa, ... Proceedings of the symposium on applied computing, 506-509, 2017 | 477 | 2017 |
Detection of unauthorized IoT devices using machine learning techniques Y Meidan, M Bohadana, A Shabtai, M Ochoa, NO Tippenhauer, ... arXiv preprint arXiv:1709.04647, 2017 | 280 | 2017 |
Security testbed for Internet-of-Things devices S Siboni, V Sachidananda, Y Meidan, M Bohadana, Y Mathov, S Bhairav, ... IEEE transactions on reliability 68 (1), 23-44, 2018 | 205 | 2018 |
Reverse engineering IoT devices: Effective techniques and methods O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren IEEE Internet of Things Journal 5 (6), 4965-4976, 2018 | 48 | 2018 |
Opening Pandora’s box: effective techniques for reverse engineering IoT devices O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren Smart Card Research and Advanced Applications: 16th International Conference …, 2018 | 39 | 2018 |
Detection of unauthorized IoT devices using machine learning techniques. arXiv 2017 Y Meidan, M Bohadana, A Shabtai, M Ochoa, NO Tippenhauer, ... arXiv preprint arXiv:1709.04647, 0 | 17 | |
METHOD AND APPARATUS FOR DETERMINING AN IDENTITY OF AN UNKNOWN INTERNET-OF-THINGS (IoT) DEVICE IN A COMMUNICATION NETWORK M Ochoa, NO Tippenhauer, J Guarnizo, Y Elovici, A Shabtai, M Bohadana, ... US Patent App. 16/489,691, 2020 | 13 | 2020 |
Detecting Compromised IoT Using Network Traffic Analysis M Bohadana Ben-Gurion University of the Negev, Faculty of Engineering Sciences …, 2017 | | 2017 |