Peeves: Physical event verification in smart homes

S Birnbach, S Eberz - 2019 - ora.ox.ac.uk
This report contains the documentation of the smart home event and sensor dataset
collected and used in the paper” Peeves: Physical Event Verification in Smart Homes”[1] …

Blocking without breaking: Identification and mitigation of non-essential iot traffic

AM Mandalari, DJ Dubois, R Kolcun… - arXiv preprint arXiv …, 2021 - arxiv.org
Despite the prevalence of Internet of Things (IoT) devices, there is little information about the
purpose and risks of the Internet traffic these devices generate, and consumers have limited …

Scalable analysis of interaction threats in iot systems

M Alhanahnah, C Stevens, H Bagheri - Proceedings of the 29th ACM …, 2020 - dl.acm.org
The ubiquity of Internet of Things (IoT) and our growing reliance on IoT apps are leaving us
more vulnerable to safety and security threats than ever before. Many of these threats are …

A Comprehensive Survey of Security Issues of Smart Home System:“Spear” and “Shields,” Theory and Practice

J Yang, L Sun - IEEE Access, 2022 - ieeexplore.ieee.org
The rapid development and wide application of the Internet of Things (IoT) and sensor
technologies have produced good opportunities for the development of IoT-based smart …

Delay wreaks havoc on your smart home: Delay-based automation interference attacks

H Chi, C Fu, Q Zeng, X Du - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
With the proliferation of Internet of Things (IoT) devices and platforms, it becomes a trend
that IoT devices associated with different IoT platforms coexist in a smart home …

Amir: Active multimodal interaction recognition from video and network traffic in connected environments

S Liu, T Mangla, T Shaowang, J Zhao… - Proceedings of the …, 2023 - dl.acm.org
Activity recognition using video data is widely adopted for elder care, monitoring for safety
and security, and home automation. Unfortunately, using video data as the basis for activity …

On the use of artificial intelligence to deal with privacy in IoT systems: A systematic literature review

G Giordano, F Palomba, F Ferrucci - Journal of Systems and Software, 2022 - Elsevier
Abstract The Internet of Things (IoT) refers to a network of Internet-enabled devices that can
make different operations, like sensing, communicating, and reacting to changes arising in …

When a RF beats a CNN and GRU, together—A comparison of deep learning and classical machine learning approaches for encrypted malware traffic classification

A Lichy, O Bader, R Dubin, A Dvir, C Hajaj - Computers & Security, 2023 - Elsevier
Internet traffic classification plays a crucial role in Quality of Experience (QoE), Quality of
Services (QoS), intrusion detection, and traffic-trend analyses. While there is no theoretical …

A practical model based on anomaly detection for protecting medical IoT control services against external attacks

L Fang, Y Li, Z Liu, C Yin, M Li… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The application of the Internet of Things (IoT) in medical field has brought unprecedented
convenience to human beings. However, attackers can use device configuration …

Can we classify an iot device using tcp port scan?

A Sivanathan, HH Gharakheili… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
The explosion in the number of Internet-of-Things connecting to smart environments has
increased the demand for obtaining visibility into these devices among network operators …