SSRules: Make it Easier to Write and Check Automation Rules for Smart Home Systems

王博, 张昱, 耿佳宁, 李向阳 - Journal of Software, 2021 - jos.org.cn
智能家居赋予家庭设备以智能, 受到用户的广泛欢迎. 由于用户需求不同, 服务提供商采用 “触发-
动作” 编程 (TAP) 模式以支持用户定制规则. 然而, 现在 TAP 编程和智能家居执行引擎中流行的 …

[PDF][PDF] CPS Device-class Identification via Behavioral Fingerprinting: From Theory to Practice

CPS Server - ieeexplore.ieee.org
Cyber-Physical Systems (CPS) utilize different devices to collect sensitive data,
communicate with other systems, and monitor essential processes in critical infrastructure …

Analysing privacy concerns in smartcameras: in correlation with GDPR and Privacy by Design

S Floderus, V Tewolde - 2021 - diva-portal.org
Background. The right to privacy is every persons right, data regulation laws suchas the
GDPR and privacy preserving concepts like Privacy by Design (PbD) aid inthis matter. IoT …

Novel Attacks and Defenses for Enterprise Internet-of-Things (E-IoT) Systems

LC Puche Rondon - 2021 - digitalcommons.fiu.edu
This doctoral dissertation expands upon the field of Enterprise Internet-of-Things (E-IoT)
systems, one of the most ubiquitous and under-researched fields of smart systems. E-IoT …

[PDF][PDF] Feltáró jellegű kutatás az egyének biztonsági szokásairól

B Gerda, M Lajos - VÁLLALKOZÁSFEJLESZTÉS A XXI … - old2.kgk.uni-obuda.hu
Napjainkban a különböző digitális és okoseszközök az életünk szerves részét képezik. A
technológiai innovációnak köszönhetően ezek az eszközök folyamatosan fejlődnek …

Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another One

D Mohaisen, S Chen - … on Trust, Privacy and Security in …, 2019 - ieeexplore.ieee.org
Machine learning techniques are finding many applications in computer systems, including
many tasks that require decision making: network optimization, quality of service assurance …

[PDF][PDF] Poster: Defining Actionable Rules for Verifying IoT Security

KE Ibrahim, S Majumdar, D Bastos, A Singhal - tsapps.nist.gov
The Internet of Things (IoT) is being widely adopted in recent years. Security, however, has
lagged behind, as evidenced by the increasing number of attacks that use IoT devices (eg …

Towards Secure and Reliable IoT Applications

G Tan - Proceedings of the 2nd International ACM Workshop …, 2019 - dl.acm.org
The growth of commodity IoT devices that integrate physical processes with digital systems
have changed the way we live, play, and work. Yet existing IoT platforms cannot help …