An overview of machine learning within embedded and mobile devices–optimizations and applications
Embedded systems technology is undergoing a phase of transformation owing to the novel
advancements in computer architecture and the breakthroughs in machine learning …
advancements in computer architecture and the breakthroughs in machine learning …
Machine learning techniques in emerging cloud computing integrated paradigms: A survey and taxonomy
Cloud computing offers Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and
Software as a Service (SaaS) to provide compute, network, and storage capabilities to the …
Software as a Service (SaaS) to provide compute, network, and storage capabilities to the …
Information exposure from consumer iot devices: A multidimensional, network-informed measurement approach
Internet of Things (IoT) devices are increasingly found in everyday homes, providing useful
functionality for devices such as TVs, smart speakers, and video doorbells. Along with their …
functionality for devices such as TVs, smart speakers, and video doorbells. Along with their …
Iot sentinel: Automated device-type identification for security enforcement in iot
M Miettinen, S Marchal, I Hafeez… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT
devices have become prominent. Several vendors are producing IP-connected devices for …
devices have become prominent. Several vendors are producing IP-connected devices for …
A survey on application of machine learning for Internet of Things
Abstract Internet of Things (IoT) has become an important network paradigm and there are
lots of smart devices connected by IoT. IoT systems are producing massive data and thus …
lots of smart devices connected by IoT. IoT systems are producing massive data and thus …
Behavioral fingerprinting of iot devices
B Bezawada, M Bachani, J Peterson, H Shirazi… - Proceedings of the …, 2018 - dl.acm.org
The Internet-of-Things (IoT) has brought in new challenges in device identification--what the
device is, and authentication--is the device the one it claims to be. Traditionally, the …
device is, and authentication--is the device the one it claims to be. Traditionally, the …
Systematic classification of side-channel attacks: A case study for mobile devices
R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
Identifying ecus using inimitable characteristics of signals in controller area networks
As the functions of vehicles are more computerized for the safety and convenience of
drivers, attack surfaces of vehicle are accordingly increasing. Many attack results have …
drivers, attack surfaces of vehicle are accordingly increasing. Many attack results have …
Browser fingerprinting: A survey
With this article, we survey the research performed in the domain of browser fingerprinting,
while providing an accessible entry point to newcomers in the field. We explain how this …
while providing an accessible entry point to newcomers in the field. We explain how this …
Sensors of smart devices in the internet of everything (IoE) era: big opportunities and massive doubts
Smart device industry allows developers and designers to embed different sensors,
processors, and memories in small‐size electronic devices. Sensors are added to enhance …
processors, and memories in small‐size electronic devices. Sensors are added to enhance …