A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

How machine learning changes the nature of cyberattacks on IoT networks: A survey

E Bout, V Loscri, A Gallais - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has continued gaining in popularity and importance in everyday
life in recent years. However, this development does not only present advantages. Indeed …

[HTML][HTML] The digital harms of smart home devices: A systematic literature review

D Buil-Gil, S Kemp, S Kuenzel, L Coventry… - Computers in Human …, 2023 - Elsevier
The connection of home electronic devices to the internet allows remote control of physical
devices and involves the collection of large volumes of data. With the increase in the uptake …

On the use of artificial intelligence to deal with privacy in IoT systems: A systematic literature review

G Giordano, F Palomba, F Ferrucci - Journal of Systems and Software, 2022 - Elsevier
Abstract The Internet of Things (IoT) refers to a network of Internet-enabled devices that can
make different operations, like sensing, communicating, and reacting to changes arising in …

[HTML][HTML] IoT forensics: current perspectives and future directions

AA Ahmed, K Farhan, WA Jabbar, A Al-Othmani… - Sensors, 2024 - mdpi.com
The Internet of Things forensics is a specialised field within digital forensics that focuses on
the identification of security incidents, as well as the collection and analysis of evidence with …

An iot device identification method based on semi-supervised learning

L Fan, S Zhang, Y Wu, Z Wang, C Duan… - … on Network and …, 2020 - ieeexplore.ieee.org
With the rapid proliferation of IoT devices, device management and network security are
becoming significant challenges. Knowing how many IoT devices are in the network and …

Learning autoencoder ensembles for detecting malware hidden communications in IoT ecosystems

N Cassavia, L Caviglione, M Guarascio… - Journal of Intelligent …, 2024 - Springer
Modern IoT ecosystems are the preferred target of threat actors wanting to incorporate
resource-constrained devices within a botnet or leak sensitive information. A major research …

Deep learning model for fine-grained aspect-based opinion mining

AR Abas, I El-Henawy, H Mohamed, A Abdellatif - IEEE Access, 2020 - ieeexplore.ieee.org
Despite the great manufactures' efforts to achieve customer satisfaction and improve their
performance, social media opinion mining is still on the fly a big challenge. Current opinion …

EvoIoT: An evolutionary IoT and non-IoT classification model in open environments

L Fan, L He, E Dong, J Yang, C Li, J Lin, Z Wang - Computer Networks, 2022 - Elsevier
IoT device identification is essential for both device asset management and security
management. IoT device identification in open environments is the key to its application in …

Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms

P Yadav, A Feraudo, B Arief, SF Shahandashti… - Proceedings of the 2nd …, 2020 - dl.acm.org
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be
able to fingerprint them, for example in order to detect if there are misbehaving or even …