Machine learning-powered encrypted network traffic analysis: A comprehensive survey
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …
and gleaning valuable information from network traffic. It can be applied in various fields …
A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
A survey on internet of things security: Requirements, challenges, and solutions
Abstract Internet of Things (IoT) is one of the most promising technologies that aims to
enhance humans' quality of life (QoL). IoT plays a significant role in several fields such as …
enhance humans' quality of life (QoL). IoT plays a significant role in several fields such as …
A survey of compiler testing
Virtually any software running on a computer has been processed by a compiler or a
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …
A survey on IoT-enabled home automation systems: Attacks and defenses
With recent advances in communication technologies and Internet of Things (IoT)
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …
Packet-level signatures for smart home devices
mart home devices are vulnerable to passive inference attacks based on network traffic,
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …
{HAWatcher}:{Semantics-Aware} anomaly detection for appified smart homes
As IoT devices are integrated via automation and coupled with the physical environment,
anomalies in an appified smart home, whether due to attacks or device malfunctions, may …
anomalies in an appified smart home, whether due to attacks or device malfunctions, may …
Securing consumer IoT in the smart home: Architecture, challenges, and countermeasures
The consumer Internet of Things (IoT) platforms are gaining high popularity. However, due to
the open nature of wireless communications, smart home platforms are facing many new …
the open nature of wireless communications, smart home platforms are facing many new …
HomeSnitch: Behavior transparency and control for smart home IoT devices
The widespread adoption of smart home IoT devices has led to a broad and heterogeneous
market with flawed security designs and privacy concerns. While the quality of IoT device …
market with flawed security designs and privacy concerns. While the quality of IoT device …
[HTML][HTML] The digital harms of smart home devices: A systematic literature review
The connection of home electronic devices to the internet allows remote control of physical
devices and involves the collection of large volumes of data. With the increase in the uptake …
devices and involves the collection of large volumes of data. With the increase in the uptake …