Author of the publication

"Sensing" the IoT network: Ethical capture of domestic IoT network traffic: poster abstract.

, , , , , , , and . SenSys, page 406-407. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contact-Aware Opportunistic Data Forwarding in Disconnected LoRaWAN Mobile Networks., , , , and . ICDCS, page 574-583. IEEE, (2020)When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers., , , , , and . Proc. Priv. Enhancing Technol., 2020 (4): 255-276 (2020)Optimal processing node discovery algorithm for distributed computing in IoT., , and . IOT, page 72-79. IEEE, (2015)"Sensing" the IoT network: Ethical capture of domestic IoT network traffic: poster abstract., , , , , , , and . SenSys, page 406-407. ACM, (2019)Efficient In-Network Processing for a Hardware-Heterogeneous IoT., , and . IOT, page 93-101. ACM, (2016)A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild., , , , , , , and . Internet Measurement Conference, page 87-100. ACM, (2020)Anonymising Video Data Collection at the Edge Using DeepDish., , and . HPSR, page 7-13. IEEE, (2023)Towards Precision Control in Constrained Wireless Cyber-Physical Systems., , and . IoT 360 (2), volume 170 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 292-306. (2015)The Case for Retraining of ML Models for IoT Device Identification at the Edge., , , , , , , and . CoRR, (2020)Blocking without Breaking: Identification and Mitigation of Non-Essential IoT Traffic., , , , , and . CoRR, (2021)