{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:54:46Z","timestamp":1730210086440,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,5]]},"DOI":"10.1109\/comsnets51098.2021.9352743","type":"proceedings-article","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T10:11:22Z","timestamp":1613729482000},"page":"59-63","source":"Crossref","is-referenced-by-count":0,"title":["IoTPerimeter: A Passive Fingerprinting of Smart Environment using Graph-based Features"],"prefix":"10.1109","author":[{"given":"Priyanka Rushikesh","family":"Chaudhary","sequence":"first","affiliation":[{"name":"Birla Institute of Technology and Science Pilani (BITS),Computer Science and Information Systems(CSIS),Hyderabad,India"}]},{"given":"Rajib Ranjan","family":"Maiti","sequence":"additional","affiliation":[{"name":"Birla Institute of Technology and Science Pilani (BITS),Computer Science and Information Systems(CSIS),Hyderabad,India"}]}],"member":"263","reference":[{"key":"ref4","first-page":"2177","article-title":"Iot sentinel: Automated device-type identification for security enforcement in iot","author":"miettinen","year":"2017","journal-title":"IEEE ICDCS"},{"key":"ref3","article-title":"Detection of unauthorized iot devices using machine learning techniques","volume":"abs 1709 4647","author":"meidan","year":"2017","journal-title":"CoRR"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2018.8711005"},{"key":"ref6","article-title":"A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic","author":"apthorpe","year":"2017","journal-title":"arXiv preprint arXiv 1705 06805"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2863244"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019878"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3314148.3314352"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346821"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.05.012"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116438"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s12530-020-09347-0"},{"key":"ref1","first-page":"1","article-title":"Classifying iot devices in smart environments using network traffic characteristics","author":"sivanathan","year":"2018","journal-title":"IEEE Transactions on Mobile Computing"}],"event":{"name":"2021 International Conference on COMmunication Systems & NETworkS (COMSNETS)","start":{"date-parts":[[2021,1,5]]},"location":"Bangalore, India","end":{"date-parts":[[2021,1,9]]}},"container-title":["2021 International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9352735\/9352808\/09352743.pdf?arnumber=9352743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T11:15:04Z","timestamp":1643282104000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9352743\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,5]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/comsnets51098.2021.9352743","relation":{},"subject":[],"published":{"date-parts":[[2021,1,5]]}}}