{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:35:14Z","timestamp":1730223314991,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/giots49054.2020.9119507","type":"proceedings-article","created":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T22:57:23Z","timestamp":1592434643000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications"],"prefix":"10.1109","author":[{"given":"Felix","family":"Klement","sequence":"first","affiliation":[]},{"given":"Henrich C.","family":"Pohls","sequence":"additional","affiliation":[]},{"given":"Korbinian","family":"Spielvogel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1169","article-title":"All things considered: An analysis of iot devices on home networks","author":"kumar","year":"2019","journal-title":"28th USENIX Security Symposium (USENIX Security 19)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.Congress.2013.39"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247492"},{"journal-title":"Security The iot is destroying legal concept of privacy warns in-depth report","year":"2020","author":"middleton","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.01.033"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/URTC.2017.8284179"},{"journal-title":"IoT Devices Recognition Through Network Traffic Analysis","year":"2018","author":"shahid","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSSA.2017.8272897"},{"key":"ref18","article-title":"Sepia: Privacy-preserving aggregation of multi-domain network events and statistics","volume":"1","author":"burkhart","year":"2010","journal-title":"Network"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35259-6_13"},{"journal-title":"How mitmproxy works","year":"2020","author":"proxy","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50011-9_16"},{"journal-title":"A wrapper for nmap written in elixir","year":"2020","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2016.7792434"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2019.8766399"},{"journal-title":"Virustotal homepage","year":"2020","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.4"},{"key":"ref8","article-title":"RERUM: Building a Reliable IoT upon Privacy- and Security- enabled Smart Objects","author":"p\u00f6hls","year":"2014","journal-title":"Proc of the IEEE WCNC 2014 Workshop on Internet of Things Communications and Technologies"},{"key":"ref7","article-title":"A Privacy Engineering Framework for the Internet of Things","author":"kung","year":"2016","journal-title":"Proc of 9th edition of the intl conference Computers Privacy and Data Protection 2016 (CDPD 2016)"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"2758","DOI":"10.1166\/jctn.2018.7535","article-title":"Internet of things based digital lock system","volume":"15","author":"sennan","year":"2018","journal-title":"Journal of Computational and Theoretical Nanoscience"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1056-0_61"},{"key":"ref1","article-title":"Smart door lock and lighting system using internet of things","author":"satoskar","year":"2018","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39945-3_3"},{"journal-title":"Iot inspector is a standalone desktop app that lets you analyze your home iot devices it allows you to determine","year":"2020","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71549-8_27"},{"journal-title":"Packet crafting for python2 and python3","year":"2020","key":"ref24"},{"journal-title":"Arpspoof - intercept packets on a switched lan","year":"2014","key":"ref23"},{"journal-title":"Python library to scan local network for services and devices","year":"2020","key":"ref26"},{"article-title":"Iot inspector: Crowdsourcing labeled network traffic from smart home devices at scale","year":"2019","author":"huang","key":"ref25"}],"event":{"name":"2020 Global Internet of Things Summit (GIoTS)","start":{"date-parts":[[2020,6,3]]},"location":"Dublin, Ireland","end":{"date-parts":[[2020,6,3]]}},"container-title":["2020 Global Internet of Things Summit (GIoTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9116578\/9119496\/09119507.pdf?arnumber=9119507","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:43:54Z","timestamp":1656344634000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9119507\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/giots49054.2020.9119507","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}