{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:12:05Z","timestamp":1763017925118,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/infocom.2018.8486369","type":"proceedings-article","created":{"date-parts":[[2018,10,18]],"date-time":"2018-10-18T18:45:36Z","timestamp":1539888336000},"page":"1493-1501","source":"Crossref","is-referenced-by-count":45,"title":["A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT"],"prefix":"10.1109","author":[{"given":"Yizhen","family":"Jia","sequence":"first","affiliation":[]},{"given":"Yinhao","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Jiguo","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xiuzhen","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Zhenkai","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Zhiguo","family":"Wan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2017","journal-title":"Google protobuf","key":"ref10"},{"key":"ref11","article-title":"You are what you like! information leakage through users interests","author":"chaabane","year":"2012","journal-title":"NDSS"},{"key":"ref12","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions, and reversals","volume":"10","author":"levenshtein","year":"1966","journal-title":"Soviet Physics Doklady"},{"year":"2017","journal-title":"Pcap-wikipedia","key":"ref13"},{"year":"2017","journal-title":"pypcapfile","key":"ref14"},{"year":"2017","journal-title":"The Google Maps Geolocation Api","key":"ref15"},{"year":"2017","journal-title":"WifiManager","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/2976749.2978406"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1137\/1.9781611970104"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1142\/9097","author":"rokach","year":"2014","journal-title":"Data Mining with Decision Trees Theory and Applications"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/CIS.2013.145"},{"year":"2015","journal-title":"Critical flaw ided in zigbee smart home devices","key":"ref27"},{"year":"2017","journal-title":"How safe is your data with the iot and smart devices?","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/SP.2017.14"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/SOCA.2014.58"},{"year":"2017","journal-title":"Google Home","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/SP.2011.26"},{"year":"2017","journal-title":"Trend of topic internet of things","key":"ref2"},{"year":"2017","journal-title":"Tp-link lbl00","key":"ref9"},{"key":"ref1","first-page":"14","article-title":"The internet of things in an enterprise context","author":"haller","year":"2008","journal-title":"Future Internet Symposium"},{"key":"ref20","first-page":"60","article-title":"All your sessions are belong to us: Investigating authenticator leakage through backup channels on android","author":"bai","year":"2016","journal-title":"ICECCS"},{"key":"ref22","article-title":"A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic","author":"apthorpe","year":"2016","journal-title":"Workshop on Data and Algorithmic Transparency"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/MNET.2011.5772059"},{"key":"ref24","first-page":"95","article-title":"A large-scale analysis of the security of embedded firmwares","author":"costin","year":"2014","journal-title":"USENIX Security Symposium"},{"key":"ref23","first-page":"2617","article-title":"Side-channel information leakage of encrypted video streaming video surveillance systems","author":"li","year":"2016","journal-title":"IEEE INFOCOM"},{"key":"ref26","article-title":"Honey, im home!!-hacking z-wave home automation systems","author":"fouladi","year":"2013","journal-title":"Black Hat"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/SP.2016.44"}],"event":{"name":"IEEE INFOCOM 2018 - IEEE Conference on Computer Communications","start":{"date-parts":[[2018,4,16]]},"location":"Honolulu, HI","end":{"date-parts":[[2018,4,19]]}},"container-title":["IEEE INFOCOM 2018 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8464035\/8485803\/08486369.pdf?arnumber=8486369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T22:59:00Z","timestamp":1598223540000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8486369\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/infocom.2018.8486369","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}