{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:00:25Z","timestamp":1773518425533,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/infocomwkshps50562.2020.9162885","type":"proceedings-article","created":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T21:55:09Z","timestamp":1597096509000},"page":"854-859","source":"Crossref","is-referenced-by-count":25,"title":["IoT Event Classification Based on Network Traffic"],"prefix":"10.1109","author":[{"given":"Batyr","family":"Charyyev","sequence":"first","affiliation":[]},{"given":"Mehmet Hadi","family":"Gunes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116438"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148743"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2465839.2465847"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.12.020"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2926365"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2019.00016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.06.012"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355577"},{"key":"ref17","first-page":"2177","article-title":"IoT Sentinel: Automated device-type identification for security enforcement in IoT","author":"miettinen","year":"0","journal-title":"ICDCS"},{"key":"ref18","first-page":"1","article-title":"IoT Device Fingerprinting: Machine Learning based Encrypted Traffic Analysis","author":"nizar","year":"0","journal-title":"WCNC"},{"key":"ref19","first-page":"7","article-title":"Passive Inference of User Actions through IoT Gateway Encrypted Traffic Analysis","author":"junges","year":"0","journal-title":"2019 IFIP\/IEEE Symposium on Integrated Network and Service Management"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2865604"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2016.036"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462099"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2017.7969609"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.05.012"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3321408.3326671"},{"key":"ref5","article-title":"Is end-to-end integrity verification really end-to-end?","author":"alhussen","year":"0","journal-title":"Parallel Data Storage & Data Intensive Scalable Computing Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2019.00040"},{"key":"ref7","author":"bezawada","year":"0","journal-title":"IoT-Sense Behavioral Fingerprinting of IoT Devices"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761559"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.2966616"},{"key":"ref1","author":"acar","year":"2018","journal-title":"Peek-a-Boo I see your smart home activities even encrypted!"},{"key":"ref20","article-title":"IoT Neighborhood Watch: device monitoring for anomaly detection","author":"carmo","year":"0","journal-title":"Comunica&#x00E7;&#x00E3;o INForum"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802686"},{"key":"ref21","author":"trimananda","year":"0","journal-title":"Ping-Pong Packet-Level Signatures for Smart Home Device Events"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313738"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904364"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323409"},{"key":"ref25","first-page":"1","article-title":"Identification of User Application by an External Eavesdropper using Machine Learning Analysis on Network Traffic","author":"sina","year":"0","journal-title":"ICC Workshops"}],"event":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","location":"Toronto, ON, Canada","start":{"date-parts":[[2020,7,6]]},"end":{"date-parts":[[2020,7,9]]}},"container-title":["IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9146478\/9162584\/09162885.pdf?arnumber=9162885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:55:44Z","timestamp":1656453344000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9162885\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/infocomwkshps50562.2020.9162885","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}