{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T05:25:42Z","timestamp":1768713942427,"version":"3.49.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T00:00:00Z","timestamp":1638748800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T00:00:00Z","timestamp":1638748800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,6]]},"DOI":"10.1109\/iotsms53705.2021.9704944","type":"proceedings-article","created":{"date-parts":[[2022,2,11]],"date-time":"2022-02-11T20:08:24Z","timestamp":1644610104000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["An Exploratory Data Analysis of the Network Behavior of Hive Home Devices"],"prefix":"10.1109","author":[{"given":"Asmau","family":"Wali","sequence":"first","affiliation":[{"name":"Nottingham Trent University,Department of Computer Science,Nottingham,UK"}]},{"given":"Oluwasegun","family":"Apejoye","sequence":"additional","affiliation":[{"name":"Nottingham Trent University,Department of Computer Science,Nottingham,UK"}]},{"given":"Jun","family":"He","sequence":"additional","affiliation":[{"name":"Nottingham Trent University,Department of Computer Science,Nottingham,UK"}]},{"given":"Xiaoqi","family":"Ma","sequence":"additional","affiliation":[{"name":"Nottingham Trent University,Department of Computer Science,Nottingham,UK"}]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2999327"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-78242-102-3.00008-3"},{"key":"ref30","article-title":"Build your home with smart home technology | Hive Home","year":"2021","journal-title":"Hivehome com"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3266444.3266452"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139939"},{"key":"ref12","article-title":"Why the internet of things is the new magic ingredient for cyber criminals","author":"naughton","year":"2016","journal-title":"The Guardian"},{"key":"ref13","article-title":"Mirai IoT Botnet Co-Authors Plead Guilty","author":"brian","year":"2017","journal-title":"Krebs on Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904364"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IoTDI49375.2020.00027"},{"key":"ref17","article-title":"An analysis of home IoT network traffic and behaviour","author":"amar","year":"2018","journal-title":"arXiv preprint arXiv 1803 05368"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3326285.3329072"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384732"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323409"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2015.7405513"},{"key":"ref27","article-title":"Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic","author":"apthorpe","year":"2017","journal-title":"arXiv preprint arXiv 1708 05044"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139938"},{"key":"ref6","author":"dhanjani","year":"2015","journal-title":"Abusing the Internet of Things Blackouts Freakouts and Stakeouts"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243820"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/et.2017.0303"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2896380"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997469"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986444"},{"key":"ref1","article-title":"IoTDevID: A Behaviour-Based Fingerprinting Method for Device Identification in the IoT","author":"kostas","year":"2021","journal-title":"arXiv preprint arXiv 2102 05988"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019878"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116438"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747560"},{"key":"ref24","article-title":"PingPong: Packet-level signatures for smart home device events","author":"trimananda","year":"2019","journal-title":"arXiv preprint arXiv 1907 11634"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.48"},{"key":"ref26","article-title":"A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic","author":"apthorpe","year":"2017","journal-title":"arXiv preprint arXiv 1705 06805"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399421"}],"event":{"name":"2021 8th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","location":"Gandia, Spain","start":{"date-parts":[[2021,12,6]]},"end":{"date-parts":[[2021,12,9]]}},"container-title":["2021 8th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9704882\/9704885\/09704944.pdf?arnumber=9704944","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T17:12:29Z","timestamp":1655140349000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9704944\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,6]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/iotsms53705.2021.9704944","relation":{},"subject":[],"published":{"date-parts":[[2021,12,6]]}}}