{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:47:58Z","timestamp":1763642878050},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1109\/noms47738.2020.9110451","type":"proceedings-article","created":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T22:06:15Z","timestamp":1591653975000},"source":"Crossref","is-referenced-by-count":24,"title":["IoT or NoT: Identifying IoT Devices in a Short Time Scale"],"prefix":"10.1109","author":[{"given":"Anat","family":"Bremler-Barr","sequence":"first","affiliation":[]},{"given":"Haim","family":"Levy","sequence":"additional","affiliation":[]},{"given":"Zohar","family":"Yakhini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"TR-069 - CPE WAN Management Protocol","year":"0"},{"key":"ref38","article-title":"aireplay-ng - Linux man page","year":"0"},{"key":"ref33","article-title":"TCP Usage Guidance in the Internet of Things (IoT)","author":"gomez","year":"2018","journal-title":"IETF Internet Draft"},{"key":"ref32","article-title":"Logit Models for Binary Data","author":"regression","year":"1978"},{"key":"ref31","article-title":"scikit-leam StandardScaler python documentation","year":"0"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"ref37","article-title":"IPv6 Stateless Address Autoconfiguration","author":"narten","year":"2007","journal-title":"RFC 4862"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1989493.1989541"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.110"},{"key":"ref34","article-title":"New streaming algorithms for fast detection of superspreaders","author":"venkataraman","year":"2005","journal-title":"Proc Network and Distributed System Security Symposium (NDSS)"},{"key":"ref10","article-title":"Bitdefender BOX","year":"0"},{"key":"ref40","article-title":"scikit-leam DecisionTreeClassifier python documentation","year":"0"},{"key":"ref11","article-title":"IoT-or-NoT-Execution-code","year":"0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310073"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1145\/3019612.3019878","article-title":"ProfilloT: A Machine Learning Approach for IoT Device Identification Based on Network Traffic Analysis","author":"meidan","year":"2017","journal-title":"SAC 2017 The 32nd ACM Symposium On Applied Computing"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406262"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991098"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116438"},{"key":"ref17","first-page":"36","article-title":"IP-Based IoT Device Detection","author":"guo","year":"2016","journal-title":"IoT S&P&#x2019;18"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885429"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323409"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref27","article-title":"IoT devices&#x2019; First-Time Bootup Traces, PREDICT ID: USC-LANDER\/IoT_Bootup_Traces-20181107. Provided by the USC\/LANDER project","year":"0"},{"key":"ref3","article-title":"Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer","author":"wei","year":"2018"},{"key":"ref6","article-title":"Trend Micro partners with Asus to beef up IoT security in homes","year":"0"},{"key":"ref29","article-title":"The Generalization of &#x2018; Student &#x2019; s &#x2019; Problem when Several Different Population Variances are Involved Published by : Biometrika Tmst Stable","author":"welch","year":"2008","journal-title":"Biometrika"},{"key":"ref5","article-title":"McAfee: Built-in Protection for Your Connected Devices","year":"0"},{"key":"ref8","article-title":"CUJO","year":"0"},{"key":"ref7","article-title":"RATtrap","year":"0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834095"},{"key":"ref9","article-title":"Fing-Box","year":"0"},{"key":"ref1","article-title":"DDoS attack halts heating in Finland amidst winter","year":"0"},{"key":"ref20","article-title":"Detection of unauthorized iot devices using machine learning techniques","author":"meidan","year":"2017"},{"key":"ref22","article-title":"Chatter on the wire: A look at dhcp traffic","author":"kollmann","year":"2007"},{"key":"ref21","first-page":"327","article-title":"Acquisitional Rule-based Engine for Discovering Intemet-of-Things Devices","author":"feng","year":"2018","journal-title":"Usenix Security"},{"key":"ref24","article-title":"RFC 8520: Manufacturer Usage Description Specification","author":"lear","year":"2019"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"ref23","article-title":"GitHub - xnih\/satori","author":"kollmann","year":"0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"}],"event":{"name":"NOMS 2020-2020 IEEE\/IFIP Network Operations and Management Symposium","location":"Budapest, Hungary","start":{"date-parts":[[2020,4,20]]},"end":{"date-parts":[[2020,4,24]]}},"container-title":["NOMS 2020 - 2020 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9107308\/9110252\/09110451.pdf?arnumber=9110451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:55:09Z","timestamp":1656453309000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9110451\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/noms47738.2020.9110451","relation":{},"subject":[],"published":{"date-parts":[[2020,4]]}}}