{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:03:38Z","timestamp":1775815418068,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,3]],"date-time":"2017-04-03T00:00:00Z","timestamp":1491177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,3]]},"DOI":"10.1145\/3019612.3019878","type":"proceedings-article","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T20:27:45Z","timestamp":1497558465000},"page":"506-509","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":360,"title":["ProfilIoT"],"prefix":"10.1145","author":[{"given":"Yair","family":"Meidan","sequence":"first","affiliation":[{"name":"Ben-Gurion University, Beer-Sheva, Israel"}]},{"given":"Michael","family":"Bohadana","sequence":"additional","affiliation":[{"name":"Ben-Gurion University, Beer-Sheva, Israel"}]},{"given":"Asaf","family":"Shabtai","sequence":"additional","affiliation":[{"name":"Ben-Gurion University, Beer-Sheva, Israel"}]},{"given":"Juan David","family":"Guarnizo","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]},{"given":"Mart\u00edn","family":"Ochoa","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]},{"given":"Nils Ole","family":"Tippenhauer","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[{"name":"Ben-Gurion University, Beer-Sheva, Israel and Singapore University of Technology and Design, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2017,4,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alexa top sites. Retrieved April 14 2016 from http:\/\/www.alexa.com\/topsites.  Alexa top sites. Retrieved April 14 2016 from http:\/\/www.alexa.com\/topsites."},{"key":"e_1_3_2_1_2_1","unstructured":"Geoip lookup service. Retrieved April 14 2016 from http:\/\/geoip.com\/.  Geoip lookup service. Retrieved April 14 2016 from http:\/\/geoip.com\/."},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","author":"Bekerman D.","year":"2016"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346821"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_3_2_1_6_1","unstructured":"G. Combs etal Wireshark-network protocol analyzer. Version 0.99 5 2008.  G. Combs et al. Wireshark-network protocol analyzer. Version 0.99 5 2008."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of USENIX Security Symposium","author":"Gu G.","year":"2008"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5120\/10515-5486"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.016"},{"key":"e_1_3_2_1_10_1","unstructured":"I. H. Saruhan. Detecting and preventing rogue devices on the network. SANS Institute InfoSec Reading Room sans. org 2007.  I. H. Saruhan. Detecting and preventing rogue devices on the network. SANS Institute InfoSec Reading Room sans. org 2007."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-68768-1_1"},{"key":"e_1_3_2_1_12_1","unstructured":"K. I. Talbot P. R. Duley and M. H. Hyatt. Specific emitter identification and verification. Technology Review page 113 2003.  K. I. Talbot P. R. Duley and M. H. Hyatt. Specific emitter identification and verification. Technology Review page 113 2003."}],"event":{"name":"SAC 2017: Symposium on Applied Computing","location":"Marrakech Morocco","acronym":"SAC 2017","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3019612.3019878","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3019612.3019878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:45Z","timestamp":1750215825000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3019612.3019878"}},"subtitle":["a machine learning approach for IoT device identification based on network traffic analysis"],"short-title":[],"issued":{"date-parts":[[2017,4,3]]},"references-count":12,"alternative-id":["10.1145\/3019612.3019878","10.1145\/3019612"],"URL":"https:\/\/doi.org\/10.1145\/3019612.3019878","relation":{},"subject":[],"published":{"date-parts":[[2017,4,3]]},"assertion":[{"value":"2017-04-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}