{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T12:23:08Z","timestamp":1770985388286,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T00:00:00Z","timestamp":1561334400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1816995"],"award-info":[{"award-number":["1816995"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,24]]},"DOI":"10.1145\/3326285.3329072","type":"proceedings-article","created":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T12:42:33Z","timestamp":1560516153000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Multidimensional behavioral profiling of internet-of-things in edge networks"],"prefix":"10.1145","author":[{"given":"Kuai","family":"Xu","sequence":"first","affiliation":[{"name":"Arizona State University"}]},{"given":"Yinxin","family":"Wan","sequence":"additional","affiliation":[{"name":"Arizona State University"}]},{"given":"Guoliang","family":"Xue","sequence":"additional","affiliation":[{"name":"Arizona State University"}]},{"given":"Feng","family":"Wang","sequence":"additional","affiliation":[{"name":"Arizona State University"}]}],"member":"320","published-online":{"date-parts":[[2019,6,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3266444.3266452"},{"key":"e_1_3_2_1_3_1","unstructured":"Business Insider. 2019. Google This is Bogus as Hell - One of the Fathers of the Internet Blasts Google for how Chromecast Behaves on His Home Network. https:\/\/www.businessinsider.com\/paul-vixie-blasts-google-chromecast-2019-2\/.  Business Insider. 2019. Google This is Bogus as Hell - One of the Fathers of the Internet Blasts Google for how Chromecast Behaves on His Home Network. https:\/\/www.businessinsider.com\/paul-vixie-blasts-google-chromecast-2019-2\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of IEEE Symposium on Security and Privacy (S&P).","author":"Fernandes E.","unstructured":"E. Fernandes , J. Jung , and A. Prakash . 2016. Security Analysis of Emerging Smart Home Applications . In Proceedings of IEEE Symposium on Security and Privacy (S&P). E. Fernandes, J. Jung, and A. Prakash. 2016. Security Analysis of Emerging Smart Home Applications. In Proceedings of IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of USENIX Conference on Security Symposium.","author":"Fernandes E.","unstructured":"E. Fernandes , J. Paupore , A. Rahmati , D. Simionato , M. Conti , and A. Prakash . 2016. FlowFence: Practical Data Protection for Emerging IoT Application Frameworks . In Proceedings of USENIX Conference on Security Symposium. E. Fernandes, J. Paupore, A. Rahmati, D. Simionato, M. Conti, and A. Prakash. 2016. FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In Proceedings of USENIX Conference on Security Symposium."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of EEE Military Communications Conference (MILCOM).","author":"Kambourakis G.","unstructured":"G. Kambourakis , C. Kolias , and A. Stavrou . 2017. The Mirai botnet and the IoT Zombie Armies . In Proceedings of EEE Military Communications Conference (MILCOM). G. Kambourakis, C. Kolias, and A. Stavrou. 2017. The Mirai botnet and the IoT Zombie Armies. In Proceedings of EEE Military Communications Conference (MILCOM)."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of IEEE Military Communications Conference (MILCOM).","author":"Jafari H.","unstructured":"H. Jafari , O. Omotere , D. Adesina , H.-H. Wu , and L. Qian . 2018. IoT Devices Fingerprinting Using Deep Learning . In Proceedings of IEEE Military Communications Conference (MILCOM). H. Jafari, O. Omotere, D. Adesina, H.-H. Wu, and L. Qian. 2018. IoT Devices Fingerprinting Using Deep Learning. In Proceedings of IEEE Military Communications Conference (MILCOM)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2320577"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of IEEE\/IFIP International Conference on Dependable Systems & Networks (DSN).","author":"Gao K.","unstructured":"K. Gao , C. Corbett , and R. Beyah . 2010. A Passive Approach to Wireless Device Fingerprinting . In Proceedings of IEEE\/IFIP International Conference on Dependable Systems & Networks (DSN). K. Gao, C. Corbett, and R. Beyah. 2010. A Passive Approach to Wireless Device Fingerprinting. In Proceedings of IEEE\/IFIP International Conference on Dependable Systems & Networks (DSN)."},{"key":"e_1_3_2_1_12_1","unstructured":"K. Park and W. Willinger. 2002. Self-Similar Network Traffic and Performance Evaluation. John Wiley & Sons.   K. Park and W. Willinger. 2002. Self-Similar Network Traffic and Performance Evaluation. John Wiley & Sons."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1569"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"K. Xu Y. Wan and G. Xue. 2019. Powering Smart Homes with Information-Centric Networking. IEEE Communication Magazine (2019).  K. Xu Y. Wan and G. Xue. 2019. Powering Smart Homes with Information-Centric Networking. IEEE Communication Magazine (2019).","DOI":"10.1109\/MCOM.2019.1800732"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2396816"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of USENIX Security Symposium.","author":"Antonakakis M.","unstructured":"M. Antonakakis , T. April , M. Bailey , M. Bernhard , E. Bursztein , J. Cochran , Z. Durumeric , J. Halderman , L. Invernizzi , M. Kallitsis , D. Kumar , C. Lever , Z. Ma , J. Mason , D. Menscher , C. Seaman , N. Sullivan , K. Thomas , and Y. Zhou . 2017. Understanding the Mirai Botnet . In Proceedings of USENIX Security Symposium. M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. Halderman, L. Invernizzi, M. Kallitsis, D. Kumar, C. Lever, Z. Ma, J. Mason, D. Menscher, C. Seaman, N. Sullivan, K. Thomas, and Y. Zhou. 2017. Understanding the Mirai Botnet. In Proceedings of USENIX Security Symposium."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"M. Li and P. Vit\u00e1nyi. 1993. An Introduction to Kolmogorov Complexity and its Applications. Springer.   M. Li and P. Vit\u00e1nyi. 1993. An Introduction to Kolmogorov Complexity and its Applications. Springer.","DOI":"10.1007\/978-1-4757-3860-5"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS).","author":"Miettinen M.","unstructured":"M. Miettinen , S. Marchal , I. Hafeez , N. Asokan , A.-R. Sadeghi , and S. Tarkoma . 2017. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT . In Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS). M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A.-R. Sadeghi, and S. Tarkoma. 2017. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. In Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281433"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of IEEE Symposium on Security and Privacy (S&P).","author":"Alrawi O.","unstructured":"O. Alrawi , C. Lever , M. Antonakakis , and F. Monrose . 2019. SoK: Security Evaluation of Home-Based IoT Deployments . In Proceedings of IEEE Symposium on Security and Privacy (S&P). O. Alrawi, C. Lever, M. Antonakakis, and F. Monrose. 2019. SoK: Security Evaluation of Home-Based IoT Deployments. In Proceedings of IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_21_1","volume-title":"The Minimum Description Length Principle","author":"Gr\u00fcnwald P.","unstructured":"P. Gr\u00fcnwald . 2007. The Minimum Description Length Principle . MIT press . P. Gr\u00fcnwald. 2007. The Minimum Description Length Principle. MIT press."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of Network and Distributed System Security Symposium (NDSS).","author":"Wang Q.","unstructured":"Q. Wang , W. Hassan , A. Bates , and C. Gunter . 2018. Fear and Logging in the Internet of Things . In Proceedings of Network and Distributed System Security Symposium (NDSS). Q. Wang, W. Hassan, A. Bates, and C. Gunter. 2018. Fear and Logging in the Internet of Things. In Proceedings of Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.12"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600682CM"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00127"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055245.3055253"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS).","author":"Gu T.","unstructured":"T. Gu and P. Mohapatra . 2018. BF-IoT: Securing the IoT Networks via Fingerprinting-Based Device Authentication . In Proceedings of IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS). T. Gu and P. Mohapatra. 2018. BF-IoT: Securing the IoT Networks via Fingerprinting-Based Device Authentication. In Proceedings of IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS)."},{"key":"e_1_3_2_1_28_1","unstructured":"University of Oregon. {n.d.}. Route Views Project. http:\/\/www.routeviews.org\/.  University of Oregon. {n.d.}. Route Views Project. http:\/\/www.routeviews.org\/."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243820"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019878"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Y. Rekhter and T. Li. 1995. A Border Gateway Protocol 4 (BGP-4).  Y. Rekhter and T. Li. 1995. A Border Gateway Protocol 4 (BGP-4).","DOI":"10.17487\/rfc1771"}],"event":{"name":"IWQoS '19: IEEE\/ACM International Symposium on Quality of Service","location":"Phoenix Arizona","acronym":"IWQoS '19"},"container-title":["Proceedings of the International Symposium on Quality of Service"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3326285.3329072","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3326285.3329072","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3326285.3329072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:00Z","timestamp":1750206360000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3326285.3329072"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,24]]},"references-count":32,"alternative-id":["10.1145\/3326285.3329072","10.1145\/3326285"],"URL":"https:\/\/doi.org\/10.1145\/3326285.3329072","relation":{},"subject":[],"published":{"date-parts":[[2019,6,24]]},"assertion":[{"value":"2019-06-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}