{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:52:45Z","timestamp":1772041965815,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,6]],"date-time":"2020-10-06T00:00:00Z","timestamp":1601942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US Department of Homeland Security (DHS) Science and Technology (S&T)","award":["HSHQDC-16-C-00034"],"award-info":[{"award-number":["HSHQDC-16-C-00034"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,6]]},"DOI":"10.1145\/3410992.3410993","type":"proceedings-article","created":{"date-parts":[[2021,2,21]],"date-time":"2021-02-21T01:25:42Z","timestamp":1613870742000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["IoTHound"],"prefix":"10.1145","author":[{"given":"Prashant","family":"Anantharaman","sequence":"first","affiliation":[{"name":"Dartmouth College"}]},{"given":"Liwei","family":"Song","sequence":"additional","affiliation":[{"name":"Princeton University"}]},{"given":"Ioannis","family":"Agadakos","sequence":"additional","affiliation":[{"name":"SRI International"}]},{"given":"Gabriela","family":"Ciocarlie","sequence":"additional","affiliation":[{"name":"SRI International"}]},{"given":"Bogdan","family":"Copos","sequence":"additional","affiliation":[{"name":"Google Inc."}]},{"given":"Ulf","family":"Lindqvist","sequence":"additional","affiliation":[{"name":"SRI International"}]},{"given":"Michael E.","family":"Locasto","sequence":"additional","affiliation":[{"name":"SRI International"}]}],"member":"320","published-online":{"date-parts":[[2020,10,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2010.5586163"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3266444.3266452"},{"key":"e_1_3_2_1_4_1","volume-title":"Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks. arXiv preprint","author":"Dong Shuaike","year":"1909","unstructured":"Shuaike Dong , Zhou Li , Di Tang , Jiongyi Chen , Menghan Sun , and Kehuan Zhang . 2019. Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks. arXiv preprint 1909 , 00104 (2019), 1--12. Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, and Kehuan Zhang. 2019. Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks. arXiv preprint 1909, 00104 (2019), 1--12."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2007.4428622"},{"key":"e_1_3_2_1_8_1","first-page":"2579","article-title":"Visualizing Data using t-SNE","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geoffrey Hinton . 2008 . Visualizing Data using t-SNE . Journal of Machine Learning Research 9 , Nov (2008), 2579 -- 2605 . Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing Data using t-SNE. Journal of Machine Learning Research 9, Nov (2008), 2579--2605.","journal-title":"Journal of Machine Learning Research 9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0054"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.00205"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019878"},{"key":"e_1_3_2_1_12_1","volume-title":"IoT Sentinel: Automated Device-type Identification for Security Enforcement in IoT. In IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE","author":"Miettinen Markus","year":"2017","unstructured":"Markus Miettinen , Samuel Marchal , Ibbad Hafeez , N Asokan , Ahmad-Reza Sadeghi , and Sasu Tarkoma . 2017 . IoT Sentinel: Automated Device-type Identification for Security Enforcement in IoT. In IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE , Atlanta, GA, USA, 2177--2184. Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N Asokan, Ahmad-Reza Sadeghi, and Sasu Tarkoma. 2017. IoT Sentinel: Automated Device-type Identification for Security Enforcement in IoT. In IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, Atlanta, GA, USA, 2177--2184."},{"key":"e_1_3_2_1_13_1","unstructured":"Colin O'Flynn. 2016. Getting Root on Philips Hue Bridge 2.0. http:\/\/colinoflynn.com\/2016\/07\/getting-root-on-philips-hue-bridge-2-0\/.  Colin O'Flynn. 2016. Getting Root on Philips Hue Bridge 2.0. http:\/\/colinoflynn.com\/2016\/07\/getting-root-on-philips-hue-bridge-2-0\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.330413"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2018.8450404"},{"key":"e_1_3_2_1_16_1","volume-title":"Rajib Ranjan Maiti, and Nils Tippenhauer","author":"Siby Sandra","year":"2017","unstructured":"Sandra Siby , Rajib Ranjan Maiti, and Nils Tippenhauer . 2017 . IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods . arXiv:cs.CR\/1701.05007 Sandra Siby, Rajib Ranjan Maiti, and Nils Tippenhauer. 2017. IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods. arXiv:cs.CR\/1701.05007"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990081"}],"event":{"name":"IoT '20: 10th International Conference on the Internet of Things","location":"Malm\u00f6 Sweden","acronym":"IoT '20"},"container-title":["Proceedings of the 10th International Conference on the Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410992.3410993","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3410992.3410993","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:56Z","timestamp":1750195916000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410992.3410993"}},"subtitle":["environment-agnostic device identification and monitoring"],"short-title":[],"issued":{"date-parts":[[2020,10,6]]},"references-count":17,"alternative-id":["10.1145\/3410992.3410993","10.1145\/3410992"],"URL":"https:\/\/doi.org\/10.1145\/3410992.3410993","relation":{},"subject":[],"published":{"date-parts":[[2020,10,6]]},"assertion":[{"value":"2020-10-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}