{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T16:54:10Z","timestamp":1756572850584,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,6]],"date-time":"2020-10-06T00:00:00Z","timestamp":1601942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,6]]},"DOI":"10.1145\/3410992.3411007","type":"proceedings-article","created":{"date-parts":[[2021,2,21]],"date-time":"2021-02-21T01:25:42Z","timestamp":1613870742000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["IoTMap"],"prefix":"10.1145","author":[{"given":"Jonathan","family":"Tournier","sequence":"first","affiliation":[{"name":"Univ Lyon, Villeurbanne, France"}]},{"given":"Fran\u00e7ois","family":"Lesueur","sequence":"additional","affiliation":[{"name":"Univ Lyon, Villeurbanne, France"}]},{"given":"Fr\u00e9d\u00e9ric Le","family":"Mou\u00ebl","sequence":"additional","affiliation":[{"name":"Univ Lyon, Villeurbanne, France"}]},{"given":"Laurent","family":"Guyon","sequence":"additional","affiliation":[{"name":"AlgoSecure, Lyon, France"}]},{"given":"Hicham","family":"Ben-Hassine","sequence":"additional","affiliation":[{"name":"AlgoSecure, Lyon, France"}]}],"member":"320","published-online":{"date-parts":[[2020,10,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.12.020"},{"volume-title":"Consumer Communications and Networking Conference (CCNC). IEEE, 55--59","author":"Benmoshe B.","key":"e_1_3_2_1_2_1"},{"volume-title":"Iotsense: Behavioral fingerprinting of iot devices. CoRR.","year":"2018","author":"Bezawada B.","key":"e_1_3_2_1_3_1"},{"volume-title":"4th IEEE International Conference (DCOSS). Springer, 79--98","author":"Chen B.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"B. Fouladi and S. Ghanoun. 2013. Security evaluation of the Z-Wave wireless protocol. Black hat USA 24.  B. Fouladi and S. Ghanoun. 2013. Security evaluation of the Z-Wave wireless protocol. Black hat USA 24."},{"volume-title":"International Conference on Cyber Warfare and Security (ICCWS). Academic Conferences International Limited, 163","author":"Hall J.","key":"e_1_3_2_1_6_1"},{"volume-title":"Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security (IoTBDS). SciTePress, 47--58","author":"Hallman R.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38853-8_15"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747560"},{"volume-title":"IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. In 37th International Conference on Distributed Computing Systems (ICDCS). IEEE Computer Society, 2177--2184","author":"Miettinen M.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883917"},{"volume-title":"Proceedings of the 3rd international conference on Embedded networked sensor systems (SenSys). ACM, 255--267","author":"Ramanathan N.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"A. Reziouk A. Lebrun and J-C. Demay. 2016. Auditing 6LoWPAN Networks UsingStandard Penetration Testing Tools. DEF CON.  A. Reziouk A. Lebrun and J-C. Demay. 2016. Auditing 6LoWPAN Networks UsingStandard Penetration Testing Tools. DEF CON."},{"volume-title":"Memento: A health monitoring system for wireless sensor networks. In 3rd Annual Communications Society on Sensor and Ad Hoc Communications and Networks (SECON)","year":"2006","author":"Rost S.","key":"e_1_3_2_1_14_1"},{"volume-title":"IoT Devices Recognition Through Network Traffic Analysis. In International Conference on Big Data (Big Data). IEEE, 5187--5192","author":"Shahid M.","key":"e_1_3_2_1_15_1"},{"volume-title":"Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security (IoTPTS@AsiaCCS). ACM, 23--30","author":"Siby S.","key":"e_1_3_2_1_16_1"},{"volume-title":"Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 559--564","author":"Sivanathan A.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMNETS.2005.1469094"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602087.2602090"},{"volume-title":"11th ToorCon conference.","year":"2009","author":"Wright J.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/nem.792"}],"event":{"name":"IoT '20: 10th International Conference on the Internet of Things","acronym":"IoT '20","location":"Malm\u00f6 Sweden"},"container-title":["Proceedings of the 10th International Conference on the Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410992.3411007","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3410992.3411007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:56Z","timestamp":1750195916000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410992.3411007"}},"subtitle":["a protocol-agnostic multi-layer system to detect application patterns in IoT networks"],"short-title":[],"issued":{"date-parts":[[2020,10,6]]},"references-count":21,"alternative-id":["10.1145\/3410992.3411007","10.1145\/3410992"],"URL":"https:\/\/doi.org\/10.1145\/3410992.3411007","relation":{},"subject":[],"published":{"date-parts":[[2020,10,6]]},"assertion":[{"value":"2020-10-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}