{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T08:34:34Z","timestamp":1772958874156,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,26]]},"DOI":"10.1145\/3605758.3623492","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T01:52:11Z","timestamp":1700704331000},"page":"91-99","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Granular IoT Device Identification Using TF-IDF and Cosine Similarity"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8657-3448","authenticated-orcid":false,"given":"Ashley","family":"Andrews","sequence":"first","affiliation":[{"name":"University of Bristol, Bristol, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1684-6989","authenticated-orcid":false,"given":"George","family":"Oikonomou","sequence":"additional","affiliation":[{"name":"University of Bristol, Bristol, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6319-9789","authenticated-orcid":false,"given":"Simon","family":"Armour","sequence":"additional","affiliation":[{"name":"University of Bristol, Bristol, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5538-0338","authenticated-orcid":false,"given":"Paul","family":"Thomas","sequence":"additional","affiliation":[{"name":"University of Bristol, Bristol, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2069-4922","authenticated-orcid":false,"given":"Thomas","family":"Cattermole","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2019.8795318"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2017.8323956"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC57183.2022.10062747"},{"key":"e_1_3_2_1_4_1","unstructured":"BBC. 2023. The tech flaw that lets hackers control surveillance cameras. https:\/\/www.bbc.co.uk\/news\/technology-65975446 [Accessed: 01.07.2023]."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"Benjamin Bengfort Rebecca Bilbro Nathan Danielsen Larry Gray Kristen McIntyre Prema Roman Zijie Poh and Others. 2018. Yellowbrick. Yellowbrick. https:\/\/doi.org\/10.5281\/zenodo.1206264","DOI":"10.5281\/zenodo.1206264"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--37277--4_9"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022"},{"key":"e_1_3_2_1_8_1","volume-title":"Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Feng Xuan","year":"2018","unstructured":"Xuan Feng, Qiang Li, Haining Wang, and Limin Sun. 2018. Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 327--341."},{"key":"e_1_3_2_1_9_1","volume-title":"The Thirteenth International Conference on Emerging Security Information, Systems and Technologies. IARIA","author":"Fischer Sebastian","year":"2019","unstructured":"Sebastian Fischer and Bernhard Weber. 2019. IoTAG : An Open Standard for IoT Device IdentificAtion and RecoGnition. In The Thirteenth International Conference on Emerging Security Information, Systems and Technologies. IARIA, Nice, France, 107--113."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"Jiawei Han Micheline Kamber and Jian Pei. 2012. Getting to Know Your Data. Morgan Kaufmann USA 39--82. https:\/\/doi.org\/10.1016\/B978-0--12--381479--1.00002--2","DOI":"10.1016\/B978-0--12--381479--1.00002--2"},{"key":"e_1_3_2_1_12_1","volume-title":"Society Report","author":"International Telecommunications ITU","year":"2015","unstructured":"ITU (International Telecommunications Union). 2015. Measuring the Information Society Report 2015. http:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Documents\/publications\/misr2015\/MISR2015-w5.pdf. [Accessed: 15.05.2023]."},{"key":"e_1_3_2_1_13_1","volume-title":"All Things Considered: An Analysis of IoT Devices on Home Networks. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Kumar Deepak","year":"2019","unstructured":"Deepak Kumar, Kelly Shen, Benton Case, Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta, and Zakir Durumeric. 2019. All Things Considered: An Analysis of IoT Devices on Home Networks. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1169--1185."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.22619\/ijcsa.2018.100120"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101968"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.283"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00037"},{"key":"e_1_3_2_1_18_1","volume-title":"Intrusion detection with unlabeled data using clustering. Undergraduate Thesis","author":"Portnoy Leonid","unstructured":"Leonid Portnoy. 2000. Intrusion detection with unlabeled data using clustering. Undergraduate Thesis. Columbia University."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.23919\/CISTI.2017.7975691"},{"key":"e_1_3_2_1_20_1","volume-title":"Text mining with R","author":"Silge Julia","unstructured":"Julia Silge and David Robinson. 2017. Text mining with R. O'Reilly Media, Inc, CA."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN44214.2019.8990797"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2984030"},{"key":"e_1_3_2_1_24_1","volume-title":"Selected Papers from the 12th International Networking Conference","author":"Thomsen Mathias Dahl","unstructured":"Mathias Dahl Thomsen, Alberto Giaretta, and Nicola Dragoni. 2021. Smart Lamp or Security Camera? Automatic Identification of IoT Devices. In Selected Papers from the 12th International Networking Conference, Bogdan Ghita and Stavros Shiaeles (Eds.). Springer International Publishing, Cham, 85--99."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2019.00016"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2019.8793012"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52683-2_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2017.00104"},{"key":"e_1_3_2_1_29_1","volume-title":"Advances in Artificial Intelligence and Security","author":"Xu Zi-Xiao","unstructured":"Zi-Xiao Xu, Xiu-Bo Chen, Gang Xu, Kai-Guo Yuan, Jun Cui, and Yi-Xian Yang. 2021. Research on Feature Words for IoT Device Recognition Based on Word2vec. In Advances in Artificial Intelligence and Security, Xingming Sun, Xiaorui Zhang, Zhihua Xia, and Elisa Bertino (Eds.). Springer International Publishing, Cham, 287--298. io"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 5th Workshop on CPS&amp;IoT Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605758.3623492","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605758.3623492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:10Z","timestamp":1750178770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605758.3623492"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":29,"alternative-id":["10.1145\/3605758.3623492","10.1145\/3605758"],"URL":"https:\/\/doi.org\/10.1145\/3605758.3623492","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}