{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T11:46:40Z","timestamp":1767181600494,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","funder":[{"name":"Engineering and Physical Sciences Research Council (EPSRC)","award":["P\/Y028813\/1"],"award-info":[{"award-number":["P\/Y028813\/1"]}]},{"name":"Northern Accelerator"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1145\/3773274.3774927","type":"proceedings-article","created":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T11:40:28Z","timestamp":1767181228000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Hybrid Monitoring Framework for Anomaly Detection in Smart Home IoT Devices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9096-2773","authenticated-orcid":false,"given":"Shubh","family":"Anand","sequence":"first","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2654-726X","authenticated-orcid":false,"given":"Likhitha","family":"Kandregula","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4101-2115","authenticated-orcid":false,"given":"Tomasz","family":"Szydlo","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6610-1328","authenticated-orcid":false,"given":"Rajiv","family":"Ranjan","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1322-2588","authenticated-orcid":false,"given":"Devki Nandan","family":"Jha","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,12,31]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399421"},{"key":"e_1_3_3_1_3_2","unstructured":"Muhammad Afzal and Kamran Ali. 2023. Evaluation of Matter Protocol for Interoperable Smart Home Communication. IEEE Access 11 (2023) 16821\u201316834."},{"key":"e_1_3_3_1_4_2","unstructured":"Wasif Ali Syed Hussain and Amjad Ali. 2021. Security challenges in the smart home: An analysis of threats and countermeasures. Journal of Network and Computer Applications 174 (2021) 102887."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139945"},{"key":"e_1_3_3_1_7_2","unstructured":"Leonardo Babun Amit\u00a0Kumar Sikder Abbas Acar and A\u00a0Selcuk Uluagac. 2018. Iotdots: A digital forensics framework for smart environments. (2018)."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3266444.3266452"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"David Buil-Gil Steven Kemp Stefanie Kuenzel Lynne Coventry Sameh Zakhary Daniel Tilley and James Nicholson. 2023. The digital harms of smart home devices: A systematic literature review. Computers in Human Behavior 145 (2023) 107770.","DOI":"10.1016\/j.chb.2023.107770"},{"key":"e_1_3_3_1_10_2","unstructured":"Connectivity Standards Alliance. 2022. Matter: A Unified IP-based Connectivity Protocol. (2022). https:\/\/csa-iot.org\/all-solutions\/matter\/"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384732"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00013"},{"key":"e_1_3_3_1_13_2","volume-title":"Ettercap","author":"Devs Ettercap","year":"2025","unstructured":"Ettercap Devs. 2025. Ettercap. https:\/\/www.ettercap-project.org"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/AIoTSys63104.2024.10780564"},{"key":"e_1_3_3_1_16_2","first-page":"1","volume-title":"2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","author":"Hamza A","year":"2020","unstructured":"A Hamza, J Kim, and H Kim. 2020. Combining network and behavioral data for detecting IoT intrusions. In 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, 1\u20136."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid54584.2022.00128"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Prajakta Khairnar Sukanya Bansode Balveen Sahota and Priyanka Chourasia. 2021. Automation of home (iot) using raspberry pi. Int. J. Sci. Res. Sci. Eng. Technol 4099 235\u2013239.","DOI":"10.32628\/IJSRSET218335"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Ruoyu Li Qing Li Tao Lin Qingsong Zou Dan Zhao Yucheng Huang Gareth Tyson Guorui Xie and Yong Jiang. 2024. Deviceradar: Online iot device fingerprinting in isps using programmable switches. IEEE\/ACM Transactions on Networking 32 5 (2024) 3854\u20133869.","DOI":"10.1109\/TNET.2024.3398778"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Jian Mao Qixiao Lin Shishi Zhu Liran Ma and Jianwei Liu. 2024. Smarttracer: Anomaly-driven provenance analysis based on device correlation in smart home systems. IEEE Internet of Things Journal 11 4 (2024) 5731\u20135744.","DOI":"10.1109\/JIOT.2023.3308089"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.283"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Afonso Mota Carlos Ser\u00f4dio and Ant\u00f3nio Valente. 2024. Matter protocol integration using espressif\u2019s solutions to achieve smart home interoperability. Electronics 13 11 (2024) 2217.","DOI":"10.3390\/electronics13112217"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Rodrigo Roman Jianying Zhou and Javier Lopez. 2013. On the features and challenges of security and privacy in distributed internet of things. Computer Networks 57 10 (2013) 2266\u20132279.","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"e_1_3_3_1_24_2","volume-title":"hping3","author":"Sanfilippo Salvatore","year":"2025","unstructured":"Salvatore Sanfilippo. 2025. hping3. http:\/\/www.hping.org\/"},{"key":"e_1_3_3_1_25_2","first-page":"556","volume-title":"Information","author":"Schiller Thomas","year":"2023","unstructured":"Thomas Schiller, Bruce Caulkins, Annie\u00a0S Wu, and Sean Mondesire. 2023. Security awareness in smart homes and internet of things networks through swarm-based cybersecurity penetration testing. In Information , Vol.\u00a014. MDPI, 556."},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"crossref","unstructured":"Mrinal Sharma Ameerah Assotally and Girish Bekaroo. 2022. Raspimonitor: A raspberry pi based smart home monitoring system. (2022) 1\u20136.","DOI":"10.1109\/NextComp55567.2022.9932198"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"crossref","unstructured":"Amit\u00a0Kumar Sikder Leonardo Babun Hidayet Aksu and A\u00a0Selcuk Uluagac. 2021. A survey on sensor-based threats to Internet-of-Things (IoT) devices and applications. IEEE Communications Surveys & Tutorials 23 1 (2021) 665\u2013695.","DOI":"10.1109\/COMST.2021.3064507"},{"key":"e_1_3_3_1_28_2","first-page":"435","volume-title":"Fifteenth symposium on usable privacy and security (SOUPS 2019)","author":"Tabassum Madiha","year":"2019","unstructured":"Madiha Tabassum, Tomasz Kosinski, and Heather\u00a0Richter Lipford. 2019. \" I don\u2019t own the data\": End User Perceptions of Smart Home Device Data Practices and Risks. In Fifteenth symposium on usable privacy and security (SOUPS 2019). 435\u2013450."},{"key":"e_1_3_3_1_29_2","first-page":"101","volume-title":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","author":"Trimananda Rahmadi","year":"2019","unstructured":"Rahmadi Trimananda, Janus Varmarken, Athina Markopoulou, and Brian Demsky. 2019. Pingpong: Packet-level signatures for smart home device events. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 101\u2013116."},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Hikmat Yar Ali\u00a0Shariq Imran Zulfiqar\u00a0Ahmad Khan Muhammad Sajjad and Zenun Kastrati. 2021. Towards smart home automation using iot-enabled edge-computing paradigm. Sensors 21 14 (2021) 4932.","DOI":"10.3390\/s21144932"}],"event":{"name":"UCC '25: 2025 IEEE\/ACM 18th International Conference on Utility and Cloud Computing","location":"France France","acronym":"UCC '25","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 18th IEEE\/ACM International Conference on Utility and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3773274.3774927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T11:42:23Z","timestamp":1767181343000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3773274.3774927"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":29,"alternative-id":["10.1145\/3773274.3774927","10.1145\/3773274"],"URL":"https:\/\/doi.org\/10.1145\/3773274.3774927","relation":{},"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"2025-12-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}