{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T06:37:07Z","timestamp":1725950227092},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,22]]},"DOI":"10.1145\/3421537.3421545","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T13:23:53Z","timestamp":1601904233000},"page":"79-89","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Network Traffic Analysis based IoT Device Identification"],"prefix":"10.1145","author":[{"given":"Rajarshi Roy","family":"Chowdhury","sequence":"first","affiliation":[{"name":"Faculty of Integrated Technologies"}]},{"given":"Sandhya","family":"Aneja","sequence":"additional","affiliation":[{"name":"Faculty of Integrated Technologies"}]},{"given":"Nagender","family":"Aneja","sequence":"additional","affiliation":[{"name":"Institute of Applied Data Analytics"}]},{"given":"Emeroylariffion","family":"Abas","sequence":"additional","affiliation":[{"name":"Faculty of Integrated Technologies"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761559"},{"key":"e_1_3_2_1_2_1","volume-title":"Network-Protocol-Based IoT Device Identification. In 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC). IEEE, 204--209","author":"Ammar Nesrine","year":"2019","unstructured":"Nesrine Ammar , Ludovic Noirie , and S\u00e9bastien Tixeuil . 2019 . Network-Protocol-Based IoT Device Identification. In 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC). IEEE, 204--209 . Nesrine Ammar, Ludovic Noirie, and S\u00e9bastien Tixeuil. 2019. Network-Protocol-Based IoT Device Identification. In 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC). IEEE, 204--209."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOTAIS.2018.8600824"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3266444.3266452"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_6_1","unstructured":"Garcia-Morchon et al. 2018. State-of-the-Art and Challenges for the Internet of Things Security draft-irtf-t2trg-iot-seccons-16 (Internet-Draft). URL: https:\/\/tools.ietf.org\/pdf\/draft-irtf-t2trg-iot-seccons-16.pdf. Garcia-Morchon et al. 2018. State-of-the-Art and Challenges for the Internet of Things Security draft-irtf-t2trg-iot-seccons-16 (Internet-Draft). URL: https:\/\/tools.ietf.org\/pdf\/draft-irtf-t2trg-iot-seccons-16.pdf."},{"key":"e_1_3_2_1_7_1","volume-title":"Witten","author":"Frank Eibe","year":"2016","unstructured":"Eibe Frank , Mark A. Hall , and Ian H . Witten . 2016 . The WEKA Workbench. Online Appendix for \"Data Mining : Practical Machine Learning Tools and Techniques\", fourth edition ed. Morgan Kaufmann , 2016. Eibe Frank, Mark A. Hall, and Ian H. Witten. 2016. The WEKA Workbench. Online Appendix for \"Data Mining: Practical Machine Learning Tools and Techniques\", fourth edition ed. Morgan Kaufmann, 2016."},{"key":"e_1_3_2_1_8_1","volume-title":"Gerald","author":"Combs","year":"1998","unstructured":"Combs et al. Gerald . 1998 . D.2. tshark: Terminal-based Wireshark. URL: https:\/\/www.wireshark.org\/docs\/wsug_html_chunked\/index.html. Accessed on: February 9, 2020. Combs et al. Gerald. 1998. D.2. tshark: Terminal-based Wireshark. URL: https:\/\/www.wireshark.org\/docs\/wsug_html_chunked\/index.html. Accessed on: February 9, 2020."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229572"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.284"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.05.012"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369033"},{"key":"e_1_3_2_1_13_1","volume-title":"Security and Communication Networks 2017","author":"Robyns Pieter","year":"2017","unstructured":"Pieter Robyns , Bram Bonn\u00e9 , Peter Quax , and Wim Lamotte . 2017. Noncooperative 802.11 mac layer fingerprinting and tracking of mobile devices. Security and Communication Networks 2017 ( 2017 ). Pieter Robyns, Bram Bonn\u00e9, Peter Quax, and Wim Lamotte. 2017. Noncooperative 802.11 mac layer fingerprinting and tracking of mobile devices. Security and Communication Networks 2017 (2017)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058246"},{"key":"e_1_3_2_1_15_1","volume-title":"A mathematical theory of communication. Bell system technical journal 27, 3","author":"Shannon Claude E","year":"1948","unstructured":"Claude E Shannon . 1948. A mathematical theory of communication. Bell system technical journal 27, 3 ( 1948 ), 379--423. Claude E Shannon. 1948. A mathematical theory of communication. Bell system technical journal 27, 3 (1948), 379--423."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2476338"}],"event":{"name":"BDIOT 2020: 2020 the 4th International Conference on Big Data and Internet of Things","acronym":"BDIOT 2020","location":"Singapore Singapore"},"container-title":["Proceedings of the 2020 4th International Conference on Big Data and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3421537.3421545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T08:09:20Z","timestamp":1673597360000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3421537.3421545"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,22]]},"references-count":17,"alternative-id":["10.1145\/3421537.3421545","10.1145\/3421537"],"URL":"https:\/\/doi.org\/10.1145\/3421537.3421545","relation":{},"subject":[],"published":{"date-parts":[[2020,8,22]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}