A survey on IoT platforms: Communication, security, and privacy perspectives

L Babun, K Denney, ZB Celik, P McDaniel… - Computer Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) redefines the way how commodity and industrial tasks
are performed every day. The integration of sensors, lightweight computation, and the …

An insider data leakage detection using one-hot encoding, synthetic minority oversampling and machine learning techniques

T Al-Shehari, RA Alsowail - Entropy, 2021 - mdpi.com
Insider threats are malicious acts that can be carried out by an authorized employee within
an organization. Insider threats represent a major cybersecurity challenge for private and …

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …

Real-time analysis of privacy-(un) aware IoT applications

L Babun, ZB Celik, P McDaniel, AS Uluagac - arXiv preprint arXiv …, 2019 - arxiv.org
Users trust IoT apps to control and automate their smart devices. These apps necessarily
have access to sensitive data to implement their functionality. However, users lack visibility …

[PDF][PDF] The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments.

L Babun, AK Sikder, A Acar, AS Uluagac - NDSS, 2022 - ndss-symposium.org
In smart environments such as smart homes and offices, the interaction between devices,
users, and apps generate abundant data. Such data contain valuable forensic information …

Ivycide: Smart Intrusion Detection System Against E-IoT Driver Threats

LP Rondon, L Babun, A Aris, K Akkaya… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
The rise of Internet of Things (IoT) devices has led to the proliferation of smart environments
worldwide. Although commodity IoT devices are employed by ordinary end users, complex …

PoisonIvy: (In) secure Practices of Enterprise IoT Systems in Smart Buildings

LP Rondon, L Babun, A Aris, K Akkaya… - Proceedings of the 7th …, 2020 - dl.acm.org
The rise of IoT devices has led to the proliferation of smart buildings, offices, and homes
worldwide. Although commodity IoT devices are employed by ordinary end-users, complex …

HDMI-watch: Smart intrusion detection system against HDMI attacks

LP Rondon, L Babun, K Akkaya… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The High Definition Multimedia Interface (HDMI) is the backbone and the de-facto standard
for Audio/Video connections between video-enabled devices. Today, nearly ten billion HDMI …

A review for insider threats detection using machine learning

A Mittal, U Garg - AIP Conference Proceedings, 2022 - pubs.aip.org
The insider threat involves the theft of confidential information, commercial information,
business plans, intellectual property, or any fraud. The attacker may be an employee, third …

To (US) Be or Not to (US) Be: Discovering Malicious USB Peripherals through Neural Network-Driven Power Analysis

KA Koffi, C Smiliotopoulos, C Kolias, G Kambourakis - Electronics, 2024 - mdpi.com
Nowadays, The Universal Serial Bus (USB) is one of the most adopted communication
standards. However, the ubiquity of this technology has attracted the interest of attackers …