Cast Away: On the Security of DLNA Deployments in the SmartTV Ecosystem

G Tian, J Chen, K Yan, S Yang… - 2022 IEEE 22nd …, 2022 - ieeexplore.ieee.org
The casting service on SmartTV has been increasingly used for home entertainment and
business, given the convenience offered in media broadcast and screen sharing. Among the …

Dynamic System Diversification for Securing Cloud-based IoT Subnetworks

H Almohri, L Watson, D Evans, S Billups - ACM Transactions on …, 2022 - dl.acm.org
Remote exploitation attacks use software vulnerabilities to penetrate through a network of
Internet of Things (IoT) devices. This work addresses defending against remote exploitation …

Mining IoT Network Traffic in Smart Homes: Traffic Measurement, Pattern Recognition, and Security Applications

Y Wan - 2023 - search.proquest.com
Recent advances in cyber-physical systems, artificial intelligence, and cloud computing
have driven the widespread deployment of Internet-of-Things (IoT) devices in smart homes …

IoT System Vulnerability Analysis and Network Hardening with Shortest Attack Trace in a Weighted Attack Graph

Y Wan, X Lin, A Sabur, A Chang, K Xu… - Proceedings of the 8th …, 2023 - dl.acm.org
In recent years, Internet of Things (IoT) devices have been extensively deployed in edge
networks, including smart homes and offices. Despite the exciting opportunities afforded by …

[PDF][PDF] Behavior Profiling-Based Approach for the Security of Smart Home Systems

MA BORGI - 2021 - researchgate.net
Recent developments in information and communication technologies related to computer
networks, embedded systems, and artificial intelligence have led to the emergence of a new …

Leveraging Multimodal Sensing for Enhancing the Security and Privacy of Mobile Systems

H Farrukh - 2023 - search.proquest.com
Mobile systems, such as smartphones, wearables (eg, smartwatches, AR/VR headsets), and
IoT devices, have come a long way from being just a method of communication to …

SeniorSentry: Safeguarding AgeTech Devices and Sensors Using Contextual Anomaly Detection and Supervised Machine Learning

A Nandikotkur - 2023 - dspace.library.uvic.ca
With the ever-growing reliance on IoT-enabled sensors to age in place, a need arises to
protect them from malicious activities by detecting attacks or other anomalies. In this work …

Empowering End Users to Mitigate Privacy and Security Risks in Smart-Home Trigger-Action Apps

M Saeidi - 2022 - ir.library.oregonstate.edu
Many home users nowadays use various smart devices to improve the efficiency and
convenience of their home environments. Trigger-action platforms such as “If-This-Then …

Secure Infrastructure for Internet of Medical Things Using Machine Learning

D Gupta - 2021 - search.proquest.com
Abstract Internet of Things (IoT) has grown rapidly in the last decade and continues to
expand offering a wide range of devices to support a diverse set of applications. With …

Hybrid Prompt Learning for Generating Justifications of Security Risks in Automation Rules

B Breve, G Cimino, V Deufemia - ACM Transactions on Intelligent Systems and … - dl.acm.org
Trigger-Action Platforms (TAPs) enable users without programming experience to
personalize the behavior of Internet of Things applications and services through IF-THEN …