Towards identifying networks with internet clients using public data
Abstract
References
Index Terms
- Towards identifying networks with internet clients using public data
Recommendations
Rapid IoT device identification at the edge
DistributedML '21: Proceedings of the 2nd ACM International Workshop on Distributed Machine LearningConsumer Internet of Things (IoT) devices are increasingly common in everyday homes, from smart speakers to security cameras. Along with their benefits come potential privacy and security threats. To limit these threats we must implement solutions to ...
Prefix Top Lists: Gaining Insights with Prefixes from Domain-based Top Lists on DNS Deployment
IMC '19: Proceedings of the Internet Measurement ConferenceDomain-based top lists such as the Alexa Top 1M strive to portray the popularity of web domains. Even though their shortcomings (e.g., instability, no aggregation, lack of weights) have been pointed out, domain-based top lists still are an important ...
Deep dive into the IoT backend ecosystem
IMC '22: Proceedings of the 22nd ACM Internet Measurement ConferenceInternet of Things (IoT) devices are becoming increasingly ubiquitous, e.g., at home, in enterprise environments, and in production lines. To support the advanced functionalities of IoT devices, IoT vendors as well as service and cloud companies operate ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Dave Levin,
- Alan Mislove,
- Program Chairs:
- Johanna Amann,
- Matthew Luckie
Sponsors
In-Cooperation
- USENIX Assoc: USENIX Assoc
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
Conference
Acceptance Rates
Upcoming Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 817Total Downloads
- Downloads (Last 12 months)205
- Downloads (Last 6 weeks)25
Other Metrics
Citations
Cited By
View allView Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in