Abstract is missing.
- Combining MUD Policies with SDN for IoT Intrusion DetectionAyyoob Hamza, Hassan Habibi Gharakheili, Vijay Sivaraman. 1-7 [doi]
- Clear as MUD: Generating, Validating and Applying IoT Behavioral ProfilesAyyoob Hamza, Dinesha Ranathunga, Hassan Habibi Gharakheili, Matthew Roughan, Vijay Sivaraman. 8-14 [doi]
- Towards a Resilient Smart HomeTam Thanh Doan, Reihaneh Safavi-Naini, Shuai Li, Sepideh Avizheh, Muni Venkateswarlu K., Philip W. L. Fong. 15-21 [doi]
- Traversing the Quagmire that is Privacy in your Smart HomeChuhan Gao, Varun Chandrasekaran, Kassem Fawaz, Suman Banerjee. 22-28 [doi]
- Web-based Attacks to Discover and Control Local IoT DevicesGunes Acar, Danny Yuxing Huang, Frank Li, Arvind Narayanan, Nick Feamster. 29-35 [doi]
- IP-Based IoT Device DetectionHang Guo, John S. Heidemann. 36-42 [doi]
- A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic ObfuscationTrisha Datta, Noah Apthorpe, Nick Feamster. 43-48 [doi]
- Towards Secure Distributed Trust Management on a Global Scale: An analytical approach for applying Distributed Ledgers for authorization in the IoTNikolaos Alexopoulos, Sheikh Mahbub Habib, Max Mühlhäuser. 49-54 [doi]