Sign in

Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective.

Sadegh TorabiElias Bou-HarbChadi AssiMario GalluscioAmine BoukhtoutaMourad Debbabi
Published in: DSN (2018)
Keyphrases
  • complex networks
  • peer to peer
  • remote server
  • malicious activities
  • management system
  • activity recognition
  • human activities
  • context aware
  • network traffic
  • computer networks
  • location information
  • network topologies