Attacking and Protecting Tunneled Traffic of Smart Home Devices.
Ahmed AlshehriJacob GranleyChuan YuePublished in: CODASPY (2020)
Keyphrases
- smart home
- smart home environment
- intelligent environments
- home environment
- embedded systems
- home environments
- activity recognition
- context aware
- assisted living
- ubiquitous computing environments
- ambient intelligence
- home automation
- mobile devices
- management system
- ambient assisted living
- surveillance system
- energy efficiency
- ubiquitous environments
- human activities
- network traffic
- intelligent systems
- older adults
- network devices
- smart environments
- real time
- intelligent agents
- low cost
- cooperative
- access control
- embedded devices
- training data
- knowledge base
- machine learning