Device Behavior Identification in Encrypted Home Security Camera Traffic.
Shuhe LiuXiaolin XuZhefeng NanPublished in: ICTAI (2022)
Keyphrases
- real time
- field of view
- home network
- hand held
- information security
- encryption scheme
- encryption key
- wearable devices
- traffic patterns
- camera calibration
- encryption decryption
- encryption algorithm
- network security
- surveillance system
- network traffic
- camera motion
- access control
- vision system
- multiple cameras
- security policies
- medical devices
- security issues
- structure from motion
- denial of service attacks
- focal length
- internet service providers
- inertial sensors
- network layer
- network management
- multi camera
- video camera
- road network
- low cost