This proposal provides techniques for a system to identify network devices (e.g., classify their types, operating system families, etc.) based on information associated with contacted servers. In some implementations, the system may be designed to include an auto-update mechanism that enables the system to adapt to changing behavior of devices automatically. Thus, only initial labeled seeds may be needed to initialize the system, which may then automatically adapt itself without manual retraining
Nowadays networks transport a huge amount of information. New applications like VTC, VoIP, streaming...
Part 6: Ph.D. Track: Methods for the Protection of Infrastructure and ServicesInternational audience...
Modern heterogeneous networks present a great challenge for network operators and engineers from a m...
International audienceTo empower end-users in the management of their IoT devices and related servic...
Automatic classification of devices in computer network can be used for detection of anomalies in a ...
The master thesis focuses on problem of identifying device types on a local network. The work explor...
Having a good situational awareness is an important part of computer security. Knowing what is conne...
IoT devices are being widely deployed. But the huge variance among them in the level of security and...
In an Internet of Things (IoT) environment, a large volume of potentially confidential data might be...
IoT devices are being widely deployed. But the huge variance among them in the level of security and...
In the last few years a new concept has gained ground in the technology world. With an increasingly ...
Best demo award: https://tma.ifip.org/2019/awards/International audienceIn this paper, we demonstrat...
The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed new securi...
The Internet of Things (IoT) also called the Internet of Everything is a system of smart interconnec...
© 2018 IEEE. With the widespread adoption of Internet of Things (IoT), billions of everyday objects ...
Nowadays networks transport a huge amount of information. New applications like VTC, VoIP, streaming...
Part 6: Ph.D. Track: Methods for the Protection of Infrastructure and ServicesInternational audience...
Modern heterogeneous networks present a great challenge for network operators and engineers from a m...
International audienceTo empower end-users in the management of their IoT devices and related servic...
Automatic classification of devices in computer network can be used for detection of anomalies in a ...
The master thesis focuses on problem of identifying device types on a local network. The work explor...
Having a good situational awareness is an important part of computer security. Knowing what is conne...
IoT devices are being widely deployed. But the huge variance among them in the level of security and...
In an Internet of Things (IoT) environment, a large volume of potentially confidential data might be...
IoT devices are being widely deployed. But the huge variance among them in the level of security and...
In the last few years a new concept has gained ground in the technology world. With an increasingly ...
Best demo award: https://tma.ifip.org/2019/awards/International audienceIn this paper, we demonstrat...
The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed new securi...
The Internet of Things (IoT) also called the Internet of Everything is a system of smart interconnec...
© 2018 IEEE. With the widespread adoption of Internet of Things (IoT), billions of everyday objects ...
Nowadays networks transport a huge amount of information. New applications like VTC, VoIP, streaming...
Part 6: Ph.D. Track: Methods for the Protection of Infrastructure and ServicesInternational audience...
Modern heterogeneous networks present a great challenge for network operators and engineers from a m...