In the current network-based computing world, where the number of interconnected devices grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at the same rate. To guarantee the correct functioning and performance of novel environments such as Smart Cities, Industry 4.0, or crowdsensing, it is crucial to identify the capabilities of their devices (e.g., sensors, actuators) and detect potential misbehavior that may arise due to cyberattacks, system faults, or misconfigurations. With this goal in mind, a promising research field emerged focusing on creating and managing fingerprints that model the behavior of both the device actions and its components. The article at hand studies the recent growth of the...
In recent decades, an exponential surge in technological advancements has significantly transformed ...
In computing, remote devices may be identified by means of device fingerprinting, which works by col...
Abstract: Browsers are our portal to the web, and if users want a secure, adequate and smart service...
In the current network-based computing world, where the number of interconnected devices grows expon...
Crowdsensing platforms allow sharing data, collected by devices of individuals, to achieve common ob...
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to...
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to...
With the growing diffusion of the Internet of Things (IoT) technology across most of the aspects of ...
Data confidentiality protection is a must for IoT and crowdsensing platforms, and a challenge due to...
The proliferation of Internet of Things (IoT) markets in the last decade introduces new challenges f...
Abstract—In this paper, we introduce GTID, a technique that passively fingerprints wireless devices ...
Over the last decade, the mobile device has become a ubiquitous tool within everyday life. Unfortuna...
peer reviewedEven in the face of strong encryption, the spectacular Internet of Things (IoT...
Abstract—Smart devices equipped with powerful sensing, computing and networking capabilities have pr...
We propose a simple active method for discovering facts about the chipset, the firmware or the drive...
In recent decades, an exponential surge in technological advancements has significantly transformed ...
In computing, remote devices may be identified by means of device fingerprinting, which works by col...
Abstract: Browsers are our portal to the web, and if users want a secure, adequate and smart service...
In the current network-based computing world, where the number of interconnected devices grows expon...
Crowdsensing platforms allow sharing data, collected by devices of individuals, to achieve common ob...
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to...
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to...
With the growing diffusion of the Internet of Things (IoT) technology across most of the aspects of ...
Data confidentiality protection is a must for IoT and crowdsensing platforms, and a challenge due to...
The proliferation of Internet of Things (IoT) markets in the last decade introduces new challenges f...
Abstract—In this paper, we introduce GTID, a technique that passively fingerprints wireless devices ...
Over the last decade, the mobile device has become a ubiquitous tool within everyday life. Unfortuna...
peer reviewedEven in the face of strong encryption, the spectacular Internet of Things (IoT...
Abstract—Smart devices equipped with powerful sensing, computing and networking capabilities have pr...
We propose a simple active method for discovering facts about the chipset, the firmware or the drive...
In recent decades, an exponential surge in technological advancements has significantly transformed ...
In computing, remote devices may be identified by means of device fingerprinting, which works by col...
Abstract: Browsers are our portal to the web, and if users want a secure, adequate and smart service...