TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 38.

Acar, Abbas and Fereidooni, Hossein and Abera, Tigist and Sikder, Amit Kumsr and Miettinen, Markus and Aksu, Hidayet and Conti, Mauro and Sadeghi, Ahmad-Reza (2020):
Peek-a-Boo: I see your smart home activities, even encrypted!
pp. 207-218, WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, July 08.-10., 2020, [Conference or Workshop Item]

Nguyen, Thien Duc and Rieger, Phillip and Miettinen, Markus and Sadeghi, Ahmad-Reza (2020):
Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System.
Workshop on Decentralized IoT Systems and Security (DISS) @ NDSS Symposium 2020, San Diego, USA, 23.-26.02. 2020, [Conference or Workshop Item]

Mitev, Richard and Miettinen, Markus and Sadeghi, Ahmad-Reza (2019):
Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants.
ACM, ASIACCS 2019, Auckland, New Zealand, Juli 2019, DOI: 10.1145/3321705.3329842,
[Conference or Workshop Item]

Marchal, Samuel and Miettinen, Markus and Nguyen, Thien Duc and Sadeghi, Ahmad-Reza and Asokan, N. (2019):
AuDI: Towards autonomous IoT device-type identification using periodic communications.
In: IEEE Journal on Selected Areas in Communications, IEEE, ISSN 0733-8716,
[Article]

OConnor, TJ and Mohamed, Reham and Miettinen, Markus and Enck, William and Reaves, Bradley and Sadeghi, Ahmad-Reza (2019):
HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices.
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, FL, USA, [Conference or Workshop Item]

Nguyen, Thien Duc and Marchal, Samuel and Miettinen, Markus and Fereidooni, Hossein and Asokan, N. and Sadeghi, Ahmad-Reza (2019):
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
In: The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019),
[Conference or Workshop Item]

Marchal, Samuel and Miettinen, Markus and Nguyen, Thien Duc and Sadeghi, Ahmad-Reza and Asokan, N. (2019):
AUDI: Towards Autonomous IoT Device-Type Identification.
In: IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications, [Article]

Miettinen, Markus (2019):
Context and communication profiling for IoT security and privacy: techniques and applications.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Mohamed, Reham and O'Connor, Terrance and Miettinen, Markus and Enck, William and Sadeghi, Ahmad-Reza Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang (Corporate Creators) (2019):
HONEYSCOPE: IoT Device Protection with Deceptive Network Views,.
In: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, [Book Section]

Miettinen, Markus and Sadeghi, Ahmad-Reza (2018):
Internet of things or threats?: on building trust in IoT (keynote). 1:1-1:9.
In: CODES '18 Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis,
Piscataway, NJ, USA, IEEE Press Piscataway, NJ, USA, CODES+ISSS 2018, part of ESWEEK 2018, Torino, Italy, September 30 - October 5, 2018, [Conference or Workshop Item]

Miettinen, Markus and Nguyen, Thien Duc and Asokan, N. and Sadeghi, Ahmad-Reza (2018):
Revisiting Context-Based Pairing in IoT.
In: Proceedings of the 55th Design Automation Conference (DAC), pp. 32:1-32:6,
ACM, 55th Design Automation Conference (DAC), San Francisco, CA, USA, 24.-29.06. 2018, [Conference or Workshop Item]

Asokan, N. and Miettinen, Markus (2018):
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
In: Computer Communications, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2018.07.030,
[Article]

Nguyen, Thien Duc and Marchal, Samuel and Miettinen, Markus and Dang, Minh Hoang and Asokan, N. and Sadeghi, Ahmad-Reza (2018):
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
In: CoRR, abs/1804.07474, [Article]

Fereidooni, Hossein and Classen, Jiska and Spink, Tom and Patras, Paul and Miettinen, Markus and Sadeghi, Ahmad-Reza and Hollick, Matthias and Conti, Mauro (2017):
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID),
Atlanta, Georgia, USA, [Conference or Workshop Item]

Fereidooni, Hossein and Frassetto, Tommaso and Miettinen, Markus and Sadeghi, Ahmad-Reza and Conti, Mauro (2017):
Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
In: The Second IEEE International Workshop on Safe, Energy-Aware, & Reliable Connected Health (CHASE-SEARCH),
Philadelphia, Pennsylvania, USA, [Conference or Workshop Item]

Miettinen, Markus and Marchal, Samuel and Hafeez, Ibbad and Frassetto, Tommaso and Asokan, N. and Sadeghi, Ahmad-Reza and Tarkoma, Sasu (2017):
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017),
IEEE, Atlanta, GA, USA, DOI: 10.1109/ICDCS.2017.284,
[Conference or Workshop Item]

Miettinen, Markus and Marchal, Samuel and Hafeez, Ibbad and Asokan, N. and Sadeghi, Ahmad-Reza and Tarkoma, Sasu (2017):
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017),
DOI: 10.1109/ICDCS.2017.283,
[Conference or Workshop Item]

Lacoste, Marc and Sousa, Paulo and Neves, Nuno and Miettinen, Markus and Ramos, Fernando M.V. and Vukolic, Marko and Charmet, Fabien and Yaich, Reda and Oborzynski, Krzysztof and Vernekar, Gitesh (2016):
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, 3 (5), pp. 64-75. [Article]

Miettinen, Markus and Huang, Jialin and Nguyen, Thien Duc and Asokan, N. and Sadeghi, Ahmad-Reza (2016):
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16),
Darmstadt, Germany, [Conference or Workshop Item]

Do, Trinh Minh Tri and Dousse, Olivier and Miettinen, Markus and Gatica-Perez, Daniel (2015):
A probabilistic kernel method for human mobility prediction with smartphones.
In: Pervasive and Mobile Computing, 20, pp. 13-28. DOI: 10.1016/j.pmcj.2014.09.001,
[Article]

Miettinen, Markus and Asokan, N. and Koushanfar, Farinaz and Nguyen, Thien Duc and Rios, Jon and Sadeghi, Ahmad-Reza and Sobhani, Majid and Yellapantula, Sudha (2015):
I know where you are: Proofs of Presence resilient to malicious provers.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015),
[Conference or Workshop Item]

Miettinen, Markus and Asokan, N. and Nguyen, Thien Duc and Sadeghi, Ahmad-Reza and Sobhani, Majid (2014):
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
In: Proc. ACM Conference on Computer and Communications Security,
ACM, DOI: 10.1145/2660267.2660334,
[Conference or Workshop Item]

Miettinen, Markus and Heuser, Stephan and Kronz, Wiebke and Sadeghi, Ahmad-Reza and Asokan, N. (2014):
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014),
Kyoto, Japan, DOI: 10.1145/2590296.2590337,
[Conference or Workshop Item]

Laurila, Juha and Gatica-Perez, Daniel and Aad, Imad and Blom, Jan and Bornet, Olivier and Do, Trinh Minh Tri and Dousse, Olivier and Eberle, Julien and Miettinen, Markus (2013):
From big smartphone data to worldwide research: The Mobile Data Challenge.
In: Pervasive and Mobile Computing, 9, pp. 752-771. DOI: 10.1016/j.pmcj.2013.07.014,
[Article]

Miettinen, Markus and Heuser, Stephan and Kronz, Wiebke and Sadeghi, Ahmad-Reza and Asokan, N. (2013):
ConXsense – Context Sensing for Adaptive Usable Access Control.
[Report]

Gupta, Aditi and Miettinen, Markus and Asokan, N. and Nagy, Marcin (2012):
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
In: 2012 International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2012 International Confernece on Social Computing (SocialCom), pp. 471 - 480,
IEEE, Amsterdam, The Netherlands, ISBN 978-1-4673-5638-1,
DOI: 10.1109/SocialCom-PASSAT.2012.60,
[Conference or Workshop Item]

Laurila, Juha and Gatica-Perez, Daniel and Aad, Imad and Blom, Jan and Bornet, Olivier and Do, Trinh-Minh-Tri and Dousse, Olivier and Eberle, Julien and Miettinen, Markus (2012):
The Mobile Data Challenge: Big Data for Mobile Computing Research.
In: Proceedings of the Workshop on the Nokia Mobile Data Challenge, in Conjunction with the 10th International Conference on Pervasive Computing,
[Conference or Workshop Item]

Gupta, Aditi and Miettinen, Markus and Nagy, Marcin and Asokan, Nadarajah and Wetzel, Alexandre (2012):
PeerSense: Who is near you?
In: Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 516-518,
Lugano, Switzerland, ISBN 978-1-4673-0905-9,
DOI: 10.1109/PerComW.2012.6197553,
[Conference or Workshop Item]

Shen, Yiyun and Miettinen, Markus and Moen, Pirjo and Kutvonen, Lea (2011):
Privacy Preservation Approach in Service Ecosystems.
In: 15th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW), pp. 283 - 292,
IEEE, Helsinki, Finland, ISBN 978-1-4577-0869-5,
DOI: 10.1109/EDOCW.2011.59,
[Conference or Workshop Item]

Gupta, Aditi and Miettinen, Markus and Asokan, N. (2011):
Using context-profiling to aid in access control decisions on mobile devices.
In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 310 - 312,
Seattle, WA, USA, ISBN 978-1-61284-938-6,
DOI: 10.1109/PERCOMW.2011.5766891,
[Conference or Workshop Item]

Miettinen, Markus and Asokan, N. (2010):
Towards security policy decisions based on context profiling.
In: AISec '10, In: Proceedings of the 3rd ACM workshop on Artificial intelligence and security (AISec '10), pp. 19-23,
ACM, Chicago, Illinois, USA, ISBN 978-1-4503-0088-9,
DOI: 10.1145/1866423.1866428,
[Conference or Workshop Item]

Kokkinen, Heikki and Heikkinen, Mikko and Miettinen, Markus (2009):
Post-Payment Copyright System versus Online Music Shop: Business Model and Privacy.
In: International Journal on Advances in Security, 2 (2-3), pp. 112-128. [Article]

Halonen, Perttu and Miettinen, Markus and Hätönen, Kimmo Iliadis, L. and Vlahavas, I. and Bramer, M. (eds.) (2009):
Computer Log Anomaly Detection Using Frequent Episodes.
In: IFIP International Federation for Information Processing, 296, In: Artificial Intelligence Applications and Innovations III, pp. 417-422, Springer US, ISBN 978-1-4419-0220-7,
DOI: 10.1007/978-1-4419-0221-4_49,
[Book Section]

Battestini, Agathe and Rossow, Christian and Flanagan, Adrian and Miettinen, Markus (2007):
Creating Next Generation Applications and Services for Mobile Devices: Challenges and Opportunities.
In: Proc. IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2007), pp. 1-4,
Athens, ISBN 978-1-4244-1144-3,
DOI: 10.1109/PIMRC.2007.4394846,
[Conference or Workshop Item]

Miettinen, Markus and Halonen, Perttu and Hätönen, Kimmo (2006):
Host-based intrusion detection for advanced mobile devices.
2, In: Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), pp. 72-76,
IEEE Computer Society, Vienna, ISBN 0-7695-2466-4,
DOI: 10.1109/AINA.2006.192,
[Conference or Workshop Item]

Hätönen, Kimmo and Klemettinen, Mika and Miettinen, Markus Boulicaut, Jean-François and Raedt, Luc De and Mannila, Heikki (eds.) (2006):
Constraint-Based Mining and Inductive Databases.
In: LNCS, 3848, In: Constraint-Based Mining and Inductive Databases, pp. 196-215, Springer, ISBN 978-3-540-31331-1,
DOI: 10.1007/11615576_10,
[Book Section]

Hätönen, Kimmo and Boulicaut, Jean-François and Klemettinen, Mika and Miettinen, Markus and Masson, Cyrille Kambayashi, Y. and Mohania, M. K. and Wöss, W. (eds.) (2003):
Comprehensive log compression with frequent patterns.
In: LNCS, 2734, In: Proceedings of the 5th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2003), pp. 360-370,
Springer, http://liris.cnrs.fr/~jboulica/dawak03.pdf, [Conference or Workshop Item]

Hätönen, Kimmo and Halonen, Perttu and Klemettinen, Mika and Miettinen, Markus Boulicaut, J.-F. and Dzeroski, S. (eds.) (2003):
Queryable Lossless Log Database Compression.
In: Proceedings of the Second International Workshop on Knowledge Discovery in Inductive Databases (KDID), pp. 70-79,
ISBN 953-6690-34-9,
[Conference or Workshop Item]

This list was generated on Sat Jan 16 00:30:08 2021 CET.