TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 35.

Marchal, Samuel and Miettinen, Markus and Nguyen, Thien Duc and Sadeghi, Ahmad-Reza and Asokan, N. :
AuDI: Towards autonomous IoT device-type identification using periodic communications.
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8511]
In: IEEE Journal on Selected Areas in Communications ISSN 0733-8716
[Article] , (2019)

OConnor, TJ and Mohamed, Reham and Miettinen, Markus and Enck, William and Reaves, Bradley and Sadeghi, Ahmad-Reza :
HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices.
In: Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, FL, USA.
[Conference or Workshop Item] , (2019)

Nguyen, Thien Duc and Marchal, Samuel and Miettinen, Markus and Fereidooni, Hossein and Asokan, N. and Sadeghi, Ahmad-Reza :
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019)
[Conference or Workshop Item] , (2019)

Marchal, Samuel and Miettinen, Markus and Nguyen, Thien Duc and Sadeghi, Ahmad-Reza and Asokan, N. :
AUDI: Towards Autonomous IoT Device-Type Identification.
In: IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications
[Article] , (2019)

Miettinen, Markus :
Context and communication profiling for IoT security and privacy: techniques and applications.
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8374]
Technische Universität , Darmstadt
[Ph.D. Thesis], (2018)

Mohamed, Reham and O'Connor, Terrance and Miettinen, Markus and Enck, William and Sadeghi, Ahmad-Reza
Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang (eds.) :

HONEYSCOPE: IoT Device Protection with Deceptive Network Views,.
In: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings.
[Book Section] , (2019)

Miettinen, Markus and Sadeghi, Ahmad-Reza :
Internet of things or threats?: on building trust in IoT (keynote). 1:1-1:9.
[Online-Edition: https://dl.acm.org/citation.cfm?id=3283569]
In: CODES+ISSS 2018, part of ESWEEK 2018, September 30 - October 5, 2018, Torino, Italy. CODES '18 Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis IEEE Press Piscataway, NJ, USA , Piscataway, NJ, USA
[Conference or Workshop Item] , (2018)

Miettinen, Markus and Nguyen, Thien Duc and Asokan, N. and Sadeghi, Ahmad-Reza :
Revisiting Context-Based Pairing in IoT.
In: 55th Design Automation Conference (DAC), 24.-29.06. 2018, San Francisco, CA, USA. Proceedings of the 55th Design Automation Conference (DAC) ACM
[Conference or Workshop Item] , (2018)

Asokan, N. and Miettinen, Markus :
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
[Online-Edition: http://www.sciencedirect.com/science/article/pii/S0140366418...]
In: Computer Communications ISSN 0140-3664
[Article] , (2018) (In Press)

Nguyen, Thien Duc and Marchal, Samuel and Miettinen, Markus and Dang, Minh Hoang and Asokan, N. and Sadeghi, Ahmad-Reza :
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
[Online-Edition: http://arxiv.org/abs/1804.07474]
In: CoRR, abs/1804.07474
[Article] , (2018)

Fereidooni, Hossein and Classen, Jiska and Spink, Tom and Patras, Paul and Miettinen, Markus and Sadeghi, Ahmad-Reza and Hollick, Matthias and Conti, Mauro :
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
[Conference or Workshop Item] , (2017)

Fereidooni, Hossein and Frassetto, Tommaso and Miettinen, Markus and Sadeghi, Ahmad-Reza and Conti, Mauro :
Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
The Second IEEE International Workshop on Safe, Energy-Aware, & Reliable Connected Health (CHASE-SEARCH)
[Conference or Workshop Item] , (2017)

Miettinen, Markus and Marchal, Samuel and Hafeez, Ibbad and Frassetto, Tommaso and Asokan, N. and Sadeghi, Ahmad-Reza and Tarkoma, Sasu :
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017) IEEE
[Conference or Workshop Item] , (2017)

Miettinen, Markus and Marchal, Samuel and Hafeez, Ibbad and Asokan, N. and Sadeghi, Ahmad-Reza and Tarkoma, Sasu :
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017)
[Conference or Workshop Item] , (2017)

Lacoste, Marc and Sousa, Paulo and Neves, Nuno and Miettinen, Markus and Ramos, Fernando M.V. and Vukolic, Marko and Charmet, Fabien and Yaich, Reda and Oborzynski, Krzysztof and Vernekar, Gitesh :
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, 3 (5) pp. 64-75.
[Article] , (2016)

Miettinen, Markus and Huang, Jialin and Nguyen, Thien Duc and Asokan, N. and Sadeghi, Ahmad-Reza :
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16)
[Conference or Workshop Item] , (2016)

Do, Trinh Minh Tri and Dousse, Olivier and Miettinen, Markus and Gatica-Perez, Daniel :
A probabilistic kernel method for human mobility prediction with smartphones.
In: Pervasive and Mobile Computing, 20 pp. 13-28.
[Article] , (2015)

Miettinen, Markus and Asokan, N. and Koushanfar, Farinaz and Nguyen, Thien Duc and Rios, Jon and Sadeghi, Ahmad-Reza and Sobhani, Majid and Yellapantula, Sudha :
I know where you are: Proofs of Presence resilient to malicious provers.
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Conference or Workshop Item] , (2015)

Miettinen, Markus and Asokan, N. and Nguyen, Thien Duc and Sadeghi, Ahmad-Reza and Sobhani, Majid :
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
Proc. ACM Conference on Computer and Communications Security ACM
[Conference or Workshop Item] , (2014)

Miettinen, Markus and Heuser, Stephan and Kronz, Wiebke and Sadeghi, Ahmad-Reza and Asokan, N. :
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)
[Conference or Workshop Item] , (2014)

Laurila, Juha and Gatica-Perez, Daniel and Aad, Imad and Blom, Jan and Bornet, Olivier and Do, Trinh Minh Tri and Dousse, Olivier and Eberle, Julien and Miettinen, Markus :
From big smartphone data to worldwide research: The Mobile Data Challenge.
In: Pervasive and Mobile Computing, 9 pp. 752-771.
[Article] , (2013)

Miettinen, Markus and Heuser, Stephan and Kronz, Wiebke and Sadeghi, Ahmad-Reza and Asokan, N. :
ConXsense – Context Sensing for Adaptive Usable Access Control.

[Report] , (2013)

Gupta, Aditi and Miettinen, Markus and Asokan, N. and Nagy, Marcin :
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
2012 International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2012 International Confernece on Social Computing (SocialCom) IEEE
[Conference or Workshop Item] , (2012)

Laurila, Juha and Gatica-Perez, Daniel and Aad, Imad and Blom, Jan and Bornet, Olivier and Do, Trinh-Minh-Tri and Dousse, Olivier and Eberle, Julien and Miettinen, Markus :
The Mobile Data Challenge: Big Data for Mobile Computing Research.
Proceedings of the Workshop on the Nokia Mobile Data Challenge, in Conjunction with the 10th International Conference on Pervasive Computing
[Conference or Workshop Item] , (2012)

Gupta, Aditi and Miettinen, Markus and Nagy, Marcin and Asokan, Nadarajah and Wetzel, Alexandre :
PeerSense: Who is near you?
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
[Conference or Workshop Item] , (2012)

Shen, Yiyun and Miettinen, Markus and Moen, Pirjo and Kutvonen, Lea :
Privacy Preservation Approach in Service Ecosystems.
15th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW) IEEE
[Conference or Workshop Item] , (2011)

Gupta, Aditi and Miettinen, Markus and Asokan, N. :
Using context-profiling to aid in access control decisions on mobile devices.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
[Conference or Workshop Item] , (2011)

Miettinen, Markus and Asokan, N. :
Towards security policy decisions based on context profiling.
In: AISec '10 . ACM
[Conference or Workshop Item] , (2010)

Kokkinen, Heikki and Heikkinen, Mikko and Miettinen, Markus :
Post-Payment Copyright System versus Online Music Shop: Business Model and Privacy.
In: International Journal on Advances in Security, 2 (2-3) pp. 112-128.
[Article] , (2009)

Halonen, Perttu and Miettinen, Markus and Hätönen, Kimmo
Iliadis, L. and Vlahavas, I. and Bramer, M. (eds.) :

Computer Log Anomaly Detection Using Frequent Episodes.
In: Artificial Intelligence Applications and Innovations III. IFIP International Federation for Information Processing, 296. Springer US , pp. 417-422. ISBN 978-1-4419-0220-7
[Book Section] , (2009)

Battestini, Agathe and Rossow, Christian and Flanagan, Adrian and Miettinen, Markus :
Creating Next Generation Applications and Services for Mobile Devices: Challenges and Opportunities.
Proc. IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2007)
[Conference or Workshop Item] , (2007)

Miettinen, Markus and Halonen, Perttu and Hätönen, Kimmo :
Host-based intrusion detection for advanced mobile devices.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006) IEEE Computer Society
[Conference or Workshop Item] , (2006)

Hätönen, Kimmo and Klemettinen, Mika and Miettinen, Markus
Boulicaut, Jean-François and Raedt, Luc De and Mannila, Heikki (eds.) :

Constraint-Based Mining and Inductive Databases.
[Online-Edition: https://link.springer.com/chapter/10.1007%2F11615576_10]
In: Constraint-Based Mining and Inductive Databases. LNCS, 3848. Springer , pp. 196-215. ISBN 978-3-540-31331-1
[Book Section] , (2006)

Hätönen, Kimmo and Boulicaut, Jean-François and Klemettinen, Mika and Miettinen, Markus and Masson, Cyrille
Kambayashi, Y. and Mohania, M. K. and Wöss, W. (eds.) :

Comprehensive log compression with frequent patterns.
In: LNCS , 2734 . Springer
[Conference or Workshop Item] , (2003)

Hätönen, Kimmo and Halonen, Perttu and Klemettinen, Mika and Miettinen, Markus
Boulicaut, J.-F. and Dzeroski, S. (eds.) :

Queryable Lossless Log Database Compression.
Proceedings of the Second International Workshop on Knowledge Discovery in Inductive Databases (KDID)
[Conference or Workshop Item] , (2003)

This list was generated on Sat Apr 20 00:28:06 2019 CEST.