TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 35.

Marchal, Samuel and Miettinen, Markus and Nguyen, Thien Duc and Sadeghi, Ahmad-Reza and Asokan, N. (2019):
AuDI: Towards autonomous IoT device-type identification using periodic communications.
In: IEEE Journal on Selected Areas in Communications, IEEE, ISSN 0733-8716,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8511],
[Article]

OConnor, TJ and Mohamed, Reham and Miettinen, Markus and Enck, William and Reaves, Bradley and Sadeghi, Ahmad-Reza (2019):
HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices.
In: Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, FL, USA, [Conference or Workshop Item]

Nguyen, Thien Duc and Marchal, Samuel and Miettinen, Markus and Fereidooni, Hossein and Asokan, N. and Sadeghi, Ahmad-Reza (2019):
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
In: The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019), [Conference or Workshop Item]

Marchal, Samuel and Miettinen, Markus and Nguyen, Thien Duc and Sadeghi, Ahmad-Reza and Asokan, N. (2019):
AUDI: Towards Autonomous IoT Device-Type Identification.
In: IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications, [Article]

Miettinen, Markus (2019):
Context and communication profiling for IoT security and privacy: techniques and applications.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8374],
[Ph.D. Thesis]

Mohamed, Reham and O'Connor, Terrance and Miettinen, Markus and Enck, William and Sadeghi, Ahmad-Reza
Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang (Corporate Creators) (2019):
HONEYSCOPE: IoT Device Protection with Deceptive Network Views,.
In: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, [Book Section]

Miettinen, Markus and Sadeghi, Ahmad-Reza (2018):
Internet of things or threats?: on building trust in IoT (keynote). 1:1-1:9.
In: CODES '18 Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, Piscataway, NJ, USA, IEEE Press Piscataway, NJ, USA, In: CODES+ISSS 2018, part of ESWEEK 2018, Torino, Italy, September 30 - October 5, 2018, [Online-Edition: https://dl.acm.org/citation.cfm?id=3283569],
[Conference or Workshop Item]

Miettinen, Markus and Nguyen, Thien Duc and Asokan, N. and Sadeghi, Ahmad-Reza (2018):
Revisiting Context-Based Pairing in IoT.
In: Proceedings of the 55th Design Automation Conference (DAC), ACM, In: 55th Design Automation Conference (DAC), San Francisco, CA, USA, 24.-29.06. 2018, [Conference or Workshop Item]

Asokan, N. and Miettinen, Markus (2018):
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
In: Computer Communications, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2018.07.030,
[Online-Edition: http://www.sciencedirect.com/science/article/pii/S0140366418...],
[Article]

Nguyen, Thien Duc and Marchal, Samuel and Miettinen, Markus and Dang, Minh Hoang and Asokan, N. and Sadeghi, Ahmad-Reza (2018):
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
In: CoRR, abs/1804.07474, [Online-Edition: http://arxiv.org/abs/1804.07474],
[Article]

Fereidooni, Hossein and Classen, Jiska and Spink, Tom and Patras, Paul and Miettinen, Markus and Sadeghi, Ahmad-Reza and Hollick, Matthias and Conti, Mauro (2017):
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Atlanta, Georgia, USA, [Conference or Workshop Item]

Fereidooni, Hossein and Frassetto, Tommaso and Miettinen, Markus and Sadeghi, Ahmad-Reza and Conti, Mauro (2017):
Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
In: The Second IEEE International Workshop on Safe, Energy-Aware, & Reliable Connected Health (CHASE-SEARCH), Philadelphia, Pennsylvania, USA, [Conference or Workshop Item]

Miettinen, Markus and Marchal, Samuel and Hafeez, Ibbad and Frassetto, Tommaso and Asokan, N. and Sadeghi, Ahmad-Reza and Tarkoma, Sasu (2017):
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), IEEE, Atlanta, GA, USA, DOI: 10.1109/ICDCS.2017.284,
[Conference or Workshop Item]

Miettinen, Markus and Marchal, Samuel and Hafeez, Ibbad and Asokan, N. and Sadeghi, Ahmad-Reza and Tarkoma, Sasu (2017):
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), DOI: 10.1109/ICDCS.2017.283,
[Conference or Workshop Item]

Lacoste, Marc and Sousa, Paulo and Neves, Nuno and Miettinen, Markus and Ramos, Fernando M.V. and Vukolic, Marko and Charmet, Fabien and Yaich, Reda and Oborzynski, Krzysztof and Vernekar, Gitesh (2016):
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, pp. 64-75, 3, (5), [Article]

Miettinen, Markus and Huang, Jialin and Nguyen, Thien Duc and Asokan, N. and Sadeghi, Ahmad-Reza (2016):
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16), Darmstadt, Germany, [Conference or Workshop Item]

Do, Trinh Minh Tri and Dousse, Olivier and Miettinen, Markus and Gatica-Perez, Daniel (2015):
A probabilistic kernel method for human mobility prediction with smartphones.
In: Pervasive and Mobile Computing, pp. 13-28, 20, DOI: 10.1016/j.pmcj.2014.09.001,
[Article]

Miettinen, Markus and Asokan, N. and Koushanfar, Farinaz and Nguyen, Thien Duc and Rios, Jon and Sadeghi, Ahmad-Reza and Sobhani, Majid and Yellapantula, Sudha (2015):
I know where you are: Proofs of Presence resilient to malicious provers.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Conference or Workshop Item]

Miettinen, Markus and Asokan, N. and Nguyen, Thien Duc and Sadeghi, Ahmad-Reza and Sobhani, Majid (2014):
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
In: Proc. ACM Conference on Computer and Communications Security, ACM, DOI: 10.1145/2660267.2660334,
[Conference or Workshop Item]

Miettinen, Markus and Heuser, Stephan and Kronz, Wiebke and Sadeghi, Ahmad-Reza and Asokan, N. (2014):
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), Kyoto, Japan, DOI: 10.1145/2590296.2590337,
[Conference or Workshop Item]

Laurila, Juha and Gatica-Perez, Daniel and Aad, Imad and Blom, Jan and Bornet, Olivier and Do, Trinh Minh Tri and Dousse, Olivier and Eberle, Julien and Miettinen, Markus (2013):
From big smartphone data to worldwide research: The Mobile Data Challenge.
In: Pervasive and Mobile Computing, pp. 752-771, 9, DOI: 10.1016/j.pmcj.2013.07.014,
[Article]

Miettinen, Markus and Heuser, Stephan and Kronz, Wiebke and Sadeghi, Ahmad-Reza and Asokan, N. (2013):
ConXsense – Context Sensing for Adaptive Usable Access Control.
[Report]

Gupta, Aditi and Miettinen, Markus and Asokan, N. and Nagy, Marcin (2012):
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
In: 2012 International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2012 International Confernece on Social Computing (SocialCom), IEEE, Amsterdam, The Netherlands, ISBN 978-1-4673-5638-1,
DOI: 10.1109/SocialCom-PASSAT.2012.60,
[Conference or Workshop Item]

Laurila, Juha and Gatica-Perez, Daniel and Aad, Imad and Blom, Jan and Bornet, Olivier and Do, Trinh-Minh-Tri and Dousse, Olivier and Eberle, Julien and Miettinen, Markus (2012):
The Mobile Data Challenge: Big Data for Mobile Computing Research.
In: Proceedings of the Workshop on the Nokia Mobile Data Challenge, in Conjunction with the 10th International Conference on Pervasive Computing, [Conference or Workshop Item]

Gupta, Aditi and Miettinen, Markus and Nagy, Marcin and Asokan, Nadarajah and Wetzel, Alexandre (2012):
PeerSense: Who is near you?
In: Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Lugano, Switzerland, ISBN 978-1-4673-0905-9,
DOI: 10.1109/PerComW.2012.6197553,
[Conference or Workshop Item]

Shen, Yiyun and Miettinen, Markus and Moen, Pirjo and Kutvonen, Lea (2011):
Privacy Preservation Approach in Service Ecosystems.
In: 15th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW), IEEE, Helsinki, Finland, ISBN 978-1-4577-0869-5,
DOI: 10.1109/EDOCW.2011.59,
[Conference or Workshop Item]

Gupta, Aditi and Miettinen, Markus and Asokan, N. (2011):
Using context-profiling to aid in access control decisions on mobile devices.
In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Seattle, WA, USA, ISBN 978-1-61284-938-6,
DOI: 10.1109/PERCOMW.2011.5766891,
[Conference or Workshop Item]

Miettinen, Markus and Asokan, N. (2010):
Towards security policy decisions based on context profiling.
In: Proceedings of the 3rd ACM workshop on Artificial intelligence and security (AISec '10), ACM, Chicago, Illinois, USA, In: AISec '10, ISBN 978-1-4503-0088-9,
DOI: 10.1145/1866423.1866428,
[Conference or Workshop Item]

Kokkinen, Heikki and Heikkinen, Mikko and Miettinen, Markus (2009):
Post-Payment Copyright System versus Online Music Shop: Business Model and Privacy.
In: International Journal on Advances in Security, pp. 112-128, 2, (2-3), [Article]

Halonen, Perttu and Miettinen, Markus and Hätönen, Kimmo
Iliadis, L. and Vlahavas, I. and Bramer, M. (eds.) (2009):
Computer Log Anomaly Detection Using Frequent Episodes.
In: Artificial Intelligence Applications and Innovations III, Springer US, pp. 417-422, DOI: 10.1007/978-1-4419-0221-4_49,
[Book Section]

Battestini, Agathe and Rossow, Christian and Flanagan, Adrian and Miettinen, Markus (2007):
Creating Next Generation Applications and Services for Mobile Devices: Challenges and Opportunities.
In: Proc. IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2007), Athens, ISBN 978-1-4244-1144-3,
DOI: 10.1109/PIMRC.2007.4394846,
[Conference or Workshop Item]

Miettinen, Markus and Halonen, Perttu and Hätönen, Kimmo (2006):
Host-based intrusion detection for advanced mobile devices.
In: Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), IEEE Computer Society, Vienna, 2, ISBN 0-7695-2466-4,
DOI: 10.1109/AINA.2006.192,
[Conference or Workshop Item]

Hätönen, Kimmo and Klemettinen, Mika and Miettinen, Markus
Boulicaut, Jean-François and Raedt, Luc De and Mannila, Heikki (eds.) (2006):
Constraint-Based Mining and Inductive Databases.
In: Constraint-Based Mining and Inductive Databases, Springer, pp. 196-215, DOI: 10.1007/11615576_10,
[Online-Edition: https://link.springer.com/chapter/10.1007%2F11615576_10],
[Book Section]

Hätönen, Kimmo and Boulicaut, Jean-François and Klemettinen, Mika and Miettinen, Markus and Masson, Cyrille
Kambayashi, Y. and Mohania, M. K. and Wöss, W. (eds.) (2003):
Comprehensive log compression with frequent patterns.
In: Proceedings of the 5th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2003), Springer, http://liris.cnrs.fr/~jboulica/dawak03.pdf, In: LNCS, 2734, [Conference or Workshop Item]

Hätönen, Kimmo and Halonen, Perttu and Klemettinen, Mika and Miettinen, Markus
Boulicaut, J.-F. and Dzeroski, S. (eds.) (2003):
Queryable Lossless Log Database Compression.
In: Proceedings of the Second International Workshop on Knowledge Discovery in Inductive Databases (KDID), ISBN 953-6690-34-9,
[Conference or Workshop Item]

This list was generated on Sat Jun 15 01:21:33 2019 CEST.