Iot sentinel: Automated device-type identification for security enforcement in iot M Miettinen, S Marchal, I Hafeez, N Asokan, AR Sadeghi, S Tarkoma 2017 IEEE 37th international conference on distributed computing systems …, 2017 | 730 | 2017 |
The mobile data challenge: Big data for mobile computing research JK Laurila, D Gatica-Perez, I Aad, O Bornet, TMT Do, O Dousse, J Eberle, ... Pervasive computing, 2012 | 592 | 2012 |
DÏoT: A federated self-learning anomaly detection system for IoT TD Nguyen, S Marchal, M Miettinen, H Fereidooni, N Asokan, AR Sadeghi 2019 IEEE 39th International conference on distributed computing systems …, 2019 | 514 | 2019 |
Peek-a-boo: I see your smart home activities, even encrypted! A Acar, H Fereidooni, T Abera, AK Sikder, M Miettinen, H Aksu, M Conti, ... Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 292 | 2020 |
Audi: Toward autonomous iot device-type identification using periodic communication S Marchal, M Miettinen, TD Nguyen, AR Sadeghi, N Asokan IEEE Journal on Selected Areas in Communications 37 (6), 1402-1412, 2019 | 181 | 2019 |
Method and apparatus for adjusting context-based factors for selecting a security policy MJ Miettinen, N Asokan, A Gupta US Patent 8,898,793, 2014 | 171 | 2014 |
Context-based zero-interaction pairing and key evolution for advanced personal devices M Miettinen, N Asokan, TD Nguyen, AR Sadeghi, M Sobhani Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 156 | 2014 |
From big smartphone data to worldwide research: The mobile data challenge JK Laurila, D Gatica-Perez, I Aad, J Blom, O Bornet, TMT Do, O Dousse, ... Pervasive and Mobile Computing 9 (6), 752-771, 2013 | 123 | 2013 |
HomeSnitch: Behavior transparency and control for smart home IoT devices TJ OConnor, R Mohamed, M Miettinen, W Enck, B Reaves, AR Sadeghi Proceedings of the 12th conference on security and privacy in wireless and …, 2019 | 115 | 2019 |
SAFELearn: Secure aggregation for private federated learning H Fereidooni, S Marchal, M Miettinen, A Mirhoseini, H Möllering, ... 2021 IEEE Security and Privacy Workshops (SPW), 56-62, 2021 | 108 | 2021 |
Conxsense: automated context classification for context-aware access control M Miettinen, S Heuser, W Kronz, AR Sadeghi, N Asokan Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 108 | 2014 |
Poisoning attacks on federated learning-based IoT intrusion detection system TD Nguyen, P Rieger, M Miettinen, AR Sadeghi Proc. Workshop Decentralized IoT Syst. Secur.(DISS), 1-7, 2020 | 102 | 2020 |
Host-based intrusion detection for advanced mobile devices K Hatonen, P Halonen, M Miettinen 20th International Conference on Advanced Information Networking and …, 2006 | 94 | 2006 |
Method and apparatus for selecting a security policy MJ Miettinen, N Asokan US Patent 8,621,656, 2013 | 93 | 2013 |
Method and apparatus for compressing log record information K Hätönen, M Miettinen US Patent 7,778,979, 2010 | 92 | 2010 |
Mind the gap: Security & privacy risks of contact tracing apps L Baumgärtner, A Dmitrienko, B Freisleben, A Gruler, J Höchst, ... 2020 IEEE 19th international conference on trust, security and privacy in …, 2020 | 86 | 2020 |
{FLAME}: Taming backdoors in federated learning TD Nguyen, P Rieger, R De Viti, H Chen, BB Brandenburg, H Yalame, ... 31st USENIX Security Symposium (USENIX Security 22), 1415-1432, 2022 | 85 | 2022 |
A probabilistic kernel method for human mobility prediction with smartphones TMT Do, O Dousse, M Miettinen, D Gatica-Perez Pervasive and Mobile Computing 20, 13-28, 2015 | 85 | 2015 |
Apparatus and a security node for use in determining security attacks M Miettinen, K Hatonen US Patent 8,331,904, 2012 | 80 | 2012 |
Intuitive security policy configuration in mobile devices using context profiling A Gupta, M Miettinen, N Asokan, M Nagy 2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012 | 80 | 2012 |