-
2
-
-
85180620698
-
-
“Arduino unosetup,” http://www.arduino.cc/en/Main/ArduinoBoardUno/.
-
Arduino unosetup
-
-
-
6
-
-
84907406395
-
-
“Apple updates ios to 6.1,” http://www.apple.com/pr/library/2013/01/28Apple-Updates-iOS-to-6-1.html, 2013.
-
(2013)
Apple updates ios to 6.1
-
-
-
8
-
-
84857196434
-
Mems accelerometers
-
March
-
M. Andrejasic, “Mems accelerometers,” Seminar, March 2008.
-
(2008)
Seminar
-
-
Andrejasic, M.1
-
10
-
-
84872119987
-
Practicality of accelerometer side channels on smartphones
-
A. J. Aviv, B. Sapp, M. Blaze, and J. M. Smith, “Practicality of accelerometer side channels on smartphones,” in Proceedings of the 28th Annual Computer Security Applications Conference, ser. ACSAC’12, 2012, pp. 41–50.
-
(2012)
Proceedings of the 28th Annual Computer Security Applications Conference, ser. ACSAC’12
, pp. 41-50
-
-
Aviv, A. J.1
Sapp, B.2
Blaze, M.3
Smith, J. M.4
-
11
-
-
84872119987
-
Practicality of accelerometer side channels on smartphones
-
ACM
-
A. J. Aviv, B. Sapp, M. Blaze, and J. M. Smith, “Practicality of accelerometer side channels on smartphones,” in Proceedings of the 28th Annual Computer Security Applications Conference. ACM, 2012, pp. 41–50.
-
(2012)
Proceedings of the 28th Annual Computer Security Applications Conference
, pp. 41-50
-
-
Aviv, A. J.1
Sapp, B.2
Blaze, M.3
Smith, J. M.4
-
12
-
-
0035478854
-
Random forests
-
L. Breiman, “Random forests,” Machine Learning, vol. 45, no. 1, pp. 1049–1060, 2001.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 1049-1060
-
-
Breiman, L.1
-
13
-
-
0030211964
-
Bagging predictors
-
L. Breiman, “Bagging predictors,” in Machine Learning, 1996, pp. 123–140.
-
(1996)
Machine Learning
, pp. 123-140
-
-
Breiman, L.1
-
14
-
-
84863403768
-
Conditional likelihood maximisation: A unifying framework for information theoretic feature selection
-
G. Brown, A. Pocock, M.-J. Zhao, and M. Lujan, “Conditional likelihood maximisation: A unifying framework for information theoretic feature selection,” The Journal of Machine Learning Research, vol. 13, pp. 27–66, 2012.
-
(2012)
The Journal of Machine Learning Research
, vol.13
, pp. 27-66
-
-
Brown, G.1
Pocock, A.2
Zhao, M.-J.3
Lujan, M.4
-
16
-
-
84863091977
-
On the practicality of motion based keystroke inference attack
-
Springer
-
L. Cai and H. Chen, “On the practicality of motion based keystroke inference attack,” in Trust and Trustworthy Computing. Springer, 2012, pp. 273–290.
-
(2012)
Trust and Trustworthy Computing
, pp. 273-290
-
-
Cai, L.1
Chen, H.2
-
17
-
-
84923201020
-
Defending against sensor-sniffing attacks on mobile phones
-
ACM
-
L. Cai, S. Machiraju, and H. Chen, “Defending against sensor-sniffing attacks on mobile phones,” in Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds. ACM, 2009, pp. 31–36.
-
(2009)
Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds
, pp. 31-36
-
-
Cai, L.1
Machiraju, S.2
Chen, H.3
-
19
-
-
84890107497
-
Identifying unique devices through wireless fingerprinting
-
L. C. C. Desmond, C. C. Yuan, T. C. Pheng, and R. S. Lee, “Identifying unique devices through wireless fingerprinting,” in Proceedings of ACM WiSec, 2008.
-
(2008)
Proceedings of ACM WiSec
-
-
Desmond, L. C. C.1
Yuan, C. C.2
Pheng, T. C.3
Lee, R. S.4
-
20
-
-
0030211964
-
Bagging predictors
-
T. Dietterich, “Bagging predictors,” Machine Learning, vol. 24, no. 2, pp. 123–140, 1996.
-
(1996)
Machine Learning
, vol.24
, Issue.2
, pp. 123-140
-
-
Dietterich, T.1
-
21
-
-
80053403826
-
Ensemble methods in machine learning
-
January
-
T. Dietterich, “Ensemble methods in machine learning,” Multiple Classifier Systems, vol. 45, no. 1, pp. 1–15, January 2000.
-
(2000)
Multiple Classifier Systems
, vol.45
, Issue.1
, pp. 1-15
-
-
Dietterich, T.1
-
22
-
-
85042606531
-
Manufacturing and reliability challenges with qfn
-
C. T. Dr. February
-
C. T. Dr. Craig Hillman, “Manufacturing and reliability challenges with qfn,” SMTA DC Chapter, vol. 45, no. 1, pp. 1049–1060, February 2009.
-
(2009)
SMTA DC Chapter
, vol.45
, Issue.1
, pp. 1049-1060
-
-
Hillman, Craig1
-
23
-
-
77955457549
-
How unique is your web browser?
-
Springer
-
P. Eckersley, “How unique is your web browser?” in Privacy Enhancing Technologies. Springer, 2010, pp. 1–18.
-
(2010)
Privacy Enhancing Technologies
, pp. 1-18
-
-
Eckersley, P.1
-
24
-
-
84888331381
-
PiOS: Detecting privacy leaks in iOS applications
-
M. Egele, C. Kruegel, E. Kirda, and G. Vigna, “PiOS: Detecting privacy leaks in iOS applications,” in Proceedings of the Network and Distributed System Security Symposium, 2011.
-
(2011)
Proceedings of the Network and Distributed System Security Symposium
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
27
-
-
79955570859
-
Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, “Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones,” in Proceedings of USENIX OSDI, 2010, pp. 1–6.
-
(2010)
Proceedings of USENIX OSDI
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L. P.4
Jung, J.5
McDaniel, P.6
Sheth, A. N.7
-
28
-
-
85025700509
-
A study of android application security
-
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, “A study of android application security,” in Proceedings of the USENIX security symposium, 2011.
-
(2011)
Proceedings of the USENIX security symposium
-
-
Enck, W.1
Octeau, D.2
McDaniel, P.3
Chaudhuri, S.4
-
29
-
-
34247324807
-
Detecting identity-based attacks in wireless networks using signalprints
-
D. Faria and D. Cheriton, “Detecting identity-based attacks in wireless networks using signalprints,” in Proceedings of ACM WiSec, 2006, p. 43-52.
-
(2006)
Proceedings of ACM WiSec
, pp. 43-52
-
-
Faria, D.1
Cheriton, D.2
-
30
-
-
85018108881
-
Passive data link layer 802.11 wireless device driver fingerprinting
-
Vancouver, BC, Canada, August
-
J. Franklin, D. McCoy, P. Tabriz, and V. Neagoe, “Passive data link layer 802.11 wireless device driver fingerprinting,” in USENIX Security, Vancouver, BC, Canada, August 2006.
-
(2006)
USENIX Security
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
-
32
-
-
85180632974
-
Sequence number-based mac address spoof detection. recent advances in intrusion detection: 8th international symposium
-
Raid, 2006
-
F. Guo and T. Chiueh, “Sequence number-based mac address spoof detection. recent advances in intrusion detection: 8th international symposium,” in 8th International Symposium, Raid, 2005,2006.
-
(2005)
8th International Symposium
-
-
Guo, F.1
Chiueh, T.2
-
34
-
-
85180634731
-
Novel identification of intercepted signals from unknown radio transmitters
-
A. Y. H.C. Choe, C.E. Poole and H. Szu, “Novel identification of intercepted signals from unknown radio transmitters,” SPIE, vol. 2491, no. 504, 2003.
-
(2003)
SPIE
, vol.2491
, Issue.504
-
-
Choe, A. Y. H.C.1
Poole, C.E.2
Szu, H.3
-
35
-
-
49049105790
-
Radio frequency fingerprinting for intrusion detection in wirless networks
-
M. B. J. Hall and E. Kranakis, “Radio frequency fingerprinting for intrusion detection in wirless networks,” in Defendable and Secure Computing, 2005.
-
(2005)
Defendable and Secure Computing
-
-
Hall, M. B. J.1
Kranakis, E.2
-
36
-
-
70450014575
-
Comparing anomaly-detection algorithms for keystroke dynamics
-
IEEE
-
K. S. Killourhy and R. A. Maxion, “Comparing anomaly-detection algorithms for keystroke dynamics,” in Proceedings of IEEE DSN. IEEE, 2009, pp. 125–134.
-
(2009)
Proceedings of IEEE DSN
, pp. 125-134
-
-
Killourhy, K. S.1
Maxion, R. A.2
-
37
-
-
27544460278
-
Remote physical device fingerprinting
-
Washington, DC, USA, September
-
T. Kohno, A. Broido, and K. Claffy, “Remote physical device fingerprinting,” in IEEE Symposium on Security and Privacy, Washington, DC, USA, September 2005.
-
(2005)
IEEE Symposium on Security and Privacy
-
-
Kohno, T.1
Broido, A.2
Claffy, K.3
-
39
-
-
84979563757
-
Specific emitter identification (sei) and classical parameter fusion technology
-
L. Langley, “Specific emitter identification (sei) and classical parameter fusion technology,” in Proceedings of WESCON, 1993.
-
(1993)
Proceedings of WESCON
-
-
Langley, L.1
-
41
-
-
48149099022
-
Detecting impersonation attacks in future wireless and mobile networks
-
J. H. M. Barbeau and E. Kranakis, “Detecting impersonation attacks in future wireless and mobile networks,” in Proceedings of MADNES, 2006.
-
(2006)
Proceedings of MADNES
-
-
Barbeau, J. H. M.1
Kranakis, E.2
-
42
-
-
77956202935
-
Combining a predictions for accurate recommender systems
-
A. T. M. Jahrer and R. Legenstein, “Combining a predictions for accurate recommender systems,” in Proceedings of ACM SIGKDD, 2010, pp. 693–702.
-
(2010)
Proceedings of ACM SIGKDD
, pp. 693-702
-
-
Jahrer, A. T. M.1
Legenstein, R.2
-
43
-
-
80755143996
-
(sp) iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers
-
P. Marquardt, A. Verma, H. Carter, and P. Traynor, “(sp) iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers,” in Proceedings of ACM CCS, 2011, pp. 551–562.
-
(2011)
Proceedings of ACM CCS
, pp. 551-562
-
-
Marquardt, P.1
Verma, A.2
Carter, H.3
Traynor, P.4
-
44
-
-
77956007436
-
Cubic spline interpolation
-
January
-
S. McKinley and M. Levine, “Cubic spline interpolation,” College of the Redwoods, vol. 45, no. 1, pp. 1049–1060, January 1998.
-
(1998)
College of the Redwoods
, vol.45
, Issue.1
, pp. 1049-1060
-
-
McKinley, S.1
Levine, M.2
-
45
-
-
84864372370
-
Tapprints: your finger taps have fingerprints
-
E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R. R. Choudhury, “Tapprints: your finger taps have fingerprints,” in Proceedings of ACM Mobisys, 2012, pp. 323–336.
-
(2012)
Proceedings of ACM Mobisys
, pp. 323-336
-
-
Miluzzo, E.1
Varshavsky, A.2
Balakrishnan, S.3
Choudhury, R. R.4
-
46
-
-
84881232179
-
Fingerprinting information in javascript implementations
-
K. Mowery, D. Bogenreif, S. Yilek, and H. Shacham, “Fingerprinting information in javascript implementations,” in Proceedings of Web, vol. 2, 2011.
-
(2011)
Proceedings of Web
, vol.2
-
-
Mowery, K.1
Bogenreif, D.2
Yilek, S.3
Shacham, H.4
-
47
-
-
84881238242
-
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting
-
0
-
N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna, “Cookieless monster: Exploring the ecosystem of web-based device fingerprinting,” 2013 IEEE Symposium on Security and Privacy, vol. 0, pp. 541–555, 2013.
-
(2013)
2013 IEEE Symposium on Security and Privacy
, pp. 541-555
-
-
Nikiforakis, N.1
Kapravelos, A.2
Joosen, W.3
Kruegel, C.4
Piessens, F.5
Vigna, G.6
-
49
-
-
84860294696
-
Accessory: password inference using accelerometers on smartphones
-
ACM
-
E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang, “Accessory: password inference using accelerometers on smartphones,” in Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications. ACM, 2012, p. 9.
-
(2012)
Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications
, pp. 9
-
-
Owusu, E.1
Han, J.2
Das, S.3
Perrig, A.4
Zhang, J.5
-
50
-
-
37749006403
-
802.11 user fingerprinting
-
J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall, “802.11 user fingerprinting,” in Proceedings of MobiCom, 2007, pp. 99–110.
-
(2007)
Proceedings of MobiCom
, pp. 99-110
-
-
Pang, J.1
Greenstein, B.2
Gummadi, R.3
Seshan, S.4
Wetherall, D.5
-
51
-
-
37749047975
-
Robust location distinction using temporal link signatures
-
N. Patwari and S. K. Kasera, “Robust location distinction using temporal link signatures,” in Proceedings of MobiCon, 2007.
-
(2007)
Proceedings of MobiCon
-
-
Patwari, N.1
Kasera, S. K.2
-
53
-
-
0002964172
-
On calibrating measurements of packet transit times
-
V. Paxson, “On calibrating measurements of packet transit times,” in SIGMETRICS, 1998.
-
(1998)
SIGMETRICS
-
-
Paxson, V.1
-
55
-
-
85180626613
-
Device identification via analog signal fingerprinting: A matched filter approach
-
M. M. R. Gerdes, T. Daniels and S. Russell, “Device identification via analog signal fingerprinting: A matched filter approach,” in Proceedings of NDSS, 2006.
-
(2006)
Proceedings of NDSS
-
-
Gerdes, M. M. R.1
Daniels, T.2
Russell, S.3
-
56
-
-
85180627261
-
Cellular security: better, but foes still lurk
-
IEEE
-
M. Reizenman, “Cellular security: better, but foes still lurk,” in Spectrum, IEEE, 2000.
-
(2000)
Spectrum
-
-
Reizenman, M.1
-
57
-
-
33846997176
-
Electromagnetic signatures of wlan cards and network security
-
K. Remley, C. Grosvenor, R. Johnk, D. Novotny, P. Hale, M. McKinley, A. Karygiannis, and E. Antonakakis, “Electromagnetic signatures of wlan cards and network security,” in ISSPIT, 2005.
-
(2005)
ISSPIT
-
-
Remley, K.1
Grosvenor, C.2
Johnk, R.3
Novotny, D.4
Hale, P.5
McKinley, M.6
Karygiannis, A.7
Antonakakis, E.8
-
58
-
-
0038343934
-
Information fusion in biometrics
-
June
-
A. Ross and A. Jain, “Information fusion in biometrics,” Pattern Recognition Letters, vol. 24, no. 13, pp. 2115–2125, June 2003.
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.13
, pp. 2115-2125
-
-
Ross, A.1
Jain, A.2
-
59
-
-
84857164924
-
Soundcomber: A stealthy and context-aware sound trojan for smartphones
-
R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang, “Soundcomber: A stealthy and context-aware sound trojan for smartphones,” in Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS), 2011, pp. 17–33.
-
(2011)
Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS)
, pp. 17-33
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
60
-
-
85180626326
-
Estimation and removal of clock skew from network delay measurements
-
D. T. Sue B. Moont, Paul Skelly, “Estimation and removal of clock skew from network delay measurements,” in Proceedings of InfoCom, 1999.
-
(1999)
Proceedings of InfoCom
-
-
Sue, D. T.1
Moont, B.2
Skelly, Paul3
-
62
-
-
26444609828
-
Capacity and examples of template-protecting biometric authentication systems
-
P. Tuyls and J. Goseling, “Capacity and examples of template-protecting biometric authentication systems,” in ECCV, 2004.
-
(2004)
ECCV
-
-
Tuyls, P.1
Goseling, J.2
-
63
-
-
34249822230
-
Rf fingerprinting
-
O. Ureten and N. Serinken, “Rf fingerprinting,” Electrical and Computer Engineering Canadian Journal, vol. 32, no. 1, pp. 27–33, 2007.
-
(2007)
Electrical and Computer Engineering Canadian Journal
, vol.32
, Issue.1
, pp. 27-33
-
-
Ureten, O.1
Serinken, N.2
-
65
-
-
84882198584
-
Compromising electromagnetic emanations of wired and wireless keyboards
-
M. Vuagnoux and S. Pasini, “Compromising electromagnetic emanations of wired and wireless keyboards,” in Proceedings of USENIX security, 2009, pp. 1–16.
-
(2009)
Proceedings of USENIX security
, pp. 1-16
-
-
Vuagnoux, M.1
Pasini, S.2
-
66
-
-
33745636711
-
Detecting wireless lan mac address spoofing
-
J. Wright, “Detecting wireless lan mac address spoofing,” White Paper, 2003.
-
(2003)
White Paper
-
-
Wright, J.1
-
67
-
-
84860679345
-
Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors
-
Z. Xu, K. Bai, and S. Zhu, “Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors,” in Proceedings of ACM conference on Security and Privacy in Wireless and Mobile Networks, 2012, pp. 113–124.
-
(2012)
Proceedings of ACM conference on Security and Privacy in Wireless and Mobile Networks
, pp. 113-124
-
-
Xu, Z.1
Bai, K.2
Zhu, S.3
-
68
-
-
85180788168
-
Host fingerprinting and tracking on the web: Privacy and security implications
-
T.-F. Yen, Y. Xie, F. Yu, R. P. Yu, and M. Abadi, “Host fingerprinting and tracking on the web: Privacy and security implications,” in Proceedings of NDSS, 2012.
-
(2012)
Proceedings of NDSS
-
-
Yen, T.-F.1
Xie, Y.2
Yu, F.3
Yu, R. P.4
Abadi, M.5
-
69
-
-
77950788046
-
Panorama: capturing system-wide information flow for malware detection and analysis
-
ACM
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, “Panorama: capturing system-wide information flow for malware detection and analysis,” in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 116–127.
-
(2007)
Proceedings of the 14th ACM conference on Computer and communications security
, pp. 116-127
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
70
-
-
34247339387
-
Securing wireless systems via lower layer enforcements
-
R. M. Z. Li, W. Xu and W. Trappe, “Securing wireless systems via lower layer enforcements,” in Proceedings of ACM Wise, 2006, pp. 33–42.
-
(2006)
Proceedings of ACM Wise
, pp. 33-42
-
-
Li, R. M. Z.1
Xu, W.2
Trappe, W.3
-
71
-
-
33745778686
-
Keyboard acoustic emanations revisited
-
ACM
-
L. Zhuang, F. Zhou, and J. D. Tygar, “Keyboard acoustic emanations revisited,” in Proceedings of ACM CCS. ACM, 2005, pp. 373–382.
-
(2005)
Proceedings of ACM CCS
, pp. 373-382
-
-
Zhuang, L.1
Zhou, F.2
Tygar, J. D.3
|