Mike Just
YOU?
Author Swipe
View article: GeMID: Generalizable models for IoT device identification
GeMID: Generalizable models for IoT device identification Open
View article: Iotgem: Generalizable Models for Behaviour-Based Iot Attack Detection
Iotgem: Generalizable Models for Behaviour-Based Iot Attack Detection Open
View article: From Reports to Actions: Bridging the Customer Usability Gap in Penetration Testing
From Reports to Actions: Bridging the Customer Usability Gap in Penetration Testing Open
Penetration testing reports play a significant role in helping organizations identify and mitigate security vulnerabilities. The report effectiveness relies on the extent to which customers can translate the findings into actionable decisi…
View article: GeMID: Generalizable Models for IoT Device Identification
GeMID: Generalizable Models for IoT Device Identification Open
With the proliferation of devices on the Internet of Things (IoT), ensuring their security has become paramount. Device identification (DI), which distinguishes IoT devices based on their traffic patterns, plays a crucial role in both diff…
View article: Individual Packet Features are a Risk to Model Generalisation in ML-Based Intrusion Detection
Individual Packet Features are a Risk to Model Generalisation in ML-Based Intrusion Detection Open
Machine learning is increasingly used for intrusion detection in IoT networks. This paper explores the effectiveness of using individual packet features (IPF), which are attributes extracted from a single network packet, such as timing, si…
View article: IoTGeM: Generalizable Models for Behaviour-Based IoT Attack Detection
IoTGeM: Generalizable Models for Behaviour-Based IoT Attack Detection Open
Previous research on behavior-based attack detection for networks of IoT devices has resulted in machine learning models whose ability to adapt to unseen data is limited and often not demonstrated. This paper presents IoTGeM, an approach f…
View article: Externally validating the IoTDevID device identification methodology using the CIC IoT 2022 Dataset
Externally validating the IoTDevID device identification methodology using the CIC IoT 2022 Dataset Open
In the era of rapid IoT device proliferation, recognizing, diagnosing, and securing these devices are crucial tasks. The IoTDevID method (IEEE Internet of Things 2022) proposes a machine learning approach for device identification using ne…
View article: A comic-based approach to permission request communication
A comic-based approach to permission request communication Open
Text-based permission requests do little to engage and inform smartphone users. Comics have recently been used with permission requests, though only in a survey of participants' perceived reactions. In this paper we study more realistic re…
View article: Context matters: Methods for Bitcoin tracking
Context matters: Methods for Bitcoin tracking Open
Bitcoin and other cryptocurrencies are well-known for their privacy properties that allow for the "anonymous" exchange of money. Bitcoin tracking with taint analysis remains challenging as it does not account for the change in Bitcoins' ow…
View article: IoTDevID: A Behavior-Based Device Identification Method for the IoT
IoTDevID: A Behavior-Based Device Identification Method for the IoT Open
Device identification is one way to secure a network of IoT devices, whereby\ndevices identified as suspicious can subsequently be isolated from a network.\nIn this study, we present a machine learning-based method, IoTDevID, that\nrecogni…
View article: Magnesium Alloys for Sustainable Weight-Saving Approach: A Brief Market Overview, New Trends, and Perspectives
Magnesium Alloys for Sustainable Weight-Saving Approach: A Brief Market Overview, New Trends, and Perspectives Open
In the transportation sector, weight-saving strategies emphasize greenhouse gas reductions by improving fuel efficiency. Furthermore, it is a fact that consumers appreciate less-consuming vehicles. Lighter battery electric vehicles (BEV) m…
View article: IoTDevID: A Behaviour-Based Fingerprinting Method for Device Identification in the IoT.
IoTDevID: A Behaviour-Based Fingerprinting Method for Device Identification in the IoT. Open
Device identification is one way to secure a network of IoT devices, whereby devices identified as suspicious can subsequently be isolated from a network. We introduce a novel fingerprinting method, IoTDevID, for device identification that…
View article: Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles
Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles Open
View article: Tracking Mixed Bitcoins
Tracking Mixed Bitcoins Open
View article: Probing the Mystery of Cryptocurrency Theft: An Investigation into Methods for Taint Analysis
Probing the Mystery of Cryptocurrency Theft: An Investigation into Methods for Taint Analysis Open
Since the creation of Bitcoin, transaction tracking is one of the prominent means for following the movement of Bitcoins involved in illegal activities. Although every Bitcoin transaction is recorded in the blockchain database, which is tr…
View article: Probing the Mystery of Cryptocurrency Theft: An Investigation into Methods for Cryptocurrency Tainting Analysis
Probing the Mystery of Cryptocurrency Theft: An Investigation into Methods for Cryptocurrency Tainting Analysis Open
View article: Hardware-Assisted Secure Communication in Embedded and Multi-Core Computing Systems
Hardware-Assisted Secure Communication in Embedded and Multi-Core Computing Systems Open
With the sharp rise of functionalities and connectivities in multi-core embedded systems, these systems have become notably vulnerable to security attacks. Conventional software security mechanisms fail to deliver full safety and also affe…
View article: Late Manifestation of Neurofibromatosis of the right Trigeminal Nerv
Late Manifestation of Neurofibromatosis of the right Trigeminal Nerv Open
Neurofibromatosis (NF) is a autosomal-dominant, monogenous inherited disease which affects multiple organs. NF typ 1 is one of the most common inherited neurological diseases, which is associated with tumours of the nervous system. Distinc…
View article: Keeping Children Safe Online: Understanding the Concerns of Carers of Children with Autism
Keeping Children Safe Online: Understanding the Concerns of Carers of Children with Autism Open
View article: Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses through Compile Time Code Instrumentation
Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses through Compile Time Code Instrumentation Open
Programming languages permitting immediate memory accesses through pointers often result in applications having memory-related errors, which may lead to unpredictable failures and security vulnerabilities. A lightweight solution is present…
View article: Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms
Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms Open
View article: On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications
On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications Open
We conducted a large-scale online study with 26,000 software installations during which we asked user (participants) whether they wanted to enable or disable the detection of Potentially Unwanted Applications (PUAs -potentially malicious s…
View article: Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015
Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015 Open
This is the Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015, held in San Jose, CA, USA, on May 21, 2015. The workshop was held as part of the IEEE Computer Society Security and Privacy Workshops, in conjunctio…