Test-based risk assessment and security certification proposal for the Internet of Things The paper was accepted and will be presented[…]
Read moreCategory: Publications
A user-centric Internet of Things platform to empower users for managing security and privacy concerns in the Internet of Energy
A user-centric Internet of Things platform to empower users for managing security and privacy concerns in the Internet of Energy[…]
Read moreThe application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices
The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices Conference paper accepted at[…]
Read moreThe identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints
The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints[…]
Read moreBroadcasting Strategies in 6TiSCH Networks
Broadcasting Strategies in 6TiSCH Networks Mališa Vučinić, Thomas Watteyne, Xavier Vilajosana. Wiley Internet Technology Letters, to appear in 2017. Download[…]
Read moreReal-time Alpine Measurement System Using Wireless Sensor Networks
Real-time Alpine Measurement System Using Wireless Sensor Networks Sami Malek, Francesco Avanzi, Keoma Brun-Laguna, Tessa Maurer, Carlos Oroza, Peter Hartsough,[…]
Read moreImaging Time Series for Internet of Things radio frequency fingerprinting
Imaging Time Series for Internet of Things radio frequency fingerprinting Gianmarco Baldini, Gary Steri, Raimondo Giuliani, Claudio Gentile “Imaging Time[…]
Read moreImproving Internet of Things device certification with policy-based management
Improving Internet of Things device certification with policy-based management R. Neisse, G. Baldini, G. Steri, A. Ahmad, E. Fourneret and[…]
Read morePhysical layer authentication of Internet of Things wireless devices through permutation and dispersion entropy
Physical layer authentication of Internet of Things wireless devices through permutation and dispersion entropy G. Baldini, R. Giuliani, G. Steri[…]
Read moreTeaching Communication Technologies and Standards for the Industrial IoT? Use 6TiSCH!
Teaching Communication Technologies and Standards for the Industrial IoT? Use 6TiSCH! T. Watteyne, P. Tuset-Peiro, X. Vilajosana, S. Pollin and[…]
Read more