N-baiot—network-based detection of iot botnet attacks using deep autoencoders Y Meidan, M Bohadana, Y Mathov, Y Mirsky, A Shabtai, D Breitenbacher, ... IEEE Pervasive Computing 17 (3), 12-22, 2018 | 678 | 2018 |
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis Y Meidan, M Bohadana, A Shabtai, JD Guarnizo, M Ochoa, ... Proceedings of the symposium on applied computing, 506-509, 2017 | 325 | 2017 |
Detection of unauthorized IoT devices using machine learning techniques Y Meidan, M Bohadana, A Shabtai, M Ochoa, NO Tippenhauer, ... arXiv preprint arXiv:1709.04647, 2017 | 199 | 2017 |
Security testbed for Internet-of-Things devices S Siboni, V Sachidananda, Y Meidan, M Bohadana, Y Mathov, S Bhairav, ... IEEE transactions on reliability 68 (1), 23-44, 2019 | 133 | 2019 |
Reverse engineering IoT devices: Effective techniques and methods O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren IEEE Internet of Things Journal 5 (6), 4965-4976, 2018 | 27 | 2018 |
Opening Pandora’s box: effective techniques for reverse engineering IoT devices O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren International Conference on Smart Card Research and Advanced Applications, 1-21, 2017 | 25 | 2017 |
Detection of unauthorized IoT devices using machine learning techniques. arXiv 2017 Y Meidan, M Bohadana, A Shabtai, M Ochoa, NO Tippenhauer, ... arXiv preprint arXiv:1709.04647, 0 | 12 | |
METHOD AND APPARATUS FOR DETERMINING AN IDENTITY OF AN UNKNOWN INTERNET-OF-THINGS (IoT) DEVICE IN A COMMUNICATION NETWORK M Ochoa, NO Tippenhauer, J Guarnizo, Y Elovici, A Shabtai, M Bohadana, ... US Patent App. 16/489,691, 2020 | 6 | 2020 |
Detecting Compromised IoT Using Network Traffic Analysis M Bohadana Ben-Gurion University of the Negev, 2017 | | 2017 |