{"id":"https://openalex.org/W2979670793","doi":"https://doi.org/10.1109/noms47738.2020.9110451","title":"IoT or NoT: Identifying IoT Devices in a Short Time Scale","display_name":"IoT or NoT: Identifying IoT Devices in a Short Time Scale","publication_year":2020,"publication_date":"2020-04-01","ids":{"openalex":"https://openalex.org/W2979670793","doi":"https://doi.org/10.1109/noms47738.2020.9110451","mag":"2979670793"},"language":"en","primary_location":{"id":"doi:10.1109/noms47738.2020.9110451","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms47738.2020.9110451","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1910.05647","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091083281","display_name":"Anat Bremler-Barr","orcid":"https://orcid.org/0000-0002-8165-2558"},"institutions":[{"id":"https://openalex.org/I138898306","display_name":"Reichman University","ror":"https://ror.org/01px5cv07","country_code":"IL","type":"education","lineage":["https://openalex.org/I138898306"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Anat Bremler-Barr","raw_affiliation_strings":["Computer Science Department, Interdisciplinary Center, Herzliya, Israel"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Interdisciplinary Center, Herzliya, Israel","institution_ids":["https://openalex.org/I138898306"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080874742","display_name":"Haim Levy","orcid":"https://orcid.org/0000-0002-1902-8535"},"institutions":[{"id":"https://openalex.org/I138898306","display_name":"Reichman University","ror":"https://ror.org/01px5cv07","country_code":"IL","type":"education","lineage":["https://openalex.org/I138898306"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Haim Levy","raw_affiliation_strings":["Computer Science Department, Interdisciplinary Center, Herzliya, Israel"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Interdisciplinary Center, Herzliya, Israel","institution_ids":["https://openalex.org/I138898306"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002511176","display_name":"Zohar Yakhini","orcid":"https://orcid.org/0000-0002-0420-5412"},"institutions":[{"id":"https://openalex.org/I138898306","display_name":"Reichman University","ror":"https://ror.org/01px5cv07","country_code":"IL","type":"education","lineage":["https://openalex.org/I138898306"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Zohar Yakhini","raw_affiliation_strings":["Computer Science Department, Interdisciplinary Center, Herzliya, Israel"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Interdisciplinary Center, Herzliya, Israel","institution_ids":["https://openalex.org/I138898306"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5091083281"],"corresponding_institution_ids":["https://openalex.org/I138898306"],"apc_list":null,"apc_paid":null,"fwci":0.67812976,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.69318734,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.818851113319397},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.8009005784988403},{"id":"https://openalex.org/keywords/dynamic-host-configuration-protocol","display_name":"Dynamic Host Configuration Protocol","score":0.69759202003479},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6248621940612793},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6158565878868103},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.605278491973877},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.546879231929779},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5462422370910645},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.23907774686813354},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18851983547210693},{"id":"https://openalex.org/keywords/ip-address","display_name":"Ip address","score":0.08321204781532288}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.818851113319397},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.8009005784988403},{"id":"https://openalex.org/C26876914","wikidata":"https://www.wikidata.org/wiki/Q11166","display_name":"Dynamic Host Configuration Protocol","level":3,"score":0.69759202003479},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6248621940612793},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6158565878868103},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.605278491973877},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.546879231929779},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5462422370910645},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.23907774686813354},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18851983547210693},{"id":"https://openalex.org/C2985371682","wikidata":"https://www.wikidata.org/wiki/Q11135","display_name":"Ip address","level":2,"score":0.08321204781532288}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/noms47738.2020.9110451","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms47738.2020.9110451","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1910.05647","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1910.05647","pdf_url":"https://arxiv.org/pdf/1910.05647","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"mag:2979670793","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1910.05647.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1910.05647","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1910.05647","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1910.05647","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1910.05647","pdf_url":"https://arxiv.org/pdf/1910.05647","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.41999998688697815,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2979670793.pdf","grobid_xml":"https://content.openalex.org/works/W2979670793.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1601184934","https://openalex.org/W2031163547","https://openalex.org/W2076179658","https://openalex.org/W2099964107","https://openalex.org/W2101164028","https://openalex.org/W2140816706","https://openalex.org/W2158698691","https://openalex.org/W2293605433","https://openalex.org/W2560475746","https://openalex.org/W2621148797","https://openalex.org/W2733765803","https://openalex.org/W2765502087","https://openalex.org/W2768718335","https://openalex.org/W2783099387","https://openalex.org/W2789828921","https://openalex.org/W2887149310","https://openalex.org/W2888774481","https://openalex.org/W2913697953","https://openalex.org/W2928689123","https://openalex.org/W2929305171","https://openalex.org/W2945159175","https://openalex.org/W2950767885","https://openalex.org/W6635935638","https://openalex.org/W6744392808","https://openalex.org/W6745386936","https://openalex.org/W6753934654"],"related_works":["https://openalex.org/W3034611465","https://openalex.org/W3167826121","https://openalex.org/W3108225283","https://openalex.org/W2944968054","https://openalex.org/W2970180303","https://openalex.org/W3191035191","https://openalex.org/W3091198356","https://openalex.org/W3211096890","https://openalex.org/W2754804809","https://openalex.org/W3010718229","https://openalex.org/W3186190834","https://openalex.org/W3110402456","https://openalex.org/W3045680488","https://openalex.org/W3002543587","https://openalex.org/W3143426208","https://openalex.org/W3005645561","https://openalex.org/W3196578459","https://openalex.org/W3123965728","https://openalex.org/W3046125599","https://openalex.org/W3048638183"],"abstract_inverted_index":{"In":[0,70],"recent":[1],"years":[2],"the":[3,20,30,123,162,165,172],"number":[4],"of":[5,52,60,164],"IoT":[6,45,82],"devices":[7,48,118],"in":[8,49,64,85,122],"home":[9],"networks":[10],"has":[11],"increased":[12],"dramatically.":[13],"Whenever":[14],"a":[15,38,50,62,65,79,86,103,134,157],"new":[16],"device":[17,63,80],"connects":[18],"to":[19,42,181],"network,":[21],"it":[22],"must":[23],"be":[24],"quickly":[25],"managed":[26],"and":[27,46,90,107],"secured":[28],"using":[29,98],"relevant":[31],"security":[32],"mechanism":[33],"or":[34,83],"QoS":[35],"policy.":[36],"Thus":[37],"key":[39],"challenge":[40],"is":[41,56,67,133,145],"distinguish":[43],"between":[44],"NoT":[47],"matter":[51],"minutes.":[53],"Unfortunately,":[54],"there":[55],"no":[57],"clear":[58],"indication":[59],"whether":[61],"network":[66],"an":[68,111],"IoT.":[69],"this":[71],"paper,":[72],"we":[73,149,155],"propose":[74],"different":[75],"classifiers":[76,95,177],"that":[77,119,160],"identify":[78],"as":[81],"non-IoT,":[84],"short":[87],"time":[88],"scale,":[89],"with":[91,126],"high":[92],"accuracy.":[93],"Our":[94],"were":[96,108,120],"constructed":[97],"machine":[99],"learning":[100],"techniques":[101],"on":[102,110,139,147,171],"seen":[104,124],"(training)":[105],"dataset":[106,125],"tested":[109],"unseen":[112],"(test)":[113],"dataset.":[114],"They":[115],"successfully":[116],"classified":[117],"not":[121],"accuracy":[127],"above":[128],"95%.":[129],"The":[130,142],"first":[131],"classifier":[132,137,144,159],"logistic":[135],"regression":[136],"based":[138,146],"traffic":[140],"features.":[141],"second":[143],"features":[148],"retrieve":[150],"from":[151],"DHCP":[152],"packets.":[153],"Finally,":[154],"present":[156],"unified":[158],"leverages":[161],"advantages":[163],"other":[166],"two":[167],"classifiers.":[168],"We":[169],"focus":[170],"home-network":[173],"environment,":[174],"but":[175],"our":[176],"are":[178],"also":[179],"applicable":[180],"enterprise":[182],"networks.":[183]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
