Follow
Markus Miettinen
Markus Miettinen
Faculty of Computer Science and Engineering, Frankfurt University of Applied Sciences
Verified email at fb2.fra-uas.de
Title
Cited by
Cited by
Year
IoT Sentinel: Automated device-type identification for security enforcement in iot
M Miettinen, S Marchal, I Hafeez, N Asokan, AR Sadeghi, S Tarkoma
2017 IEEE 37th international conference on distributed computing systems …, 2017
8892017
DÏoT: A federated self-learning anomaly detection system for IoT
TD Nguyen, S Marchal, M Miettinen, H Fereidooni, N Asokan, AR Sadeghi
2019 IEEE 39th International conference on distributed computing systems …, 2019
7392019
The mobile data challenge: Big data for mobile computing research
JK Laurila, D Gatica-Perez, I Aad, O Bornet, TMT Do, O Dousse, J Eberle, ...
Pervasive computing, 2012
6232012
Peek-a-boo: I see your smart home activities, even encrypted!
A Acar, H Fereidooni, T Abera, AK Sikder, M Miettinen, H Aksu, M Conti, ...
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
3892020
FLAME: Taming backdoors in federated learning
TD Nguyen, P Rieger, H Chen, H Yalame, H Möllering, H Fereidooni, ...
31st USENIX Security Symposium (USENIX Security 22), 1415-1432, 2022
2842022
Audi: Toward autonomous IoT device-type identification using periodic communication
S Marchal, M Miettinen, TD Nguyen, AR Sadeghi, N Asokan
IEEE Journal on Selected Areas in Communications 37 (6), 1402-1412, 2019
2462019
SAFELearn: Secure aggregation for private federated learning
H Fereidooni, S Marchal, M Miettinen, A Mirhoseini, H Möllering, ...
2021 IEEE Security and Privacy Workshops (SPW), 56-62, 2021
2212021
Method and apparatus for adjusting context-based factors for selecting a security policy
MJ Miettinen, N Asokan, A Gupta
US Patent 8,898,793, 2014
1782014
Poisoning attacks on federated learning-based IoT intrusion detection system
TD Nguyen, P Rieger, M Miettinen, AR Sadeghi
Proc. Workshop Decentralized IoT Syst. Secur.(DISS) 79, 2020
1722020
Context-based zero-interaction pairing and key evolution for advanced personal devices
M Miettinen, N Asokan, TD Nguyen, AR Sadeghi, M Sobhani
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
1712014
Deepsight: Mitigating backdoor attacks in federated learning through deep model inspection
P Rieger, TD Nguyen, M Miettinen, AR Sadeghi
arXiv preprint arXiv:2201.00763, 2022
1502022
HomeSnitch: Behavior transparency and control for smart home IoT devices
TJ OConnor, R Mohamed, M Miettinen, W Enck, B Reaves, AR Sadeghi
Proceedings of the 12th conference on security and privacy in wireless and …, 2019
1482019
From big smartphone data to worldwide research: The mobile data challenge
JK Laurila, D Gatica-Perez, I Aad, J Blom, O Bornet, TMT Do, O Dousse, ...
Pervasive and Mobile Computing 9 (6), 752-771, 2013
1342013
Conxsense: automated context classification for context-aware access control
M Miettinen, S Heuser, W Kronz, AR Sadeghi, N Asokan
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
1162014
Mind the gap: Security & privacy risks of contact tracing apps
L Baumgärtner, A Dmitrienko, B Freisleben, A Gruler, J Höchst, ...
2020 IEEE 19th international conference on trust, security and privacy in …, 2020
982020
Method and apparatus for selecting a security policy
MJ Miettinen, N Asokan
US Patent 8,621,656, 2013
972013
Method and apparatus for compressing log record information
K Hätönen, M Miettinen
US Patent 7,778,979, 2010
962010
Host-based intrusion detection for advanced mobile devices
K Hatonen, P Halonen, M Miettinen
20th International Conference on Advanced Information Networking and …, 2006
962006
A probabilistic kernel method for human mobility prediction with smartphones
TMT Do, O Dousse, M Miettinen, D Gatica-Perez
Pervasive and Mobile Computing 20, 13-28, 2015
952015
DÏoT: A self-learning system for detecting compromised IoT devices
TD Nguyen, S Marchal, M Miettinen, N Asokan, A Sadeghi
CoRR, vol. abs/1804.07474, 2018
852018
The system can't perform the operation now. Try again later.
Articles 1–20