Markus Miettinen

Orcid: 0000-0002-5861-8829

According to our database1, Markus Miettinen authored at least 51 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges.
IACR Cryptol. ePrint Arch., 2022

Close the Gate: Detecting Backdoored Models in Federated Learning based on Client-Side Deep Layer Output Analysis.
CoRR, 2022


DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

FedCRI: Federated Mobile Cyber-Risk Intelligence.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
Using Open Data to Rapidly Benchmark Biomolecular Simulations: Phospholipid Conformational Dynamics.
J. Chem. Inf. Model., 2021

FLGUARD: Secure and Private Federated Learning.
IACR Cryptol. ePrint Arch., 2021

SAFELearn: Secure Aggregation for private FEderated Learning.
IACR Cryptol. ePrint Arch., 2021

2020
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps.
CoRR, 2020

Peek-a-boo: i see your smart home activities, even encrypted!
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020


Long Live Randomization: On Privacy-preserving Contact Tracing in Pandemic.
Proceedings of the 7th ACM Workshop on Moving Target Defense, 2020

LeakyPick: IoT Audio Spy Detector.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Context and communication profiling for IoT security and privacy: techniques and applications.
PhD thesis, 2019

AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication.
IEEE J. Sel. Areas Commun., 2019

HomeSnitch: behavior transparency and control for smart home IoT devices.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management.
CoRR, 2018

DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
CoRR, 2018

Ad-hoc key agreement: A brief history and the challenges ahead.
Comput. Commun., 2018

Revisiting context-based authentication in IoT.
Proceedings of the 55th Annual Design Automation Conference, 2018

Internet of things or threats?: on building trust in IoT (keynote).
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, 2018

2017
Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

2016
User-Centric Security and Dependability in the Clouds-of-Clouds.
IEEE Cloud Comput., 2016

POSTER: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

2015
A probabilistic kernel method for human mobility prediction with smartphones.
Pervasive Mob. Comput., 2015

Coiled-Coils in Phage Display Screening: Insight into Exceptional Selectivity Provided by Molecular Dynamics.
J. Chem. Inf. Model., 2015

Beyond open access: the changing culture of producing and disseminating scientific knowledge.
Proceedings of the 19th International Academic Mindtrek Conference, 2015

I Know Where You are: Proofs of Presence Resilient to Malicious Provers.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Balancing selectivity vs stability using molecular dynamics and umbrella sampling.
J. Cheminformatics, 2014

ConXsense: automated context classification for context-aware access control.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
From big smartphone data to worldwide research: The Mobile Data Challenge.
Pervasive Mob. Comput., 2013

ConXsense - Context Sensing for Adaptive Usable Access Control.
CoRR, 2013

2012
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
Proceedings of the 2012 International Conference on Privacy, 2012

PeerSense: Who is near you?
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

2011
Using context-profiling to aid access control decisions in mobile devices.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Privacy Preservation Approach in Service Ecosystems.
Proceedings of the Workshops Proceedings of the 15th IEEE International Enterprise Distributed Object Computing Conference, 2011

2010
Towards security policy decisions based on context profiling.
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010

2009
Computer Log Anomaly Detection Using Frequent Episodes.
Proceedings of the Artificial Intelligence Applications and Innovations III, 2009

2007
Creating Next Generation Applications and Services for Mobile Devices: Challenges and Opportunities.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

2006
Host-Based Intrusion Detection for Advanced Mobile Devices.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2004
Remarks on the Industrial Application of Inductive Database Technologies.
Proceedings of the Constraint-Based Mining and Inductive Databases, 2004

2003
Queryable Lossless Log Database Compression.
Proceedings of the Second International Workshop on Inductive Databases, 2003

Comprehensive Log Compression with Frequent Patterns.
Proceedings of the Data Warehousing and Knowledge Discovery, 5th International Conference, 2003


  Loading...