ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2306.09017
  4. Cited By
Who Let the Smart Toaster Hack the House? An Investigation into the
  Security Vulnerabilities of Consumer IoT Devices
v1v2v3 (latest)

Who Let the Smart Toaster Hack the House? An Investigation into the Security Vulnerabilities of Consumer IoT Devices

15 June 2023
Yang Li
A. Mandalari
Isabel Straw
ArXiv (abs)PDFHTML

Papers citing "Who Let the Smart Toaster Hack the House? An Investigation into the Security Vulnerabilities of Consumer IoT Devices"

2 / 2 papers shown
Title
Protected or Porous: A Comparative Analysis of Threat Detection
  Capability of IoT Safeguards
Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards
A. Mandalari
Hamed Haddadi
Daniel J. Dubois
David Choffnes
47
10
0
06 Apr 2023
Machine Learning DDoS Detection for Consumer Internet of Things Devices
Machine Learning DDoS Detection for Consumer Internet of Things Devices
Rohan Doshi
Noah J. Apthorpe
Nick Feamster
126
594
0
11 Apr 2018
1