In this poster, we try to understand how effectively an attacker can fingerprint unseen targeted IoT devices when building a classifier using either devices manufactured by the same company or devices with similar functionality
In this poster, we try to understand how effectively an attacker can fingerprint unseen targeted IoT devices when building a classifier using either devices manufactured by the same company or devices with similar functionality