Detection and Response to Data Exfiltration from Internet of Things Android Devices View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2018-08-26

AUTHORS

Mariem Graa , Ivan Marco Lobe Kome , Nora Cuppens-Boulahia , Frédéric Cuppens , Vincent Frey

ABSTRACT

Hackers can exfiltrate sensitive data stored in an IoT device such as Android smartphones. He/She abuses the Android pairing mode and targets a personal computer system previously trusted by the device user. The existing protocols that allow file transfer from Android IoT devices to the computer cannot detect this attack. In this paper, we propose an approach to detect attacks exploiting trusted relationship between a third party system such as personal computer and an Android device to exfiltrate user data from the victim device to an attacker. We implement a protocol to secure communication between IoT Android device and third party system. Our approach has been proved to be effective in detecting these category of attacks with reasonable performance overheads. More... »

PAGES

339-354

References to SciGraph publications

Book

TITLE

ICT Systems Security and Privacy Protection

ISBN

978-3-319-99827-5
978-3-319-99828-2

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-99828-2_24

DOI

http://dx.doi.org/10.1007/978-3-319-99828-2_24

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1106357587


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "IMT Atlantique", 
          "id": "https://www.grid.ac/institutes/grid.486295.4", 
          "name": [
            "IMT Atlantique, 2 Rue de la Ch\u00e2taigneraie, 35576, Cesson-S\u00e9vign\u00e9, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Graa", 
        "givenName": "Mariem", 
        "id": "sg:person.016543420055.43", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016543420055.43"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Orange (France)", 
          "id": "https://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "IMT Atlantique, 2 Rue de la Ch\u00e2taigneraie, 35576, Cesson-S\u00e9vign\u00e9, France", 
            "Orange Labs, 4 rue du Clos Courtel, 35510, Cesson-S\u00e9vign\u00e9, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Kome", 
        "givenName": "Ivan Marco Lobe", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IMT Atlantique", 
          "id": "https://www.grid.ac/institutes/grid.486295.4", 
          "name": [
            "IMT Atlantique, 2 Rue de la Ch\u00e2taigneraie, 35576, Cesson-S\u00e9vign\u00e9, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Cuppens-Boulahia", 
        "givenName": "Nora", 
        "id": "sg:person.015740513532.92", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015740513532.92"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IMT Atlantique", 
          "id": "https://www.grid.ac/institutes/grid.486295.4", 
          "name": [
            "IMT Atlantique, 2 Rue de la Ch\u00e2taigneraie, 35576, Cesson-S\u00e9vign\u00e9, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Cuppens", 
        "givenName": "Fr\u00e9d\u00e9ric", 
        "id": "sg:person.016707377535.37", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016707377535.37"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Orange (France)", 
          "id": "https://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "Orange Labs, 4 rue du Clos Courtel, 35510, Cesson-S\u00e9vign\u00e9, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Frey", 
        "givenName": "Vincent", 
        "id": "sg:person.010641243124.07", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010641243124.07"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "sg:pub.10.1007/978-3-642-35362-8_4", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1000210434", 
          "https://doi.org/10.1007/978-3-642-35362-8_4"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.diin.2011.05.009", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1004206935"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2666356.2594299", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1006221942"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.cose.2014.10.016", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1007907759"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.future.2013.01.010", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1011867666"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2818000.2818040", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1011984435"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2714576.2714638", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1014587911"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.chb.2016.04.023", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1023434432"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-33704-8_2", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1032072616", 
          "https://doi.org/10.1007/978-3-642-33704-8_2"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2046707.2046780", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1035175482"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2619091", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1045499326"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/jiot.2016.2569094", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061280858"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-61204-1_5", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1086153610", 
          "https://doi.org/10.1007/978-3-319-61204-1_5"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/pst.2016.7906972", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093407929"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iri.2013.6642487", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094054776"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/cicybs.2011.5949404", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095291727"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/sere-c.2014.33", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095351301"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/eurosp.2017.38", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095716172"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.5220/0005686603070316", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1099356339"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2018-08-26", 
    "datePublishedReg": "2018-08-26", 
    "description": "Hackers can exfiltrate sensitive data stored in an IoT device such as Android smartphones. He/She abuses the Android pairing mode and targets a personal computer system previously trusted by the device user. The existing protocols that allow file transfer from Android IoT devices to the computer cannot detect this attack. In this paper, we propose an approach to detect attacks exploiting trusted relationship between a third party system such as personal computer and an Android device to exfiltrate user data from the victim device to an attacker. We implement a protocol to secure communication between IoT Android device and third party system. Our approach has been proved to be effective in detecting these category of attacks with reasonable performance overheads.", 
    "editor": [
      {
        "familyName": "Janczewski", 
        "givenName": "Lech Jan", 
        "type": "Person"
      }, 
      {
        "familyName": "Kuty\u0142owski", 
        "givenName": "Miros\u0142aw", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-99828-2_24", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-99827-5", 
        "978-3-319-99828-2"
      ], 
      "name": "ICT Systems Security and Privacy Protection", 
      "type": "Book"
    }, 
    "name": "Detection and Response to Data Exfiltration from Internet of Things Android Devices", 
    "pagination": "339-354", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-99828-2_24"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "682c74f1679203978886a6e438dacf0df848a6774996893c14172b8780ba98ca"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1106357587"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-99828-2_24", 
      "https://app.dimensions.ai/details/publication/pub.1106357587"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T05:01", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000325_0000000325/records_100805_00000000.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2F978-3-319-99828-2_24"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-99828-2_24'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-99828-2_24'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-99828-2_24'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-99828-2_24'


 

This table displays all metadata directly associated to this object as RDF triples.

161 TRIPLES      23 PREDICATES      45 URIs      19 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-99828-2_24 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N0f6594499b8b47d797255ba0ed36b56d
4 schema:citation sg:pub.10.1007/978-3-319-61204-1_5
5 sg:pub.10.1007/978-3-642-33704-8_2
6 sg:pub.10.1007/978-3-642-35362-8_4
7 https://doi.org/10.1016/j.chb.2016.04.023
8 https://doi.org/10.1016/j.cose.2014.10.016
9 https://doi.org/10.1016/j.diin.2011.05.009
10 https://doi.org/10.1016/j.future.2013.01.010
11 https://doi.org/10.1109/cicybs.2011.5949404
12 https://doi.org/10.1109/eurosp.2017.38
13 https://doi.org/10.1109/iri.2013.6642487
14 https://doi.org/10.1109/jiot.2016.2569094
15 https://doi.org/10.1109/pst.2016.7906972
16 https://doi.org/10.1109/sere-c.2014.33
17 https://doi.org/10.1145/2046707.2046780
18 https://doi.org/10.1145/2619091
19 https://doi.org/10.1145/2666356.2594299
20 https://doi.org/10.1145/2714576.2714638
21 https://doi.org/10.1145/2818000.2818040
22 https://doi.org/10.5220/0005686603070316
23 schema:datePublished 2018-08-26
24 schema:datePublishedReg 2018-08-26
25 schema:description Hackers can exfiltrate sensitive data stored in an IoT device such as Android smartphones. He/She abuses the Android pairing mode and targets a personal computer system previously trusted by the device user. The existing protocols that allow file transfer from Android IoT devices to the computer cannot detect this attack. In this paper, we propose an approach to detect attacks exploiting trusted relationship between a third party system such as personal computer and an Android device to exfiltrate user data from the victim device to an attacker. We implement a protocol to secure communication between IoT Android device and third party system. Our approach has been proved to be effective in detecting these category of attacks with reasonable performance overheads.
26 schema:editor N761f6b460dce4a29bc716a42bd47a460
27 schema:genre chapter
28 schema:inLanguage en
29 schema:isAccessibleForFree false
30 schema:isPartOf N183c2cea95e3403c9ed95c6f6bfaf78f
31 schema:name Detection and Response to Data Exfiltration from Internet of Things Android Devices
32 schema:pagination 339-354
33 schema:productId N2146c8db2b9a4602ba6dfca16496a64a
34 N51a20f92c71c4a9e9dccf29e8dd700fd
35 N83d5b96ca4504acf8fbac6e63d1a2fa9
36 schema:publisher N0090173c16724baba970273ee1b02937
37 schema:sameAs https://app.dimensions.ai/details/publication/pub.1106357587
38 https://doi.org/10.1007/978-3-319-99828-2_24
39 schema:sdDatePublished 2019-04-16T05:01
40 schema:sdLicense https://scigraph.springernature.com/explorer/license/
41 schema:sdPublisher N15b84a3d60c940d38e324c15cb2f44d5
42 schema:url https://link.springer.com/10.1007%2F978-3-319-99828-2_24
43 sgo:license sg:explorer/license/
44 sgo:sdDataset chapters
45 rdf:type schema:Chapter
46 N0090173c16724baba970273ee1b02937 schema:location Cham
47 schema:name Springer International Publishing
48 rdf:type schema:Organisation
49 N0f6594499b8b47d797255ba0ed36b56d rdf:first sg:person.016543420055.43
50 rdf:rest Nd8cd4b00c914442cb070fa60f89f1f2a
51 N15b84a3d60c940d38e324c15cb2f44d5 schema:name Springer Nature - SN SciGraph project
52 rdf:type schema:Organization
53 N183c2cea95e3403c9ed95c6f6bfaf78f schema:isbn 978-3-319-99827-5
54 978-3-319-99828-2
55 schema:name ICT Systems Security and Privacy Protection
56 rdf:type schema:Book
57 N1c5355aac4eb4b57a71f4fa3663bdae4 rdf:first sg:person.016707377535.37
58 rdf:rest N791e6dd93ff844019ac8b2c9e146eafd
59 N2146c8db2b9a4602ba6dfca16496a64a schema:name doi
60 schema:value 10.1007/978-3-319-99828-2_24
61 rdf:type schema:PropertyValue
62 N2ef4653885f94e8390aa8c0f85340ae2 schema:familyName Janczewski
63 schema:givenName Lech Jan
64 rdf:type schema:Person
65 N4a144ad8e17a421082b7ad2901dfdc4e schema:familyName Kutyłowski
66 schema:givenName Mirosław
67 rdf:type schema:Person
68 N51a20f92c71c4a9e9dccf29e8dd700fd schema:name dimensions_id
69 schema:value pub.1106357587
70 rdf:type schema:PropertyValue
71 N761f6b460dce4a29bc716a42bd47a460 rdf:first N2ef4653885f94e8390aa8c0f85340ae2
72 rdf:rest Ne63012ba33d5446ab9ad1e17a858f3aa
73 N791e6dd93ff844019ac8b2c9e146eafd rdf:first sg:person.010641243124.07
74 rdf:rest rdf:nil
75 N83d5b96ca4504acf8fbac6e63d1a2fa9 schema:name readcube_id
76 schema:value 682c74f1679203978886a6e438dacf0df848a6774996893c14172b8780ba98ca
77 rdf:type schema:PropertyValue
78 Na4f0b63b6ac94555ac360577d7d3d7a6 rdf:first sg:person.015740513532.92
79 rdf:rest N1c5355aac4eb4b57a71f4fa3663bdae4
80 Nd8cd4b00c914442cb070fa60f89f1f2a rdf:first Nee3b9860b8074aeeb59727013d4bbd34
81 rdf:rest Na4f0b63b6ac94555ac360577d7d3d7a6
82 Ne63012ba33d5446ab9ad1e17a858f3aa rdf:first N4a144ad8e17a421082b7ad2901dfdc4e
83 rdf:rest rdf:nil
84 Nee3b9860b8074aeeb59727013d4bbd34 schema:affiliation https://www.grid.ac/institutes/grid.89485.38
85 schema:familyName Kome
86 schema:givenName Ivan Marco Lobe
87 rdf:type schema:Person
88 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
89 schema:name Information and Computing Sciences
90 rdf:type schema:DefinedTerm
91 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
92 schema:name Data Format
93 rdf:type schema:DefinedTerm
94 sg:person.010641243124.07 schema:affiliation https://www.grid.ac/institutes/grid.89485.38
95 schema:familyName Frey
96 schema:givenName Vincent
97 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010641243124.07
98 rdf:type schema:Person
99 sg:person.015740513532.92 schema:affiliation https://www.grid.ac/institutes/grid.486295.4
100 schema:familyName Cuppens-Boulahia
101 schema:givenName Nora
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015740513532.92
103 rdf:type schema:Person
104 sg:person.016543420055.43 schema:affiliation https://www.grid.ac/institutes/grid.486295.4
105 schema:familyName Graa
106 schema:givenName Mariem
107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016543420055.43
108 rdf:type schema:Person
109 sg:person.016707377535.37 schema:affiliation https://www.grid.ac/institutes/grid.486295.4
110 schema:familyName Cuppens
111 schema:givenName Frédéric
112 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016707377535.37
113 rdf:type schema:Person
114 sg:pub.10.1007/978-3-319-61204-1_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1086153610
115 https://doi.org/10.1007/978-3-319-61204-1_5
116 rdf:type schema:CreativeWork
117 sg:pub.10.1007/978-3-642-33704-8_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032072616
118 https://doi.org/10.1007/978-3-642-33704-8_2
119 rdf:type schema:CreativeWork
120 sg:pub.10.1007/978-3-642-35362-8_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000210434
121 https://doi.org/10.1007/978-3-642-35362-8_4
122 rdf:type schema:CreativeWork
123 https://doi.org/10.1016/j.chb.2016.04.023 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023434432
124 rdf:type schema:CreativeWork
125 https://doi.org/10.1016/j.cose.2014.10.016 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007907759
126 rdf:type schema:CreativeWork
127 https://doi.org/10.1016/j.diin.2011.05.009 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004206935
128 rdf:type schema:CreativeWork
129 https://doi.org/10.1016/j.future.2013.01.010 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011867666
130 rdf:type schema:CreativeWork
131 https://doi.org/10.1109/cicybs.2011.5949404 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095291727
132 rdf:type schema:CreativeWork
133 https://doi.org/10.1109/eurosp.2017.38 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095716172
134 rdf:type schema:CreativeWork
135 https://doi.org/10.1109/iri.2013.6642487 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094054776
136 rdf:type schema:CreativeWork
137 https://doi.org/10.1109/jiot.2016.2569094 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061280858
138 rdf:type schema:CreativeWork
139 https://doi.org/10.1109/pst.2016.7906972 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093407929
140 rdf:type schema:CreativeWork
141 https://doi.org/10.1109/sere-c.2014.33 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095351301
142 rdf:type schema:CreativeWork
143 https://doi.org/10.1145/2046707.2046780 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035175482
144 rdf:type schema:CreativeWork
145 https://doi.org/10.1145/2619091 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045499326
146 rdf:type schema:CreativeWork
147 https://doi.org/10.1145/2666356.2594299 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006221942
148 rdf:type schema:CreativeWork
149 https://doi.org/10.1145/2714576.2714638 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014587911
150 rdf:type schema:CreativeWork
151 https://doi.org/10.1145/2818000.2818040 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011984435
152 rdf:type schema:CreativeWork
153 https://doi.org/10.5220/0005686603070316 schema:sameAs https://app.dimensions.ai/details/publication/pub.1099356339
154 rdf:type schema:CreativeWork
155 https://www.grid.ac/institutes/grid.486295.4 schema:alternateName IMT Atlantique
156 schema:name IMT Atlantique, 2 Rue de la Châtaigneraie, 35576, Cesson-Sévigné, France
157 rdf:type schema:Organization
158 https://www.grid.ac/institutes/grid.89485.38 schema:alternateName Orange (France)
159 schema:name IMT Atlantique, 2 Rue de la Châtaigneraie, 35576, Cesson-Sévigné, France
160 Orange Labs, 4 rue du Clos Courtel, 35510, Cesson-Sévigné, France
161 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...