<> <http://www.w3.org/2000/01/rdf-schema#comment> "The repository administrator has not yet configured an RDF license."^^<http://www.w3.org/2001/XMLSchema#string> . <> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10192792> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://purl.org/dc/terms/title> "REPLIOT: A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://purl.org/ontology/bibo/abstract> "REPLIOT is a tool for automatically testing IoT devices vulnerability to replay attacks in the local network. It can be used in the home environment to test a specific IoT device, or in a laboratory to assess replay attack vulnerability on IoT devices on a scale. This artifact shows the usage of REPLIOT in both scenarios."^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://purl.org/dc/terms/date> "2024" . <https://discovery.ucl.ac.uk/id/document/1747475> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Document> . <https://discovery.ucl.ac.uk/id/org/ext-d43fc3bac18ed74fcec3769bce565502> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Organization> . <https://discovery.ucl.ac.uk/id/org/ext-d43fc3bac18ed74fcec3769bce565502> <http://xmlns.com/foaf/0.1/name> "Institute of Electrical and Electronics Engineers (IEEE)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://purl.org/dc/terms/publisher> <https://discovery.ucl.ac.uk/id/org/ext-d43fc3bac18ed74fcec3769bce565502> . <https://discovery.ucl.ac.uk/id/publication/ext-a0ee037f3798256f34aac8c00f2f77c2> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Collection> . <https://discovery.ucl.ac.uk/id/publication/ext-a0ee037f3798256f34aac8c00f2f77c2> <http://xmlns.com/foaf/0.1/name> "2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2024"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/publication/ext-a0ee037f3798256f34aac8c00f2f77c2> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://purl.org/ontology/bibo/status> <http://purl.org/ontology/bibo/status/published> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-3d2f6ca826fbf50c7800256906b80d11> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10192792#authors> . <https://discovery.ucl.ac.uk/id/eprint/10192792#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_1> <https://discovery.ucl.ac.uk/id/person/ext-3d2f6ca826fbf50c7800256906b80d11> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-9e95345b7e2565dcc157b4936b6a2757> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10192792#authors> . <https://discovery.ucl.ac.uk/id/eprint/10192792#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_2> <https://discovery.ucl.ac.uk/id/person/ext-9e95345b7e2565dcc157b4936b6a2757> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-06993004fd0a62710dd05c7e412043fb> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10192792#authors> . <https://discovery.ucl.ac.uk/id/eprint/10192792#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_3> <https://discovery.ucl.ac.uk/id/person/ext-06993004fd0a62710dd05c7e412043fb> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-ab40be72154517bf1ea89f0b2e35d564> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10192792#authors> . <https://discovery.ucl.ac.uk/id/eprint/10192792#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_4> <https://discovery.ucl.ac.uk/id/person/ext-ab40be72154517bf1ea89f0b2e35d564> . <https://discovery.ucl.ac.uk/id/person/ext-ab40be72154517bf1ea89f0b2e35d564> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> . <https://discovery.ucl.ac.uk/id/person/ext-ab40be72154517bf1ea89f0b2e35d564> <http://xmlns.com/foaf/0.1/givenName> "F"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-ab40be72154517bf1ea89f0b2e35d564> <http://xmlns.com/foaf/0.1/familyName> "Buccafurri"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-ab40be72154517bf1ea89f0b2e35d564> <http://xmlns.com/foaf/0.1/name> "F Buccafurri"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-06993004fd0a62710dd05c7e412043fb> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> . <https://discovery.ucl.ac.uk/id/person/ext-06993004fd0a62710dd05c7e412043fb> <http://xmlns.com/foaf/0.1/givenName> "AM"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-06993004fd0a62710dd05c7e412043fb> <http://xmlns.com/foaf/0.1/familyName> "Mandalari"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-06993004fd0a62710dd05c7e412043fb> <http://xmlns.com/foaf/0.1/name> "AM Mandalari"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-3d2f6ca826fbf50c7800256906b80d11> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> . <https://discovery.ucl.ac.uk/id/person/ext-3d2f6ca826fbf50c7800256906b80d11> <http://xmlns.com/foaf/0.1/givenName> "S"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-3d2f6ca826fbf50c7800256906b80d11> <http://xmlns.com/foaf/0.1/familyName> "Lazzaro"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-3d2f6ca826fbf50c7800256906b80d11> <http://xmlns.com/foaf/0.1/name> "S Lazzaro"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-9e95345b7e2565dcc157b4936b6a2757> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> . <https://discovery.ucl.ac.uk/id/person/ext-9e95345b7e2565dcc157b4936b6a2757> <http://xmlns.com/foaf/0.1/givenName> "V"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-9e95345b7e2565dcc157b4936b6a2757> <http://xmlns.com/foaf/0.1/familyName> "De Angelis"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-9e95345b7e2565dcc157b4936b6a2757> <http://xmlns.com/foaf/0.1/name> "V De Angelis"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://purl.org/ontology/bibo/presentedAt> <https://discovery.ucl.ac.uk/id/event/ext-0290da6d3df4eb3609d1bdca72ab7681> . <https://discovery.ucl.ac.uk/id/event/ext-0290da6d3df4eb3609d1bdca72ab7681> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Conference> . <https://discovery.ucl.ac.uk/id/event/ext-0290da6d3df4eb3609d1bdca72ab7681> <http://purl.org/dc/terms/title> "2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/event/ext-0290da6d3df4eb3609d1bdca72ab7681> <http://purl.org/NET/c4dm/event.owl#place> <https://discovery.ucl.ac.uk/id/location/ext-c7afe8189c48ccabd39ca30cb16c6b48> . <https://discovery.ucl.ac.uk/id/event/ext-0290da6d3df4eb3609d1bdca72ab7681> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/NET/c4dm/event.owl#Event> . <https://discovery.ucl.ac.uk/id/event/ext-0290da6d3df4eb3609d1bdca72ab7681> <http://purl.org/NET/c4dm/event.owl#place> <https://discovery.ucl.ac.uk/id/location/ext-c7afe8189c48ccabd39ca30cb16c6b48> . <https://discovery.ucl.ac.uk/id/location/ext-c7afe8189c48ccabd39ca30cb16c6b48> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://www.w3.org/2003/01/geo/wgs84_pos#SpatialThing> . <https://discovery.ucl.ac.uk/id/location/ext-c7afe8189c48ccabd39ca30cb16c6b48> <http://www.w3.org/2000/01/rdf-schema#label> "Biarritz, France"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/EPrint> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/ProceedingsSectionEPrint> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/repository> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1747475> . <https://discovery.ucl.ac.uk/id/document/1747475> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/1747475> <http://www.w3.org/2000/01/rdf-schema#label> "REPLIOT: A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices (Text)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://purl.org/dc/elements/1.1/hasVersion> <https://discovery.ucl.ac.uk/id/document/1747475> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://eprints.org/ontology/hasAccepted> <https://discovery.ucl.ac.uk/id/document/1747475> . <https://discovery.ucl.ac.uk/id/document/1747475> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10192792/1/REPLIOT.pdf> . <https://discovery.ucl.ac.uk/id/document/1747475> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10192792/1/REPLIOT.pdf> . <https://discovery.ucl.ac.uk/id/eprint/10192792/1/REPLIOT.pdf> <http://www.w3.org/2000/01/rdf-schema#label> "REPLIOT.pdf"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1747482> . <https://discovery.ucl.ac.uk/id/document/1747482> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/1747482> <http://www.w3.org/2000/01/rdf-schema#label> "REPLIOT: A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/1747482> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1747475> . <https://discovery.ucl.ac.uk/id/document/1747482> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1747475> . <https://discovery.ucl.ac.uk/id/document/1747482> <http://eprints.org/relation/islightboxThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1747475> . <https://discovery.ucl.ac.uk/id/document/1747482> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10192792/2/lightbox.jpg> . <https://discovery.ucl.ac.uk/id/document/1747482> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10192792/2/lightbox.jpg> . <https://discovery.ucl.ac.uk/id/eprint/10192792/2/lightbox.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "lightbox.jpg"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1747483> . <https://discovery.ucl.ac.uk/id/document/1747483> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/1747483> <http://www.w3.org/2000/01/rdf-schema#label> "REPLIOT: A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/1747483> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1747475> . <https://discovery.ucl.ac.uk/id/document/1747483> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1747475> . <https://discovery.ucl.ac.uk/id/document/1747483> <http://eprints.org/relation/ispreviewThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1747475> . <https://discovery.ucl.ac.uk/id/document/1747483> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10192792/3/preview.jpg> . <https://discovery.ucl.ac.uk/id/document/1747483> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10192792/3/preview.jpg> . <https://discovery.ucl.ac.uk/id/eprint/10192792/3/preview.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "preview.jpg"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1747484> . <https://discovery.ucl.ac.uk/id/document/1747484> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/1747484> <http://www.w3.org/2000/01/rdf-schema#label> "REPLIOT: A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/1747484> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1747475> . <https://discovery.ucl.ac.uk/id/document/1747484> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1747475> . <https://discovery.ucl.ac.uk/id/document/1747484> <http://eprints.org/relation/ismediumThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1747475> . <https://discovery.ucl.ac.uk/id/document/1747484> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10192792/4/medium.jpg> . <https://discovery.ucl.ac.uk/id/document/1747484> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10192792/4/medium.jpg> . <https://discovery.ucl.ac.uk/id/eprint/10192792/4/medium.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "medium.jpg"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1747485> . <https://discovery.ucl.ac.uk/id/document/1747485> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/1747485> <http://www.w3.org/2000/01/rdf-schema#label> "REPLIOT: A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/1747485> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1747475> . <https://discovery.ucl.ac.uk/id/document/1747485> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1747475> . <https://discovery.ucl.ac.uk/id/document/1747485> <http://eprints.org/relation/issmallThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1747475> . <https://discovery.ucl.ac.uk/id/document/1747485> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10192792/5/small.jpg> . <https://discovery.ucl.ac.uk/id/document/1747485> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10192792/5/small.jpg> . <https://discovery.ucl.ac.uk/id/eprint/10192792/5/small.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "small.jpg"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1747486> . <https://discovery.ucl.ac.uk/id/document/1747486> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/1747486> <http://www.w3.org/2000/01/rdf-schema#label> "REPLIOT: A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/1747486> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1747475> . <https://discovery.ucl.ac.uk/id/document/1747486> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1747475> . <https://discovery.ucl.ac.uk/id/document/1747486> <http://eprints.org/relation/isIndexCodesVersionOf> <https://discovery.ucl.ac.uk/id/document/1747475> . <https://discovery.ucl.ac.uk/id/document/1747486> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10192792/6/indexcodes.txt> . <https://discovery.ucl.ac.uk/id/document/1747486> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10192792/6/indexcodes.txt> . <https://discovery.ucl.ac.uk/id/eprint/10192792/6/indexcodes.txt> <http://www.w3.org/2000/01/rdf-schema#label> "indexcodes.txt"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10192792> <http://www.w3.org/2000/01/rdf-schema#seeAlso> <https://discovery.ucl.ac.uk/id/eprint/10192792/> . <https://discovery.ucl.ac.uk/id/eprint/10192792/> <http://purl.org/dc/elements/1.1/title> "HTML Summary of #10192792 \n\nREPLIOT: A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices\n\n" . <https://discovery.ucl.ac.uk/id/eprint/10192792/> <http://purl.org/dc/elements/1.1/format> "text/html" . <https://discovery.ucl.ac.uk/id/eprint/10192792/> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10192792> .