S. Suresh and P. V. Sruthi, “A review on smart home technology,” in 2015 Online International Conference on Green Engineering and Technologies (IC-GET), Nov 2015, pp. 1-3.
 S. Guoqiang, C. Yanming, Z. Chao, and Z. Yanxu, “Design and implementation of a smart iot gateway,” in 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, Aug 2013, pp. 720-723. [OpenAIRE]
 P. Wang, S. Y. Zhang, and X. J. Chen, “Sfarima: A new network traffic prediction algorithm,” in 2009 First International Conference on Information Science and Engineering, Dec 2009, pp. 1859-1863.
 F. K. Santoso and N. C. H. Vun, “Securing iot for smart home system,” in 2015 International Symposium on Consumer Electronics (ISCE), June 2015, pp. 1-2. [OpenAIRE]
 D. Vavilov, A. Melezhik, and I. Platonov, “Reference model for smart home user behavior analysis software module,” in 2014 IEEE Fourth International Conference on Consumer Electronics Berlin (ICCE-Berlin), Sept 2014, pp. 3-6. [OpenAIRE]
 P. Wang and X. Chen, “Co hijacking monitor: Collaborative detecting and locating mechanism for http spectral hijacking,” in The 2017 IEEE Cyber Science and Technology Congress (CyberSciTech 2017), Oct 2017.
 P. Wang, “Big data plug-in technology for smart router based on multidimensional awareness,” Journal of Nanjing University of Posts and Telecommunications(Natural Science), pp. 18-21, 2016.
 P. Wang, S. Liu, F. Ye, and X. Chen, “A fog-based architecture and programming model for iot applications in the smart grid,” Under submission, 2017.
 P. Wang, S. Zhang, and X. Chen, “A novel reputation reporting mechanism based on cloud model and gray system theory,” vol. 3, pp. 75-84, 11 2011.
 D. Manzaroli, L. Roffia, T. S. Cinotti, E. Ovaska, P. Azzoni, V. Nannini, and S. Mattarozzi, “Smart-m3 and osgi: The interoperability platform,” in The IEEE symposium on Computers and Communications, June 2010, pp. 1053-1058. [OpenAIRE]
 G. Huaiyu, X. Jinsong, and P. Wang, “An associated perception import method for big data,” in Telecommunications Science, vol. 32, 2016, pp. 130-134.
 X. Chen, P. Wang, and S. Liu, “Key technology of ssl encrypted application identification under imbalance of application class,” in Telecommunications Science, vol. 31, 2015, pp. 83-89.
 C. Wright, F. Monrose, and G. M. Masson, “Hmm profiles for network traffic classification,” in Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, ser. VizSEC/DMSEC '04. New York, NY, USA: ACM, 2004, pp. 9-15. [Online]. Available: http://doi.acm.org/10.1145/1029208.1029211
 A. W. Moore and D. Zuev, “Internet traffic classification using bayesian analysis techniques,” SIGMETRICS Perform. Eval. Rev., vol. 33, no. 1, pp. 50-60, Jun. 2005. [Online]. Available: http://doi.acm.org/10.1145/1071690.1064220
 N. Williams, S. Zander, and G. Armitage, “A preliminary performance comparison of five machine learning algorithms for practical ip traffic flow classification,” SIGCOMM Comput. Commun. Rev., vol. 36, no. 5, pp. 5-16, Oct. 2006. [Online]. Available: http://doi.acm.org/10.1145/1163593.1163596