<?xml version="1.0" encoding="UTF-8"?><rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcq="http://purl.org/dc/terms/"><records count="1" morepages="false" start="1" end="1"><record rownumber="1"><dc:product_type>Conference Paper</dc:product_type><dc:title>IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors</dc:title><dc:creator>Fu, Chenglong; Zeng, Qiang; Chi, Haotian; Du, Xiaojiang; Valluru, Siva Likitha</dc:creator><dc:corporate_author/><dc:editor/><dc:description/><dc:publisher/><dc:date>2022-06-01</dc:date><dc:nsf_par_id>10386165</dc:nsf_par_id><dc:journal_name>52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)</dc:journal_name><dc:journal_volume/><dc:journal_issue/><dc:page_range_or_elocation>428 to 440</dc:page_range_or_elocation><dc:issn/><dc:isbn/><dc:doi>https://doi.org/10.1109/DSN53405.2022.00050</dc:doi><dcq:identifierAwardId>1856380; 2016415; 2107093; 2144669; 2310322</dcq:identifierAwardId><dc:subject/><dc:version_number/><dc:location/><dc:rights/><dc:institution/><dc:sponsoring_org>National Science Foundation</dc:sponsoring_org></record></records></rdf:RDF>