Computer Security. ESORICS 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers | 0 | 0.34 | 2022 |
Evaluating the Possibility to Perpetrate Tunneling Attacks Exploiting Short-Message-Service. | 0 | 0.34 | 2021 |
On the Feasibility of Covert Channels through Short-Message-Service. | 0 | 0.34 | 2021 |
Cyber-Physical Security for Critical Infrastructures Protection - First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers | 0 | 0.34 | 2021 |
Perpetrate Cyber-threats using IoT Devices as Attack Vector - The ESP8266 Use Case. | 0 | 0.34 | 2021 |
Slowtt: A Slow Denial Of Service Against Iot Networks | 2 | 0.39 | 2020 |
SlowITe, a Novel Denial of Service Attack Affecting MQTT. | 2 | 0.40 | 2020 |
MQTTset, a New Dataset for Machine Learning Techniques on MQTT. | 1 | 0.36 | 2020 |
Detection and classification of slow DoS attacks targeting network servers. | 0 | 0.34 | 2020 |
FINSTIX - A Cyber-Physical Data Model for Financial Critical Infrastructures. | 0 | 0.34 | 2020 |
Protecting the ESP8266 Module from Replay Attacks | 0 | 0.34 | 2020 |
Introducing the SlowDrop Attack. | 2 | 0.38 | 2019 |
Darknet Security - A Categorization of Attacks to the Tor Network. | 0 | 0.34 | 2019 |
Remotely Exploiting AT Command Attacks on ZigBee Networks | 1 | 0.36 | 2017 |
Slowcomm: Design, development and performance evaluation of a new slow DoS attack. | 4 | 0.47 | 2017 |
Measuring the Energy Consumption of Cyber Security. | 2 | 0.37 | 2017 |
Profiling DNS tunneling attacks with PCA and mutual information. | 1 | 0.36 | 2016 |
Malware Development on Mobile Environments | 0 | 0.34 | 2016 |
Are mobile botnets a possible threat? The case of SlowBot Net. | 6 | 0.48 | 2016 |
Mobile executions of Slow DoS Attacks. | 3 | 0.45 | 2016 |
Feature transformation and Mutual Information for DNS tunneling analysis | 2 | 0.41 | 2016 |
Understanding DDoS Attacks from Mobile Devices | 3 | 0.38 | 2015 |
Designing and Modeling the Slow Next DoS Attack | 3 | 0.38 | 2015 |
Perpetrate Network Attacks From Mobile Devices | 0 | 0.34 | 2015 |
SlowDroid: Turning a Smartphone into a Mobile Attack Vector | 5 | 0.47 | 2014 |
A similarity based approach for application DoS attacks detection | 7 | 0.56 | 2013 |
SlowReq: A Weapon for Cyberwarfare Operations. Characteristics, Limits, Performance, Remediations. | 10 | 0.69 | 2013 |
Slow DoS attacks: definition and categorisation | 17 | 0.85 | 2013 |
Taxonomy of Slow DoS Attacks to Web Applications. | 17 | 0.80 | 2012 |