Name
Papers
Collaborators
ENRICO CAMBIASO
29
41
Citations 
PageRank 
Referers 
88
12.29
153
Referees 
References 
535
271
Search Limit
100535
Title
Citations
PageRank
Year
Computer Security. ESORICS 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers00.342022
Evaluating the Possibility to Perpetrate Tunneling Attacks Exploiting Short-Message-Service.00.342021
On the Feasibility of Covert Channels through Short-Message-Service.00.342021
Cyber-Physical Security for Critical Infrastructures Protection - First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers00.342021
Perpetrate Cyber-threats using IoT Devices as Attack Vector - The ESP8266 Use Case.00.342021
Slowtt: A Slow Denial Of Service Against Iot Networks20.392020
SlowITe, a Novel Denial of Service Attack Affecting MQTT.20.402020
MQTTset, a New Dataset for Machine Learning Techniques on MQTT.10.362020
Detection and classification of slow DoS attacks targeting network servers.00.342020
FINSTIX - A Cyber-Physical Data Model for Financial Critical Infrastructures.00.342020
Protecting the ESP8266 Module from Replay Attacks00.342020
Introducing the SlowDrop Attack.20.382019
Darknet Security - A Categorization of Attacks to the Tor Network.00.342019
Remotely Exploiting AT Command Attacks on ZigBee Networks10.362017
Slowcomm: Design, development and performance evaluation of a new slow DoS attack.40.472017
Measuring the Energy Consumption of Cyber Security.20.372017
Profiling DNS tunneling attacks with PCA and mutual information.10.362016
Malware Development on Mobile Environments00.342016
Are mobile botnets a possible threat? The case of SlowBot Net.60.482016
Mobile executions of Slow DoS Attacks.30.452016
Feature transformation and Mutual Information for DNS tunneling analysis20.412016
Understanding DDoS Attacks from Mobile Devices30.382015
Designing and Modeling the Slow Next DoS Attack30.382015
Perpetrate Network Attacks From Mobile Devices00.342015
SlowDroid: Turning a Smartphone into a Mobile Attack Vector50.472014
A similarity based approach for application DoS attacks detection70.562013
SlowReq: A Weapon for Cyberwarfare Operations. Characteristics, Limits, Performance, Remediations.100.692013
Slow DoS attacks: definition and categorisation170.852013
Taxonomy of Slow DoS Attacks to Web Applications.170.802012