Evaluating the Possibility to Perpetrate Tunneling Attacks Exploiting Short-Message-Service. | 0 | 0.34 | 2021 |
Slowtt: A Slow Denial Of Service Against Iot Networks | 2 | 0.39 | 2020 |
SlowITe, a Novel Denial of Service Attack Affecting MQTT. | 2 | 0.40 | 2020 |
MQTTset, a New Dataset for Machine Learning Techniques on MQTT. | 1 | 0.36 | 2020 |
Detection and classification of slow DoS attacks targeting network servers. | 0 | 0.34 | 2020 |
Protecting the ESP8266 Module from Replay Attacks | 0 | 0.34 | 2020 |
Introducing the SlowDrop Attack. | 2 | 0.38 | 2019 |
Darknet Security - A Categorization of Attacks to the Tor Network. | 0 | 0.34 | 2019 |
Unsupervised Learning And Rule Extraction For Domain Name Server Tunneling Detection | 1 | 0.37 | 2019 |
Remotely Exploiting AT Command Attacks on ZigBee Networks | 1 | 0.36 | 2017 |
Slowcomm: Design, development and performance evaluation of a new slow DoS attack. | 4 | 0.47 | 2017 |
Measuring the Energy Consumption of Cyber Security. | 2 | 0.37 | 2017 |
Profiling DNS tunneling attacks with PCA and mutual information. | 1 | 0.36 | 2016 |
Malware Development on Mobile Environments | 0 | 0.34 | 2016 |
Are mobile botnets a possible threat? The case of SlowBot Net. | 6 | 0.48 | 2016 |
Mobile executions of Slow DoS Attacks. | 3 | 0.45 | 2016 |
Feature transformation and Mutual Information for DNS tunneling analysis | 2 | 0.41 | 2016 |
Understanding DDoS Attacks from Mobile Devices | 3 | 0.38 | 2015 |
Designing and Modeling the Slow Next DoS Attack | 3 | 0.38 | 2015 |
DNS tunneling detection through statistical fingerprints of protocol messages and machine learning | 14 | 1.14 | 2015 |
Perpetrate Network Attacks From Mobile Devices | 0 | 0.34 | 2015 |
SlowDroid: Turning a Smartphone into a Mobile Attack Vector | 5 | 0.47 | 2014 |
Supervised Learning Approaches with Majority Voting for DNS Tunneling Detection | 3 | 0.48 | 2014 |
A similarity based approach for application DoS attacks detection | 7 | 0.56 | 2013 |
SlowReq: A Weapon for Cyberwarfare Operations. Characteristics, Limits, Performance, Remediations. | 10 | 0.69 | 2013 |
Performance assessment and analysis of DNS tunneling tools. | 4 | 0.51 | 2013 |
Basic classifiers for DNS tunneling detection | 7 | 0.55 | 2013 |
Taxonomy of Slow DoS Attacks to Web Applications. | 17 | 0.80 | 2012 |
A comparative performance evaluation of DNS tunneling tools | 9 | 0.78 | 2011 |
Statistical Anomaly Detection on Real e-Mail Traffic. | 0 | 0.34 | 2008 |