关注
Enrico Cambiaso
Enrico Cambiaso
在 cnr.it 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
MQTTset, a new dataset for machine learning techniques on MQTT
I Vaccari, G Chiola, M Aiello, M Mongelli, E Cambiaso
Sensors 20 (22), 6578, 2020
1812020
Slow DoS attacks: definition and categorisation
E Cambiaso, G Papaleo, G Chiola, M Aiello
International Journal of Trust Management in Computing and Communications 1 …, 2013
1352013
Taxonomy of slow DoS attacks to web applications
E Cambiaso, G Papaleo, M Aiello
Recent Trends in Computer Networks and Distributed Systems Security …, 2012
882012
SlowITe, a novel denial of service attack affecting MQTT
I Vaccari, M Aiello, E Cambiaso
Sensors 20 (10), 2932, 2020
762020
A generative adversarial network (GAN) technique for internet of medical things data
I Vaccari, V Orani, A Paglialonga, E Cambiaso, M Mongelli
Sensors 21 (11), 3726, 2021
472021
An on-line intrusion detection approach to identify low-rate DoS attacks
M Aiello, E Cambiaso, M Mongelli, G Papaleo
2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014
472014
Slowcomm: Design, development and performance evaluation of a new slow DoS attack
E Cambiaso, G Papaleo, M Aiello
Journal of Information Security and Applications 35, 23-31, 2017
442017
Remotely exploiting at command attacks on zigbee networks
I Vaccari, E Cambiaso, M Aiello
Security and Communication Networks 2017 (1), 1723658, 2017
422017
Preventing mqtt vulnerabilities using iot-enabled intrusion detection system
M Husnain, K Hayat, E Cambiaso, UU Fayyaz, M Mongelli, H Akram, ...
Sensors 22 (2), 567, 2022
392022
Identifying and mitigating phishing attack threats in IoT use cases using a threat modelling approach
SG Abbas, I Vaccari, F Hussain, S Zahid, UU Fayyaz, GA Shah, T Bakhshi, ...
Sensors 21 (14), 4816, 2021
392021
Darknet Security: A Categorization of Attacks to the Tor Network.
E Cambiaso, I Vaccari, L Patti, M Aiello
ITASEC, 1-12, 2019
392019
Are mobile botnets a possible threat? The case of SlowBot Net
P Farina, E Cambiaso, G Papaleo, M Aiello
Computers & Security 58, 268-283, 2016
372016
Understanding ddos attacks from mobile devices
P Farina, E Cambiaso, G Papaleo, M Aiello
2015 3rd International Conference on Future Internet of Things and Cloud …, 2015
342015
Designing and modeling the slow next DoS attack
E Cambiaso, G Papaleo, G Chiola, M Aiello
International Joint Conference: CISIS’15 and ICEUTE’15, 249-259, 2015
332015
A similarity based approach for application DoS attacks detection
M Aiello, E Cambiaso, S Scaglione, G Papaleo
2013 IEEE Symposium on Computers and Communications (ISCC), 000430-000435, 2013
332013
Measuring the energy consumption of cyber security
L Caviglione, M Gaggero, E Cambiaso, M Aiello
IEEE Communications Magazine 55 (7), 58-63, 2017
322017
Profiling DNS tunneling attacks with PCA and mutual information
M Aiello, M Mongelli, E Cambiaso, G Papaleo
Logic Journal of the IGPL 24 (6), 957-970, 2016
302016
Slowtt: A slow denial of service against iot networks
I Vaccari, M Aiello, E Cambiaso
Information 11 (9), 452, 2020
292020
Detection of DoS attacks through Fourier transform and mutual information
M Mongelli, M Aiello, E Cambiaso, G Papaleo
2015 IEEE International Conference on Communications (ICC), 7204-7209, 2015
272015
Slowdroid: Turning a smartphone into a mobile attack vector
E Cambiaso, G Papaleo, M Aiello
2014 International Conference on Future Internet of Things and Cloud, 405-410, 2014
242014
系统目前无法执行此操作,请稍后再试。
文章 1–20