Segui
Enrico Cambiaso
Enrico Cambiaso
Email verificata su cnr.it - Home page
Titolo
Citata da
Citata da
Anno
MQTTset, a new dataset for machine learning techniques on MQTT
I Vaccari, G Chiola, M Aiello, M Mongelli, E Cambiaso
Sensors 20 (22), 6578, 2020
1682020
Slow DoS attacks: definition and categorisation
E Cambiaso, G Papaleo, G Chiola, M Aiello
International Journal of Trust Management in Computing and Communications 1 …, 2013
1312013
Taxonomy of slow DoS attacks to web applications
E Cambiaso, G Papaleo, M Aiello
Recent Trends in Computer Networks and Distributed Systems Security …, 2012
842012
SlowITe, a novel denial of service attack affecting MQTT
I Vaccari, M Aiello, E Cambiaso
Sensors 20 (10), 2932, 2020
692020
An on-line intrusion detection approach to identify low-rate DoS attacks
M Aiello, E Cambiaso, M Mongelli, G Papaleo
2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014
472014
A generative adversarial network (GAN) technique for internet of medical things data
I Vaccari, V Orani, A Paglialonga, E Cambiaso, M Mongelli
Sensors 21 (11), 3726, 2021
432021
Slowcomm: Design, development and performance evaluation of a new slow DoS attack
E Cambiaso, G Papaleo, M Aiello
Journal of Information Security and Applications 35, 23-31, 2017
422017
Remotely exploiting at command attacks on zigbee networks
I Vaccari, E Cambiaso, M Aiello
Security and Communication Networks 2017, 2017
412017
Are mobile botnets a possible threat? The case of SlowBot Net
P Farina, E Cambiaso, G Papaleo, M Aiello
Computers & Security 58, 268-283, 2016
372016
Darknet Security: A Categorization of Attacks to the Tor Network.
E Cambiaso, I Vaccari, L Patti, M Aiello
ITASEC, 1-12, 2019
362019
Preventing mqtt vulnerabilities using iot-enabled intrusion detection system
M Husnain, K Hayat, E Cambiaso, UU Fayyaz, M Mongelli, H Akram, ...
Sensors 22 (2), 567, 2022
332022
Understanding ddos attacks from mobile devices
P Farina, E Cambiaso, G Papaleo, M Aiello
2015 3rd International Conference on Future Internet of Things and Cloud …, 2015
332015
Identifying and mitigating phishing attack threats in IoT use cases using a threat modelling approach
SG Abbas, I Vaccari, F Hussain, S Zahid, UU Fayyaz, GA Shah, T Bakhshi, ...
Sensors 21 (14), 4816, 2021
322021
Measuring the energy consumption of cyber security
L Caviglione, M Gaggero, E Cambiaso, M Aiello
IEEE Communications Magazine 55 (7), 58-63, 2017
322017
A similarity based approach for application DoS attacks detection
M Aiello, E Cambiaso, S Scaglione, G Papaleo
2013 IEEE Symposium on Computers and Communications (ISCC), 000430-000435, 2013
322013
Profiling DNS tunneling attacks with PCA and mutual information
M Aiello, M Mongelli, E Cambiaso, G Papaleo
Logic Journal of the IGPL 24 (6), 957-970, 2016
302016
Designing and modeling the slow next DoS attack
E Cambiaso, G Papaleo, G Chiola, M Aiello
International Joint Conference: CISIS’15 and ICEUTE’15, 249-259, 2015
302015
Slowtt: A slow denial of service against iot networks
I Vaccari, M Aiello, E Cambiaso
Information 11 (9), 452, 2020
272020
Detection of DoS attacks through Fourier transform and mutual information
M Mongelli, M Aiello, E Cambiaso, G Papaleo
2015 IEEE International Conference on Communications (ICC), 7204-7209, 2015
262015
Slowdroid: Turning a smartphone into a mobile attack vector
E Cambiaso, G Papaleo, M Aiello
2014 International Conference on Future Internet of Things and Cloud, 405-410, 2014
222014
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20