MQTTset, a new dataset for machine learning techniques on MQTT I Vaccari, G Chiola, M Aiello, M Mongelli, E Cambiaso Sensors 20 (22), 6578, 2020 | 181 | 2020 |
Slow DoS attacks: definition and categorisation E Cambiaso, G Papaleo, G Chiola, M Aiello International Journal of Trust Management in Computing and Communications 1 …, 2013 | 135 | 2013 |
Taxonomy of slow DoS attacks to web applications E Cambiaso, G Papaleo, M Aiello Recent Trends in Computer Networks and Distributed Systems Security …, 2012 | 88 | 2012 |
SlowITe, a novel denial of service attack affecting MQTT I Vaccari, M Aiello, E Cambiaso Sensors 20 (10), 2932, 2020 | 76 | 2020 |
A generative adversarial network (GAN) technique for internet of medical things data I Vaccari, V Orani, A Paglialonga, E Cambiaso, M Mongelli Sensors 21 (11), 3726, 2021 | 47 | 2021 |
An on-line intrusion detection approach to identify low-rate DoS attacks M Aiello, E Cambiaso, M Mongelli, G Papaleo 2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014 | 47 | 2014 |
Slowcomm: Design, development and performance evaluation of a new slow DoS attack E Cambiaso, G Papaleo, M Aiello Journal of Information Security and Applications 35, 23-31, 2017 | 44 | 2017 |
Remotely exploiting at command attacks on zigbee networks I Vaccari, E Cambiaso, M Aiello Security and Communication Networks 2017 (1), 1723658, 2017 | 42 | 2017 |
Preventing mqtt vulnerabilities using iot-enabled intrusion detection system M Husnain, K Hayat, E Cambiaso, UU Fayyaz, M Mongelli, H Akram, ... Sensors 22 (2), 567, 2022 | 39 | 2022 |
Identifying and mitigating phishing attack threats in IoT use cases using a threat modelling approach SG Abbas, I Vaccari, F Hussain, S Zahid, UU Fayyaz, GA Shah, T Bakhshi, ... Sensors 21 (14), 4816, 2021 | 39 | 2021 |
Darknet Security: A Categorization of Attacks to the Tor Network. E Cambiaso, I Vaccari, L Patti, M Aiello ITASEC, 1-12, 2019 | 39 | 2019 |
Are mobile botnets a possible threat? The case of SlowBot Net P Farina, E Cambiaso, G Papaleo, M Aiello Computers & Security 58, 268-283, 2016 | 37 | 2016 |
Understanding ddos attacks from mobile devices P Farina, E Cambiaso, G Papaleo, M Aiello 2015 3rd International Conference on Future Internet of Things and Cloud …, 2015 | 34 | 2015 |
Designing and modeling the slow next DoS attack E Cambiaso, G Papaleo, G Chiola, M Aiello International Joint Conference: CISIS’15 and ICEUTE’15, 249-259, 2015 | 33 | 2015 |
A similarity based approach for application DoS attacks detection M Aiello, E Cambiaso, S Scaglione, G Papaleo 2013 IEEE Symposium on Computers and Communications (ISCC), 000430-000435, 2013 | 33 | 2013 |
Measuring the energy consumption of cyber security L Caviglione, M Gaggero, E Cambiaso, M Aiello IEEE Communications Magazine 55 (7), 58-63, 2017 | 32 | 2017 |
Profiling DNS tunneling attacks with PCA and mutual information M Aiello, M Mongelli, E Cambiaso, G Papaleo Logic Journal of the IGPL 24 (6), 957-970, 2016 | 30 | 2016 |
Slowtt: A slow denial of service against iot networks I Vaccari, M Aiello, E Cambiaso Information 11 (9), 452, 2020 | 29 | 2020 |
Detection of DoS attacks through Fourier transform and mutual information M Mongelli, M Aiello, E Cambiaso, G Papaleo 2015 IEEE International Conference on Communications (ICC), 7204-7209, 2015 | 27 | 2015 |
Slowdroid: Turning a smartphone into a mobile attack vector E Cambiaso, G Papaleo, M Aiello 2014 International Conference on Future Internet of Things and Cloud, 405-410, 2014 | 24 | 2014 |