On security threats of botnets to cyber systems
T Lange, H Kettani - 2019 6th International Conference on …, 2019 - ieeexplore.ieee.org
As the dynamics of cyber warfare continue to change, it is very important to be aware of the
issues currently confronting cyberspace. One threat which continues to grow in the danger it …
issues currently confronting cyberspace. One threat which continues to grow in the danger it …
Iot malware ecosystem in the wild: a glimpse into analysis and exposures
The lack of security measures among the Internet of Things (IoT) devices and their persistent
online connection give adversaries a prime opportunity to target them or even abuse them …
online connection give adversaries a prime opportunity to target them or even abuse them …
Review and classification of multichannel MAC protocols for low-power and lossy networks
CMG Algora, VA Reguera, N Deligiannis… - IEEE …, 2017 - ieeexplore.ieee.org
The so-called Internet of Things (IoT) aims at connecting every single object to the Internet
with the purpose to automate every aspect of daily life. The IoT relies heavily on wireless low …
with the purpose to automate every aspect of daily life. The IoT relies heavily on wireless low …
A self-adaptive load balancing approach for software-defined networks in iot
The Internet of Things (IoT) is gaining popularity as it offers to connect billions of devices and
exchange data over the internet. However, the large-scale and heterogeneous IoT network …
exchange data over the internet. However, the large-scale and heterogeneous IoT network …
Defending internet of things against malicious domain names using D-FENS
J Spaulding, A Mohaisen - 2018 IEEE/ACM symposium on …, 2018 - ieeexplore.ieee.org
Malicious domain names have long been pervasive in the global DNS (Domain Name
System) infrastructure and lend themselves to undesirable activities such as phishing or …
System) infrastructure and lend themselves to undesirable activities such as phishing or …
Toward usable network traffic policies for IoT devices in consumer networks
N DeMarinis, R Fonseca - Proceedings of the 2017 Workshop on …, 2017 - dl.acm.org
The Internet of Things (IoT) revolution has brought millions of small, low-cost, connected
devices into our homes, cities, infrastructure, and more. However, these devices are often …
devices into our homes, cities, infrastructure, and more. However, these devices are often …
Thriving on chaos: Proactive detection of command and control domains in internet of things‐scale botnets using DRIFT
In this paper, we introduce DRIFT, a system for detecting command and control (C2) domain
names in Internet of Things–scale botnets. Using an intrinsic feature of malicious domain …
names in Internet of Things–scale botnets. Using an intrinsic feature of malicious domain …
Generating system models for a highly configurable train control system using a domain-specific language: A case study
J Kloos, R Eschbach - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
In this work, we present a results from case study on testing a highly configurable, safety-
critical system from the railway domain using model-based risk-oriented testing. In the …
critical system from the railway domain using model-based risk-oriented testing. In the …
DYNAMIC NETWORK RESOURCE MANAGEMENT IN IOT
Z Min - 2023 - ir.vanderbilt.edu
This dissertation presents innovative solutions to address the challenges in the 5G & IoT
network, including self-adaptive load balancing, software-defined dynamic 5G network slice …
network, including self-adaptive load balancing, software-defined dynamic 5G network slice …
[PDF][PDF] Les opérations en environnement électromagnétique dégradé
P Gros - IFRI, Observatoire des conflits futurs, 2018 - frstrategie.org
Résumé Les opérations dans le spectre électromagnétique, c'est-à-dire l'exploitation de ce
spectre à des fins de télécommunications, de télédétection et de positionnement, navigation …
spectre à des fins de télécommunications, de télédétection et de positionnement, navigation …