Search

Your search keyword '"Cambiaso E"' showing total 16 results

Search Constraints

Start Over You searched for: Author "Cambiaso E" Remove constraint Author: "Cambiaso E"
16 results on '"Cambiaso E"'

Search Results

2. Perpetrate cyber-attacks using IoT devices as attack vector: The ESP8266 use case

3. Evaluating the possibility to perpetrate tunneling attacks exploiting short-message-service

4. Darknet security: A categorization of attacks to the tor network

5. The future of Cybersecurity in Italy: Strategic focus area

10. Key innovations in ANASTACIA: Advanced networked agents for security and trust assessment in CPS/IOT architectures

11. Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System.

12. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.

13. A Generative Adversarial Network (GAN) Technique for Internet of Medical Things Data.

14. MQTTset, a New Dataset for Machine Learning Techniques on MQTT.

15. Levels of anxiety and depression among emergency physicians in Madrid during the SARS-CoV-2 pandemic.

16. SlowITe, a Novel Denial of Service Attack Affecting MQTT.

Catalog

Books, media, physical & digital resources