16 results on '"Cambiaso E"'
Search Results
2. Perpetrate cyber-attacks using IoT devices as attack vector: The ESP8266 use case
3. Evaluating the possibility to perpetrate tunneling attacks exploiting short-message-service
4. Darknet security: A categorization of attacks to the tor network
5. The future of Cybersecurity in Italy: Strategic focus area
6. Feature transformation and Mutual Information for DNS tunneling analysis
7. Detection of DoS attacks through Fourier transform and mutual information
8. An on-line intrusion detection approach to identify low-rate DoS attacks
9. Key innovations in ANASTACIA: Advanced networked agents for security and trust assessment in CPS/IOT architectures
10. Key innovations in ANASTACIA: Advanced networked agents for security and trust assessment in CPS/IOT architectures
11. Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System.
12. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.
13. A Generative Adversarial Network (GAN) Technique for Internet of Medical Things Data.
14. MQTTset, a New Dataset for Machine Learning Techniques on MQTT.
15. Levels of anxiety and depression among emergency physicians in Madrid during the SARS-CoV-2 pandemic.
16. SlowITe, a Novel Denial of Service Attack Affecting MQTT.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.