[go: up one dir, main page]

Follow
Enrico Cambiaso
Enrico Cambiaso
Verified email at cnr.it - Homepage
Title
Cited by
Cited by
Year
MQTTset, a new dataset for machine learning techniques on MQTT
I Vaccari, G Chiola, M Aiello, M Mongelli, E Cambiaso
Sensors 20 (22), 6578, 2020
3262020
Slow DoS attacks: definition and categorisation
E Cambiaso, G Papaleo, G Chiola, M Aiello
International Journal of Trust Management in Computing and Communications 1 …, 2013
1592013
SlowITe, a novel denial of service attack affecting MQTT
I Vaccari, M Aiello, E Cambiaso
Sensors 20 (10), 2932, 2020
1232020
A generative adversarial network (GAN) technique for internet of medical things data
I Vaccari, V Orani, A Paglialonga, E Cambiaso, M Mongelli
Sensors 21 (11), 3726, 2021
972021
Taxonomy of slow DoS attacks to web applications
E Cambiaso, G Papaleo, M Aiello
International Conference on Security in Computer Networks and Distributed …, 2012
972012
Preventing MQTT vulnerabilities using IoT-enabled intrusion detection system
M Husnain, K Hayat, E Cambiaso, UU Fayyaz, M Mongelli, H Akram, ...
Sensors 22 (2), 567, 2022
802022
Identifying and mitigating phishing attack threats in IoT use cases using a threat modelling approach
SG Abbas, I Vaccari, F Hussain, S Zahid, UU Fayyaz, GA Shah, T Bakhshi, ...
Sensors 21 (14), 4816, 2021
782021
Slowcomm: Design, development and performance evaluation of a new slow DoS attack
E Cambiaso, G Papaleo, M Aiello
Journal of Information Security and Applications 35, 23-31, 2017
512017
An on-line intrusion detection approach to identify low-rate DoS attacks
M Aiello, E Cambiaso, M Mongelli, G Papaleo
2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014
512014
Remotely exploiting at command attacks on zigbee networks
I Vaccari, E Cambiaso, M Aiello
Security and Communication Networks 2017 (1), 1723658, 2017
472017
Darknet Security: A Categorization of Attacks to the Tor Network.
E Cambiaso, I Vaccari, L Patti, M Aiello
ITASEC, 1-12, 2019
412019
Designing and modeling the slow next DoS attack
E Cambiaso, G Papaleo, G Chiola, M Aiello
Computational intelligence in security for information systems conference …, 2015
412015
Measuring the energy consumption of cyber security
L Caviglione, M Gaggero, E Cambiaso, M Aiello
IEEE Communications Magazine 55 (7), 58-63, 2017
392017
Slowtt: A slow denial of service against iot networks
I Vaccari, M Aiello, E Cambiaso
Information 11 (9), 452, 2020
372020
Are mobile botnets a possible threat? The case of SlowBot Net
P Farina, E Cambiaso, G Papaleo, M Aiello
Computers & Security 58, 268-283, 2016
372016
Exploiting Internet of Things protocols for malicious data exfiltration activities
I Vaccari, S Narteni, M Aiello, M Mongelli, E Cambiaso
IEEE Access 9, 104261-104280, 2021
352021
Profiling DNS tunneling attacks with PCA and mutual information
M Aiello, M Mongelli, E Cambiaso, G Papaleo
Logic Journal of the IGPL 24 (6), 957-970, 2016
352016
Understanding ddos attacks from mobile devices
P Farina, E Cambiaso, G Papaleo, M Aiello
2015 3rd International Conference on Future Internet of Things and Cloud …, 2015
342015
A similarity based approach for application DoS attacks detection
M Aiello, E Cambiaso, S Scaglione, G Papaleo
2013 IEEE Symposium on Computers and Communications (ISCC), 000430-000435, 2013
342013
Scamming the scammers: Using chatgpt to reply mails for wasting time and resources
E Cambiaso, L Caviglione
arXiv preprint arXiv:2303.13521, 2023
312023
The system can't perform the operation now. Try again later.
Articles 1–20