Slow DoS attacks: definition and categorisation E Cambiaso, G Papaleo, G Chiola, M Aiello International Journal of Trust Management in Computing and Communications 1 …, 2013 | 78 | 2013 |
Taxonomy of slow DoS attacks to web applications E Cambiaso, G Papaleo, M Aiello International Conference on Security in Computer Networks and Distributed …, 2012 | 57 | 2012 |
An on-line intrusion detection approach to identify low-rate DoS attacks M Aiello, E Cambiaso, M Mongelli, G Papaleo 2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014 | 30 | 2014 |
Are mobile botnets a possible threat? The case of SlowBot Net P Farina, E Cambiaso, G Papaleo, M Aiello Computers & Security 58, 268-283, 2016 | 28 | 2016 |
Remotely exploiting at command attacks on zigbee networks I Vaccari, E Cambiaso, M Aiello Security and Communication Networks 2017, 2017 | 25 | 2017 |
Understanding ddos attacks from mobile devices P Farina, E Cambiaso, G Papaleo, M Aiello 2015 3rd International Conference on Future Internet of Things and Cloud …, 2015 | 25 | 2015 |
A similarity based approach for application DoS attacks detection M Aiello, E Cambiaso, S Scaglione, G Papaleo 2013 IEEE Symposium on Computers and Communications (ISCC), 000430-000435, 2013 | 25 | 2013 |
Detection of DoS attacks through Fourier transform and mutual information M Mongelli, M Aiello, E Cambiaso, G Papaleo 2015 IEEE International Conference on Communications (ICC), 7204-7209, 2015 | 23 | 2015 |
Slowcomm: Design, development and performance evaluation of a new slow DoS attack E Cambiaso, G Papaleo, M Aiello Journal of Information Security and Applications 35, 23-31, 2017 | 21 | 2017 |
Profiling DNS tunneling attacks with PCA and mutual information M Aiello, M Mongelli, E Cambiaso, G Papaleo Logic Journal of the IGPL 24 (6), 957-970, 2016 | 18 | 2016 |
Slowdroid: Turning a smartphone into a mobile attack vector E Cambiaso, G Papaleo, M Aiello 2014 International Conference on Future Internet of Things and Cloud, 405-410, 2014 | 18 | 2014 |
SlowReq: a weapon for cyberwarfare operations. Characteristics, limits, performance, remediations M Aiello, G Papaleo, E Cambiaso International Joint Conference SOCO’13-CISIS’13-ICEUTE’13, 537-546, 2014 | 17 | 2014 |
Measuring the energy consumption of cyber security L Caviglione, M Gaggero, E Cambiaso, M Aiello IEEE Communications Magazine 55 (7), 58-63, 2017 | 16 | 2017 |
Mobile Botnets Development: Issues and Solutions P Farina, E Cambiaso, G Papaleo, M Aiello International Journal of Future Computer and Communication 3 (6), 385-390, 2014 | 14 | 2014 |
Mobile executions of slow DoS attacks E Cambiaso, G Papaleo, G Chiola, M Aiello Logic Journal of IGPL 24 (1), 54-67, 2016 | 12 | 2016 |
Designing and modeling the slow next DoS attack E Cambiaso, G Papaleo, G Chiola, M Aiello Computational Intelligence in Security for Information Systems Conference …, 2015 | 12 | 2015 |
Evaluating security of low-power internet of things networks I Vaccari, E Cambiaso, M Aiello International Journal of Computing and Digital Systems 8 (02), 101-114, 2019 | 11 | 2019 |
A network traffic representation model for detecting application layer attacks E Cambiaso, G Papaleo, G Chiola, M Aiello International Journal of Computing and Digital Systems 5 (01), 2016 | 9 | 2016 |
Feature transformation and Mutual Information for DNS tunneling analysis E Cambiaso, M Aiello, M Mongelli, G Papaleo 2016 Eighth International Conference on Ubiquitous and Future Networks …, 2016 | 8 | 2016 |
SlowITe, a novel denial of service attack affecting MQTT I Vaccari, M Aiello, E Cambiaso Sensors 20 (10), 2932, 2020 | 7 | 2020 |