Skip to content
Publication type:
Conferences & Workshops
Localhost Detour from Public to Private<br>Networks
Preventing the Flood: Incentive-Based Collaborative Mitigation for DRDoS Attacks
Dynamic-Deep: Tune ECG Task Performance and Optimize Compression in IoT Architectures
One MUD to Rule Them All: IoT Location Impact (short paper)
Kubernetes Autoscaling: YoYo Attack Vulnerability and Mitigation
MUDirect: Protecting P2P IoT Devices with MUD
NFV-based IoT Security for Home Networks using MUD
IoT or NoT: Identifying IoT Devices in a ShortTime Scale
Cross-Site Search Attacks: Unauthorized Queries over Private Data
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities
←
older