Skip to content
Publication type:
Conferences & Workshops
NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers
Localhost Detour from Public to Private Networks
Preventing the Flood: Incentive-Based Collaborative Mitigation for DRDoS Attacks
Dynamic-Deep: Tune ECG Task Performance and Optimize Compression in IoT Architectures
One MUD to Rule Them All: IoT Location Impact (short paper)
Kubernetes Autoscaling: YoYo Attack Vulnerability and Mitigation
MUDirect: Protecting P2P IoT Devices with MUD
NFV-based IoT Security for Home Networks using MUD
IoT or NoT: Identifying IoT Devices in a ShortTime Scale
Cross-Site Search Attacks: Unauthorized Queries over Private Data
←
older
newer
→