Author of the publication

Real World Snapshot of Trends in IoT Device and Protocol Deployment: IEEE CNS 22 Poster.

, , and . CNS, page 1-2. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance and economies of 'bot-less' application-layer DDoS attacks., and . ICITST, page 318-323. IEEE, (2014)Web bugs in the cloud: Feasibility study of a new form of EDoS attack., and . GLOBECOM Workshops, page 64-69. IEEE, (2014)RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach., and . J. Cybersecur. Priv., 1 (3): 453-469 (August 2021)Application-layer DDoS in dynamic Web-domains: Building defenses against next-generation attack behavior., and . CNS, page 490-491. IEEE, (2014)An adaptive neural network approach to hypertext clustering., and . IJCNN, page 3722-3726. IEEE, (1999)The Role of DNS TTL Values in Potential DDoS Attacks: What Do the Major Banks Know About It?, , and . ANT/MobiWIS, volume 10 of Procedia Computer Science, page 466-473. Elsevier, (2012)PIRAT - Tool for Automated Cyber-risk Assessment of PLC Components & Systems Deploying NVD CVE & MITRE ATT&CK Databases., , and . ICCPS, page 237-238. ACM, (2023)Mozi IoT Malware and Its Botnets: From Theory To Real-World Observations., and . CSCI, page 698-703. IEEE, (2021)Dirt Jumper: A key player in today's botnet-for-DDoS market., and . WorldCIS, page 239-244. IEEE, (2012)Comprehensive Study of Node Clustering in Wireless Sensor Networks for Environment Monitoring., and . Ad Hoc Sens. Wirel. Networks, 4 (3): 199-228 (2007)