Enrico Cambiaso

Orcid: 0000-0002-6932-1975

According to our database1, Enrico Cambiaso authored at least 49 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
DockerChannel: A framework for evaluating information leakages of Docker containers.
SoftwareX, December, 2023

Rule-based Out-Of-Distribution Detection.
CoRR, 2023

Weighted Mutual Information for Out-Of-Distribution Detection.
Proceedings of the Explainable Artificial Intelligence, 2023

Information Leakages of Docker Containers: Characterization and Mitigation Strategies.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

Scamming the Scammers: Using ChatGPT to Reply Mails for Wasting Time and Resources.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

Using AI to face covert attacks in IoT and softwarized scenarios: challenges and opportunities.
Proceedings of the Italia Intelligenza Artificiale, 2023

2022
Web security and data dumping: The Cookidump case.
Softw. Impacts, December, 2022

Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System.
Sensors, 2022

Sensitivity of Logic Learning Machine for Reliability in Safety-Critical Systems.
IEEE Intell. Syst., 2022

eXplainable and Reliable Against Adversarial Machine Learning in Data Analytics.
IEEE Access, 2022

On the Intersection of Explainable and Reliable AI for Physical Fatigue Prediction.
IEEE Access, 2022

On The Detection Of Adversarial Attacks Through Reliable AI.
Proceedings of the IEEE INFOCOM 2022, 2022

A New XAI-based Evaluation of Generative Adversarial Networks for IMU Data Augmentation.
Proceedings of the IEEE International Conference on E-health Networking, 2022

2021
A Generative Adversarial Network (GAN) Technique for Internet of Medical Things Data.
Sensors, 2021

Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.
Sensors, 2021

Evaluating the Possibility to Perpetrate Tunneling Attacks Exploiting Short-Message-Service.
J. Internet Serv. Inf. Secur., 2021

Exploiting Internet of Things Protocols for Malicious Data Exfiltration Activities.
IEEE Access, 2021

Perpetrate Cyber-threats using IoT Devices as Attack Vector: The ESP8266 Use Case.
Proceedings of the Italian Conference on Cybersecurity, 2021

On the Feasibility of Covert Channels through Short-Message-Service.
Proceedings of the Italian Conference on Cybersecurity, 2021

From Explainable to Reliable Artificial Intelligence.
Proceedings of the Machine Learning and Knowledge Extraction, 2021

DoS Attacks in Available MQTT Implementations: Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
MQTTset, a New Dataset for Machine Learning Techniques on MQTT.
Sensors, 2020

SlowITe, a Novel Denial of Service Attack Affecting MQTT.
Sensors, 2020

SlowTT: A Slow Denial of Service against IoT Networks.
Inf., 2020

IPPO: A Privacy-Aware Architecture for Decentralized Data-sharing.
CoRR, 2020

Challenges and Opportunities of IoT and AI in Pneumology.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020

FINSTIX: A Cyber-Physical Data Model for Financial Critical Infrastructures.
Proceedings of the Cyber-Physical Security for Critical Infrastructures Protection, 2020

Protecting the ESP8266 Module from Replay Attacks.
Proceedings of the International Conference on Communications, 2020

Detection and classification of slow DoS attacks targeting network servers.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Introducing the SlowDrop Attack.
Comput. Networks, 2019

Darknet Security: A Categorization of Attacks to the Tor Network.
Proceedings of the Third Italian Conference on Cyber Security, 2019

2017
Remotely Exploiting AT Command Attacks on ZigBee Networks.
Secur. Commun. Networks, 2017

Slowcomm: Design, development and performance evaluation of a new slow DoS attack.
J. Inf. Secur. Appl., 2017

Measuring the Energy Consumption of Cyber Security.
IEEE Commun. Mag., 2017

2016
Mobile executions of Slow DoS Attacks.
Log. J. IGPL, 2016

Profiling DNS tunneling attacks with PCA and mutual information.
Log. J. IGPL, 2016

Are mobile botnets a possible threat? The case of SlowBot Net.
Comput. Secur., 2016

Feature transformation and Mutual Information for DNS tunneling analysis.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

Malware Development on Mobile Environments.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

2015
Perpetrate network attacks from mobile devices.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

Detection of DoS attacks through Fourier transform and mutual information.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Understanding DDoS Attacks from Mobile Devices.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Designing and Modeling the Slow Next DoS Attack.
Proceedings of the International Joint Conference, 2015

2014
An on-line intrusion detection approach to identify low-rate DoS attacks.
Proceedings of the International Carnahan Conference on Security Technology, 2014

SlowDroid: Turning a Smartphone into a Mobile Attack Vector.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

2013
Slow DoS attacks: definition and categorisation.
Int. J. Trust. Manag. Comput. Commun., 2013

SlowReq: A Weapon for Cyberwarfare Operations. Characteristics, Limits, Performance, Remediations.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

A similarity based approach for application DoS attacks detection.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

2012
Taxonomy of Slow DoS Attacks to Web Applications.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012


  Loading...