Maurizio Aiello

Orcid: 0000-0001-5008-225X

According to our database1, Maurizio Aiello authored at least 40 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Web security and data dumping: The Cookidump case.
Softw. Impacts, December, 2022

2021
Evaluating the Possibility to Perpetrate Tunneling Attacks Exploiting Short-Message-Service.
J. Internet Serv. Inf. Secur., 2021

Exploiting Internet of Things Protocols for Malicious Data Exfiltration Activities.
IEEE Access, 2021

Perpetrate Cyber-threats using IoT Devices as Attack Vector: The ESP8266 Use Case.
Proceedings of the Italian Conference on Cybersecurity, 2021

On the Feasibility of Covert Channels through Short-Message-Service.
Proceedings of the Italian Conference on Cybersecurity, 2021

2020
MQTTset, a New Dataset for Machine Learning Techniques on MQTT.
Sensors, 2020

SlowITe, a Novel Denial of Service Attack Affecting MQTT.
Sensors, 2020

SlowTT: A Slow Denial of Service against IoT Networks.
Inf., 2020

IPPO: A Privacy-Aware Architecture for Decentralized Data-sharing.
CoRR, 2020

FINSTIX: A Cyber-Physical Data Model for Financial Critical Infrastructures.
Proceedings of the Cyber-Physical Security for Critical Infrastructures Protection, 2020

Protecting the ESP8266 Module from Replay Attacks.
Proceedings of the International Conference on Communications, 2020

Detection and classification of slow DoS attacks targeting network servers.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Unsupervised learning and rule extraction for Domain Name Server tunneling detection.
Internet Technol. Lett., 2019

Introducing the SlowDrop Attack.
Comput. Networks, 2019

Darknet Security: A Categorization of Attacks to the Tor Network.
Proceedings of the Third Italian Conference on Cyber Security, 2019

2017
Remotely Exploiting AT Command Attacks on ZigBee Networks.
Secur. Commun. Networks, 2017

Slowcomm: Design, development and performance evaluation of a new slow DoS attack.
J. Inf. Secur. Appl., 2017

Measuring the Energy Consumption of Cyber Security.
IEEE Commun. Mag., 2017

2016
Mobile executions of Slow DoS Attacks.
Log. J. IGPL, 2016

Profiling DNS tunneling attacks with PCA and mutual information.
Log. J. IGPL, 2016

Are mobile botnets a possible threat? The case of SlowBot Net.
Comput. Secur., 2016

Feature transformation and Mutual Information for DNS tunneling analysis.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

Malware Development on Mobile Environments.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

2015
DNS tunneling detection through statistical fingerprints of protocol messages and machine learning.
Int. J. Commun. Syst., 2015

Perpetrate network attacks from mobile devices.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

Detection of DoS attacks through Fourier transform and mutual information.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Understanding DDoS Attacks from Mobile Devices.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Designing and Modeling the Slow Next DoS Attack.
Proceedings of the International Joint Conference, 2015

2014
Supervised Learning Approaches with Majority Voting for DNS Tunneling Detection.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

An on-line intrusion detection approach to identify low-rate DoS attacks.
Proceedings of the International Carnahan Conference on Security Technology, 2014

SlowDroid: Turning a Smartphone into a Mobile Attack Vector.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

2013
Slow DoS attacks: definition and categorisation.
Int. J. Trust. Manag. Comput. Commun., 2013

Performance assessment and analysis of DNS tunneling tools.
Log. J. IGPL, 2013

SlowReq: A Weapon for Cyberwarfare Operations. Characteristics, Limits, Performance, Remediations.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Basic classifiers for DNS tunneling detection.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

A similarity based approach for application DoS attacks detection.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

2012
Taxonomy of Slow DoS Attacks to Web Applications.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

"3D Cloud" in Life Sciences: An innovative framework for remote 2D/3D visualization and collaboration.
Proceedings of CBMS 2012, 2012

2011
A Comparative Performance Evaluation of DNS Tunneling Tools.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2008
Statistical Anomaly Detection on Real e-Mail Traffic.
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008


  Loading...