Sign in

DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation.

Michele De DonnoNicola DragoniAlberto GiarettaAngelo Spognardi
Published in: Secur. Commun. Networks (2018)
Keyphrases
  • comparative analysis
  • management system
  • semi quantitative
  • fusion scheme
  • denial of service attacks
  • information retrieval
  • database
  • real time
  • big data
  • ddos attacks
  • malware detection
  • data processing
  • cloud computing