Exploiting Internet of Things Protocols for Malicious Data Exfiltration Activities.
Ivan VaccariSara NarteniMaurizio AielloMaurizio MongelliEnrico CambiasoPublished in: IEEE Access (2021)
Keyphrases
- data sets
- big data
- data analysis
- database
- original data
- synthetic data
- data structure
- xml documents
- probability distribution
- human activities
- small number
- complex data
- missing data
- high dimensional data
- input data
- data points
- databases
- statistical analysis
- computer systems
- image data
- network structure
- raw data
- end users
- data quality
- training data