Zobrazeno 1 - 10
of 59
pro vyhledávání: '"Roberto Perdisci"'
Publikováno v:
Proceedings of the 22nd ACM Internet Measurement Conference.
Publikováno v:
2022 IEEE Conference on Communications and Network Security (CNS).
Publikováno v:
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P).
Publikováno v:
Digital Threats: Research and Practice. 3:1-2
Autor:
Martina Lindorfer, Roberto Perdisci, Adam Doupé, Gianluca Stringhini, Andrea Lanzi, Alexandros Kapravelos
Publikováno v:
Digital Threats: Research and Practice. 1:1-3
Publikováno v:
SP Workshops
Mass robocalls affect millions of people on a daily basis. Unfortunately, most current defenses against robocalls rely on phone blocklists and are ineffective against caller ID spoofing. To enable detection and blocking of spoofed robocalls, we propo
Publikováno v:
NDSS
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783030808242
DIMVA
DIMVA
Distributed reflective denial of service (DRDoS) attacks are a popular choice among adversaries. In fact, one of the largest DDoS attacks ever recorded, reaching a peak of 1.3 Tbps against GitHub, was a memcached-based DRDoS attack. More recently, a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9769c04b84e21be3b8ee65c16867a283
https://doi.org/10.1007/978-3-030-80825-9_3
https://doi.org/10.1007/978-3-030-80825-9_3
Publikováno v:
ACSAC
Spam phone calls have been rapidly growing from nuisance to an increasingly effective scam delivery tool. To counter this increasingly successful attack vector, a number of commercial smartphone apps that promise to block spam phone calls have appear
Autor:
Wenke Lee, Roberto Perdisci, Matthew Landen, Andrew Chang, Joey Allen, Harsh Grover, Raghav Bhat, Zheng Yang, Yang Ji
Publikováno v:
CCS
Compromising a website that is routinely visited by employees of a targeted organization has become a popular technique for nation-state level adversaries to penetrate an enterprise's network. This technique, dubbed a "watering hole" attack, leverage