Search Results - "Fazzion, Elverton"
-
1
The Evolution of Bashlite and Mirai IoT Botnets
Published in 2018 IEEE Symposium on Computers and Communications (ISCC) (01-06-2018)“…Vulnerable IoT devices are powerful platforms for building botnets that cause billion-dollar losses every year. In this work, we study Bashlite botnets and…”
Get full text
Conference Proceeding -
2
Identifying and Characterizing Bashlite and Mirai C&C Servers
Published in 2019 IEEE Symposium on Computers and Communications (ISCC) (01-06-2019)“…IoT devices are often a vector for assembling massive botnets, as a consequence of being broadly available, having limited security protections, and…”
Get full text
Conference Proceeding -
3
Combining Data Mining Techniques for Evolutionary Analysis of Programming Languages
Published in 2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI) (01-07-2019)“…Programming languages have been evolving gradually in response to changes in the programming industry. Many factors have been driving this evolution: for…”
Get full text
Conference Proceeding -
4
Identifying Networks Vulnerable to IP Spoofing
Published in IEEE eTransactions on network and service management (01-09-2021)“…The lack of authentication in the Internet's data plane allows hosts to falsify ( spoof ) the source IP address in packet headers. IP source spoofing is the…”
Get full text
Journal Article -
5
Measuring, Characterizing, and Avoiding Spam Traffic Costs
Published in IEEE internet computing (01-07-2016)“…Spam messages propagate malware, disseminate phishing exploits, and advertise illegal products. Those messages generate costs for users and network operators,…”
Get full text
Journal Article -
6
Neighborhoods and bands: an analysis of the origins of spam
Published in Journal of internet services and applications (11-05-2015)“…Despite the continuous efforts to mitigate spam, the volume of such messages continues to grow and identifying spammers is still a challenge. Spam traffic…”
Get full text
Journal Article -
7
SpamBands: a Methodology to Identify Sources of Spam Acting in Concert
Published in Revista IEEE América Latina (01-06-2016)“…In 2012, estimates indicated that 68.8% of all e-mail traffic was spam, what suggests this is still a relevant problem. Recently, some works have focused on…”
Get full text
Journal Article -
8
Tracking Down Sources of Spoofed IP Packets
Published in 2020 IFIP Networking Conference (Networking) (01-06-2020)“…The lack of authentication in the Internet's data plane allows hosts to falsify (spoof) the source IP address in packet headers, which forms the basis for…”
Get full text
Conference Proceeding -
9
A quantum-dot cellular automata processor design
Published in 2014 27th Symposium on Integrated Circuits and Systems Design (SBCCI) (01-09-2014)“…This paper describes the complete implementation of a robust SUBNEG (subtract and branch if negative) processor using quantum-dot cellular automata (QCA)…”
Get full text
Conference Proceeding -
10
A Spam Traffic Cost Analysis for Network Operators
Published in 2015 XXXIII Brazilian Symposium on Computer Networks and Distributed Systems (01-05-2015)“…Spam messages are used to disseminate malware, make phishing attacks, and advertise illegal products. Spam generates costs to users, e.g., victims of phishing,…”
Get full text
Conference Proceeding -
11
Neighborhoods or Condominiums: An Analysis of the Origin of Spam Based on the Organization of Autonomous Systems
Published in 2014 Brazilian Symposium on Computer Networks and Distributed Systems (01-05-2014)“…Despite the continuous efforts to mitigate spam, the volume of messages is huge and identifying spammers is still a challenge. Spam traffic analysis has been…”
Get full text
Conference Proceeding