Articles with "data exfiltration" as a keyword



Photo by campaign_creators from unsplash

Characterization and Evaluation of IoT Protocols for Data Exfiltration

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3163469

Abstract: Data exfiltration relies primarily on network protocols for unauthorized data transfers from information systems. In addition to well-established Internet protocols (such as DNS, ICMP, or NTP, among others), adversaries can use newer protocols such as… read more here.

Keywords: iot protocols; exfiltrate data; iot; protocol ... See more keywords
Photo from wikipedia

Data Exfiltration of Ultrasonic Signal in Computer Security System: A Review

Sign Up to like & get
recommendations!
Published in 2018 at "Indonesian Journal of Electrical Engineering and Computer Science"

DOI: 10.11591/ijeecs.v10.i2.pp490-497

Abstract: It is crucial for public users and service providers to stay abreast of the progress and trends on data exfiltration in computer security system. In cryptosystem, it is unnoticeable for computer and mobile users to… read more here.

Keywords: computer security; security; data exfiltration; computer ... See more keywords