Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3163469
Abstract: Data exfiltration relies primarily on network protocols for unauthorized data transfers from information systems. In addition to well-established Internet protocols (such as DNS, ICMP, or NTP, among others), adversaries can use newer protocols such as…
read more here.
Keywords:
iot protocols;
exfiltrate data;
iot;
protocol ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Indonesian Journal of Electrical Engineering and Computer Science"
DOI: 10.11591/ijeecs.v10.i2.pp490-497
Abstract: It is crucial for public users and service providers to stay abreast of the progress and trends on data exfiltration in computer security system. In cryptosystem, it is unnoticeable for computer and mobile users to…
read more here.
Keywords:
computer security;
security;
data exfiltration;
computer ... See more keywords