IoT devices and the exponential growth of botnet attacks sparked our curiosity about how they operate. We delved into the security of IoT devices and wondered why these devices are the preferred targets in the process of building botnets. Please consider that the article is in french and not yet translated to english. Please consider that the article is in french and not yet translated to english.
Download full PDFThis is a particular work for me as it's my most ambitious work since I study Threat analysis. The main goal is to give an answer on: How do you detect hybrid attacks and separate footprints from many APTs in the same information system? As soon as the work will be finished, I'll share it there.
This site was created with the Nicepage