Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Optimizing the Protection of IoT Devices
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Blacklists - Why Do We Need Them?
- 3 Two types of Access. Ist Download
- 4 Two types of Access. 2nd API
- 5 Problem Blacklists Need to be Evaluated
- 6 Previous Works in Academia
- 7 Source Data of Real Attacks
- 8 AIP V1.0 Update Framework - How it generates an updates BlackLists
- 9 AIP Rating Functions
- 10 Evaluation Methodology
- 11 AIP Two Month Evaluation. Num of IPS
- 12 What We Needed To Improve
- 13 AIP V2.0 - Current Version Implemented Improvements
- 14 AIP V3.0 - Future Planned Improvements • Data analysis comparing features
- 15 Blacklists Need to be Evaluated Our Contributions A new algorithm for blacklists creation, the Attacker IP Prioritizer
- 16 Download Community Contributions