| Virual Oral Presentation Slide by Slide |
IEEE/ICACT20220314 Slide.17
[Big Slide]
[YouTube] |
Oral Presentation |
|
|
As for the attack strategy we simulated all of the 17 attack types for one-minute par packet capture each, using the attacking tools and techniques we have listed here. In order to have a realistic target, we have used the IoT devices and the deliberately vulnerable machines, and MQTT brokers as a victim machines. | |
| [Go to Next Slide] |