Results 91 to 100 of about 6,155,073 (227)

An Analysis of GPS Spoofing Attack and Efficient Approach to Spoofing Detection in PX4

open access: yesIEEE Access
Unmanned Aerial Vehicles (UAVs) are aerial vehicles that can go to a particular position without human control or with remote human control. It is because unmanned control mainly relies on position estimation that a lot of research has been studied on ...
Ji Hyuk Jung   +3 more
doaj   +1 more source

SybilEye: Observer-Assisted Privacy-Preserving Sybil Attack Detection on Mobile Crowdsensing

open access: yesInformation, 2020
Mobile crowdsensing is a data collection system using widespread mobile devices with various sensors. The data processor cannot manage all mobile devices participating in mobile crowdsensing.
Junhyeok Yun, Mihui Kim
doaj   +1 more source

Biometric Face Presentation Attack Detection With Multi-Channel Convolutional Neural Network [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2019
Face recognition is a mainstream biometric authentication method. However, the vulnerability to presentation attacks (a.k.a. spoofing) limits its usability in unsupervised applications.
Anjith George   +5 more
semanticscholar   +1 more source

Deep Reinforcement Learning-Based Adversarial Attack and Defense in Industrial Control Systems

open access: yesMathematics
Adversarial attacks targeting industrial control systems, such as the Maroochy wastewater system attack and the Stuxnet worm attack, have caused significant damage to related facilities.
Mun-Suk Kim
doaj   +1 more source

Behavioral Fingerprinting of IoT Devices for Forensic Identification Post-Attack

open access: yesIEEE Access
The rapid adoption of Internet of Things (IoT) devices has amplified security risks, particularly in post-incident scenarios where accurate device attribution and evidence reconstruction are required.
Laveeza Tahir   +5 more
doaj   +1 more source

Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media

open access: yes, 2017
Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks.
Becker Hila   +14 more
core   +1 more source

Face Presentation Attack Detection

open access: yes, 2023
Face recognition technology has been widely used in daily interactive applications such as checking-in and mobile payment due to its convenience and high accuracy. However, its vulnerability to presentation attacks (PAs) limits its reliable use in ultra-secure applicational scenarios.
Yu, Zitong, Zhao, Chenxu, Lei, Zhen
openaire   +2 more sources

IDAC: Federated Learning-Based Intrusion Detection Using Autonomously Extracted Anomalies in IoT

open access: yesSensors
The recent rapid growth in Internet of Things (IoT) technologies is enriching our daily lives but significant information security risks in IoT fields have become apparent.
Takahiro Ohtani   +2 more
doaj   +1 more source

Time-Based GNSS Attack Detection

open access: yesIEEE Transactions on Aerospace and Electronic Systems
To safeguard Civilian Global Navigation Satellite Systems (GNSS) external information available to the platform encompassing the GNSS receiver can be used to detect attacks. Cross-checking the GNSS-provided time against alternative multiple trusted time sources can lead to attack detection aiming at controlling the GNSS receiver time.
Marco Spanghero, Panos Papadimitratos
openaire   +3 more sources

Research on wormhole attacks in wireless mesh networks

open access: yesTongxin xuebao, 2011
In order to detect the wormhole attacks effectively in wireless mesh network,a wormhole attack model ac-cording to the MR-LQSR(multi-radio link-quality source routing) protocol proposed by Microsoft was presented.Then,the characteristics of wireless mesh
FU Ying-fang1   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy