Results 91 to 100 of about 6,155,073 (227)
An Analysis of GPS Spoofing Attack and Efficient Approach to Spoofing Detection in PX4
Unmanned Aerial Vehicles (UAVs) are aerial vehicles that can go to a particular position without human control or with remote human control. It is because unmanned control mainly relies on position estimation that a lot of research has been studied on ...
Ji Hyuk Jung +3 more
doaj +1 more source
SybilEye: Observer-Assisted Privacy-Preserving Sybil Attack Detection on Mobile Crowdsensing
Mobile crowdsensing is a data collection system using widespread mobile devices with various sensors. The data processor cannot manage all mobile devices participating in mobile crowdsensing.
Junhyeok Yun, Mihui Kim
doaj +1 more source
Biometric Face Presentation Attack Detection With Multi-Channel Convolutional Neural Network [PDF]
Face recognition is a mainstream biometric authentication method. However, the vulnerability to presentation attacks (a.k.a. spoofing) limits its usability in unsupervised applications.
Anjith George +5 more
semanticscholar +1 more source
Deep Reinforcement Learning-Based Adversarial Attack and Defense in Industrial Control Systems
Adversarial attacks targeting industrial control systems, such as the Maroochy wastewater system attack and the Stuxnet worm attack, have caused significant damage to related facilities.
Mun-Suk Kim
doaj +1 more source
Behavioral Fingerprinting of IoT Devices for Forensic Identification Post-Attack
The rapid adoption of Internet of Things (IoT) devices has amplified security risks, particularly in post-incident scenarios where accurate device attribution and evidence reconstruction are required.
Laveeza Tahir +5 more
doaj +1 more source
Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media
Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks.
Becker Hila +14 more
core +1 more source
Face Presentation Attack Detection
Face recognition technology has been widely used in daily interactive applications such as checking-in and mobile payment due to its convenience and high accuracy. However, its vulnerability to presentation attacks (PAs) limits its reliable use in ultra-secure applicational scenarios.
Yu, Zitong, Zhao, Chenxu, Lei, Zhen
openaire +2 more sources
IDAC: Federated Learning-Based Intrusion Detection Using Autonomously Extracted Anomalies in IoT
The recent rapid growth in Internet of Things (IoT) technologies is enriching our daily lives but significant information security risks in IoT fields have become apparent.
Takahiro Ohtani +2 more
doaj +1 more source
Time-Based GNSS Attack Detection
To safeguard Civilian Global Navigation Satellite Systems (GNSS) external information available to the platform encompassing the GNSS receiver can be used to detect attacks. Cross-checking the GNSS-provided time against alternative multiple trusted time sources can lead to attack detection aiming at controlling the GNSS receiver time.
Marco Spanghero, Panos Papadimitratos
openaire +3 more sources
Research on wormhole attacks in wireless mesh networks
In order to detect the wormhole attacks effectively in wireless mesh network,a wormhole attack model ac-cording to the MR-LQSR(multi-radio link-quality source routing) protocol proposed by Microsoft was presented.Then,the characteristics of wireless mesh
FU Ying-fang1 +3 more
doaj +2 more sources

