Results 11 to 20 of about 178,776 (288)

Face Morphing, a Modern Threat to Border Security: Recent Advances and Open Challenges

open access: yesApplied Sciences, 2021
Face morphing poses a serious threat to Automatic Border Control (ABC) and Face Recognition Systems (FRS) in general. The aim of this paper is to present a qualitative assessment of the morphing attack issue, and the challenges it entails, highlighting ...
Erion-Vasilis Pikoulis   +3 more
doaj   +1 more source

Plenoptic Face Presentation Attack Detection [PDF]

open access: yesIEEE Access, 2020
The vulnerability of current face recognition systems to presentation attacks significantly limits their application in biometrics. Herein, we present a passive presentation attack detection method based on a complete plenoptic imaging system which can derive the complete plenoptic function of light rays using a single detector.
Shuaishuai Zhu   +5 more
openaire   +3 more sources

HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm

open access: yesApplied Computing and Informatics, 2019
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack, which is one that intentionally occupies the computing resources and bandwidth in order to deny that services to potential users.
Indraneel Sreeram   +1 more
doaj   +1 more source

LDoS attack detection method based on simple statistical features

open access: yesTongxin xuebao, 2022
Traditional low-rate denial of service (LDoS) attack detection methods were complex in feature extraction, high in computational cost, single in experimental data background settings, and outdated in attack scenarios, so it was difficult to meet the ...
Xueyuan DUAN, Yu FU, Kun WANG, Bin LI
doaj   +2 more sources

HVAC system attack detection dataset

open access: yesData in Brief, 2021
The importance of the security of building management systems (BMSs) has increased given the advances in the technologies used. Since the Heating, Ventilation, and Air Conditioning (HVAC) system in buildings accounts for about 40% of the total energy consumption, threats targeting the HVAC system can be quite severe and costly. Given the limitations on
Mariam Elnour   +3 more
openaire   +3 more sources

Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack

open access: yesApplied Sciences, 2023
According to the Fire-eye’s M-Trends Annual Threat Report 2022, there are many advanced persistent threat (APT) attacks that are currently in use, and such continuous and specialized APT attacks cause serious damages attacks.
Kyungroul Lee, Jaehyuk Lee, Kangbin Yim
doaj   +1 more source

Attacks Generation by Detecting Attack Surfaces

open access: yesProcedia Computer Science, 2014
AbstractIn the development process of software and systems, one of the main challenges is to detect the existing attack surfaces and their exact related attacks. In this paper, we address the issue of generating attacks related to systems that are designed by using SysML activity diagrams.
Ouchani, Samir, Lenzini, Gabriele
openaire   +2 more sources

Hybrid CNN and RNN-based shilling attack framework in social recommender networks [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2022
INTRODUCTION: Recommender system is considered to be widely utilized in diversified domain for the purpose of effectively handling information overload.
Praveena Narayanan, Vivekanandan. K
doaj   +1 more source

DDoS Attack Detection and Attacker Identification

open access: yesInternational Journal of Computer Applications, 2012
DDoS attack is a form of DoS attack in which attacker uses authorized user IP address to attack on a particular victim. Of the two types of attack it falls in the active category. The main aim of the attacker is to jam the resources in order to deny services to the recipient. The attacker can use several strategies to achieve this goal, one of which is
S. K. Jena, Brajesh Kashyap
openaire   +1 more source

Sequential Detection of Replay Attacks

open access: yesIEEE Transactions on Automatic Control, 2023
One of the most studied forms of attacks on the cyber-physical systems is the replay attack. The statistical similarities of the replay signal and the true observations make the replay attack difficult to detect. In this paper, we have addressed the problem of replay attack detection by adding watermarking to the control inputs and then performed ...
Arunava Naha   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy