Results 11 to 20 of about 178,776 (288)
Face Morphing, a Modern Threat to Border Security: Recent Advances and Open Challenges
Face morphing poses a serious threat to Automatic Border Control (ABC) and Face Recognition Systems (FRS) in general. The aim of this paper is to present a qualitative assessment of the morphing attack issue, and the challenges it entails, highlighting ...
Erion-Vasilis Pikoulis +3 more
doaj +1 more source
Plenoptic Face Presentation Attack Detection [PDF]
The vulnerability of current face recognition systems to presentation attacks significantly limits their application in biometrics. Herein, we present a passive presentation attack detection method based on a complete plenoptic imaging system which can derive the complete plenoptic function of light rays using a single detector.
Shuaishuai Zhu +5 more
openaire +3 more sources
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack, which is one that intentionally occupies the computing resources and bandwidth in order to deny that services to potential users.
Indraneel Sreeram +1 more
doaj +1 more source
LDoS attack detection method based on simple statistical features
Traditional low-rate denial of service (LDoS) attack detection methods were complex in feature extraction, high in computational cost, single in experimental data background settings, and outdated in attack scenarios, so it was difficult to meet the ...
Xueyuan DUAN, Yu FU, Kun WANG, Bin LI
doaj +2 more sources
HVAC system attack detection dataset
The importance of the security of building management systems (BMSs) has increased given the advances in the technologies used. Since the Heating, Ventilation, and Air Conditioning (HVAC) system in buildings accounts for about 40% of the total energy consumption, threats targeting the HVAC system can be quite severe and costly. Given the limitations on
Mariam Elnour +3 more
openaire +3 more sources
Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack
According to the Fire-eye’s M-Trends Annual Threat Report 2022, there are many advanced persistent threat (APT) attacks that are currently in use, and such continuous and specialized APT attacks cause serious damages attacks.
Kyungroul Lee, Jaehyuk Lee, Kangbin Yim
doaj +1 more source
Attacks Generation by Detecting Attack Surfaces
AbstractIn the development process of software and systems, one of the main challenges is to detect the existing attack surfaces and their exact related attacks. In this paper, we address the issue of generating attacks related to systems that are designed by using SysML activity diagrams.
Ouchani, Samir, Lenzini, Gabriele
openaire +2 more sources
Hybrid CNN and RNN-based shilling attack framework in social recommender networks [PDF]
INTRODUCTION: Recommender system is considered to be widely utilized in diversified domain for the purpose of effectively handling information overload.
Praveena Narayanan, Vivekanandan. K
doaj +1 more source
DDoS Attack Detection and Attacker Identification
DDoS attack is a form of DoS attack in which attacker uses authorized user IP address to attack on a particular victim. Of the two types of attack it falls in the active category. The main aim of the attacker is to jam the resources in order to deny services to the recipient. The attacker can use several strategies to achieve this goal, one of which is
S. K. Jena, Brajesh Kashyap
openaire +1 more source
Sequential Detection of Replay Attacks
One of the most studied forms of attacks on the cyber-physical systems is the replay attack. The statistical similarities of the replay signal and the true observations make the replay attack difficult to detect. In this paper, we have addressed the problem of replay attack detection by adding watermarking to the control inputs and then performed ...
Arunava Naha +3 more
openaire +2 more sources

