Results 11 to 20 of about 574,096 (277)

Detecting BrakTooth Attacks

open access: yesProceedings of the 20th International Conference on Security and Cryptography, 2023
More than 5.1 billion Bluetooth-enabled devices were shipped in the year 2022 and this trend is expected to exceed 7.1 billion by the year 2026. A large proportion of these devices are used in smart homes designed for older adults, to help them age in place.
Nandikotkur, Achyuth   +2 more
openaire   +1 more source

Unknown presentation attack detection against rational attackers [PDF]

open access: yesIET Biometrics, 2021
Abstract Despite the impressive progress in the field of presentation attack detection and multimedia forensics over the last decade, these systems are still vulnerable to attacks in real‐life settings. Some of the challenges for the existing solutions are the detection of unknown attacks, the ability to perform in adversarial ...
Ali Khodabakhsh 0001, Zahid Akhtar
openaire   +3 more sources

Spoofing Attack Detection by Anomaly Detection [PDF]

open access: yesICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this paper we focus on face spoofing detection. The majority of papers on spoofing attack detection formulate the problem as a two or multiclass learning task, attempting to separate normal accesses from samples of different types of spoofing attacks.
Fatemifar, Soroush   +3 more
openaire   +3 more sources

On Scalable Attack Detection in the Network [PDF]

open access: yesIEEE/ACM Transactions on Networking, 2004
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans)at network vantage points. Unfortunately, all the IDS systems we know of keep per-connection or per-flow state.
Ramana Rao Kompella   +2 more
openaire   +2 more sources

Sequential Detection of Replay Attacks

open access: yesIEEE Transactions on Automatic Control, 2023
One of the most studied forms of attacks on the cyber-physical systems is the replay attack. The statistical similarities of the replay signal and the true observations make the replay attack difficult to detect. In this paper, we have addressed the problem of replay attack detection by adding watermarking to the control inputs and then performed ...
Arunava Naha   +3 more
openaire   +2 more sources

Detection of Iterative Adversarial Attacks via Counter Attack

open access: yesJournal of Optimization Theory and Applications, 2023
AbstractDeep neural networks (DNNs) have proven to be powerful tools for processing unstructured data. However, for high-dimensional data, like images, they are inherently vulnerable to adversarial attacks. Small almost invisible perturbations added to the input can be used to fool DNNs.
Matthias Rottmann   +4 more
openaire   +4 more sources

A Survey in Presentation Attack and Presentation Attack Detection [PDF]

open access: yes2019 International Carnahan Conference on Security Technology (ICCST), 2019
Biometric-based recognition has been replacing conventional recognition methods in security systems. Modern electronic devices such as smartphones and online services have been employing biometric systems because of their security, acceptability, and usability.
Anas Husseis   +3 more
openaire   +1 more source

Attacks Generation by Detecting Attack Surfaces

open access: yesProcedia Computer Science, 2014
AbstractIn the development process of software and systems, one of the main challenges is to detect the existing attack surfaces and their exact related attacks. In this paper, we address the issue of generating attacks related to systems that are designed by using SysML activity diagrams.
Samir Ouchani, Gabriele Lenzini
openaire   +2 more sources

LDoS attack detection method based on simple statistical features

open access: yesTongxin xuebao, 2022
Traditional low-rate denial of service (LDoS) attack detection methods were complex in feature extraction, high in computational cost, single in experimental data background settings, and outdated in attack scenarios, so it was difficult to meet the ...
Xueyuan DUAN, Yu FU, Kun WANG, Bin LI
doaj   +2 more sources

Hybrid CNN and RNN-based shilling attack framework in social recommender networks [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2022
INTRODUCTION: Recommender system is considered to be widely utilized in diversified domain for the purpose of effectively handling information overload.
Praveena Narayanan, Vivekanandan. K
doaj   +1 more source

Home - About - Disclaimer - Privacy