Results 51 to 60 of about 22,758 (191)
Developing a Secure Cyberphysical System for Altitude Chambers
Altitude chambers are used to train crews of the military and civil aviation by creating a high‐altitude environment in which the vital signs of the people in the chamber are monitored to assess their health and identify symptoms that indicate there may be a physical condition that needs to be managed. Human observers monitor the process and react when
Jennifer Aguirre +4 more
wiley +1 more source
Metaheuristic Optimization Algorithm for Vulnerability Detection in Web of Things Environment
The integration of the Web of Things with cloud computing platforms has significantly improved data sharing, analytics, and automation across smart environments. However, this interconnection also exposes devices and cloud infrastructures to severe security threats, including Trojans, ransomware, worms, and advanced malware.
Romil Rawat +2 more
wiley +1 more source
The first biometric framework to harness dynamic time warping (DTW) for single‐channel diaphragmatic surface electromyography authentication via post‐hoc alignment is presented. By optimally warping deep–normal–deep breath cycles, DTW achieves perfect genuine–impostor separation (equal error rates = 0%), while a parallel adaptive neuro‐fuzzy inference ...
Beyza Eraslan +2 more
wiley +1 more source
Abstract Low‐frequency oscillations (LFOs) remain a major obstacle to maintaining stable dynamic performance in power systems with high levels of renewable energy integration. In particular, inter‐area LFOs have emerged as a critical concern in large, interconnected grids.
Linglin Meng +10 more
wiley +1 more source
Backdoor Poisoning Attack Against Face Spoofing Attack Detection Methods
Face recognition systems are robust against environmental changes and noise, and thus may be vulnerable to illegal authentication attempts using user face photos, such as spoofing attacks. To prevent such spoofing attacks, it is crucial to discriminate whether the input image is a live user image or a spoofed image prior to the face recognition process.
Iwamatsu, Shota +2 more
openaire +2 more sources
ADS-B spoofing attack detection method based on LSTM [PDF]
Jing Wang, Yunkai Zou, Jianli Ding
openalex +1 more source
Secrecy Analysis and Active Pilot Spoofing Attack Detection for Multigroup Multicasting Cell-Free Massive MIMO Systems [PDF]
Xianyu Zhang +4 more
openalex +1 more source
Enhancing Trust in eAssessment - the TeSLA System Solution
Trust in eAssessment is an important factor for improving the quality of online-education. A comprehensive model for trust based authentication for eAssessment is being developed and tested within the score of the EU H2020 project TeSLA.
Bhattacharjee, Sushil +4 more
core
Voice Spoofing Countermeasure for Voice Replay Attacks using Deep Learning [PDF]
Jincheng Zhou +5 more
openalex +1 more source
MobilBye: Attacking ADAS with Camera Spoofing
Advanced driver assistance systems (ADASs) were developed to reduce the number of car accidents by issuing driver alert or controlling the vehicle. In this paper, we tested the robustness of Mobileye, a popular external ADAS. We injected spoofed traffic signs into Mobileye to assess the influence of environmental changes (e.g., changes in color, shape,
Nassi, Dudi +3 more
openaire +2 more sources

