Articles with "attacks based" as a keyword



Photo by cokdewisnu from unsplash

Machine Learning for PIN Side-Channel Attacks Based on Smartphone Motion Sensors

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3253288

Abstract: Motion sensors are integrated into all mobile devices, providing useful information for a variety of purposes. However, these sensor data can be read by any application and website accessed through a browser, without requiring security… read more here.

Keywords: attacks based; machine learning; motion; smartphone ... See more keywords
Photo from wikipedia

Internet of connected vehicles against cyber-attacks based on resilient adaptive event trigger mechanism control

Sign Up to like & get
recommendations!
Published in 2023 at "Transactions of the Institute of Measurement and Control"

DOI: 10.1177/01423312231169560

Abstract: In this paper, the challenges associated with controlling the Internet of connected vehicle (IOCV) system and mitigating the limited network communication bandwidth under the threat of denial-of-service (DoS) and deception attacks are addressed. To tackle… read more here.

Keywords: internet connected; attacks based; resilient adaptive; adaptive event ... See more keywords
Photo by ldxcreative from unsplash

Detecting Maritime GPS Spoofing Attacks Based on NMEA Sentence Integrity Monitoring

Sign Up to like & get
recommendations!
Published in 2023 at "Journal of Marine Science and Engineering"

DOI: 10.3390/jmse11050928

Abstract: Today’s maritime transportation relies on global navigation satellite systems (GNSSs) for accurate navigation. The high-precision GNSS receivers on board modern vessels are often considered trustworthy. However, due to technological advances and malicious activities, this assumption… read more here.

Keywords: gps spoofing; detecting maritime; spoofing attacks; attacks based ... See more keywords