Articles with "attacks defenses" as a keyword



Photo from wikipedia

On Modeling Link Flooding Attacks and Defenses

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3131503

Abstract: The emerging link flooding attacks (LFAs) are one type of attacks that attract significant attention in both academia and industry against the routing infrastructure. The attack traffic flows originating from bots (e.g., compromised IoT devices)… read more here.

Keywords: attack interference; flooding attacks; modeling link; attacks defenses ... See more keywords
Photo by benkolde from unsplash

A Survey on Deep Learning for Website Fingerprinting Attacks and Defenses

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3253559

Abstract: The attacks and defenses on the information of which website pages are visited by users are important research subjects in the field of privacy enhancing technologies, they are termed as website fingerprinting (WF) attacks and… read more here.

Keywords: survey deep; website fingerprinting; learning; deep learning ... See more keywords
Photo by rhondak from unsplash

Data Poisoning Attacks in Internet-of-Vehicle Networks: Taxonomy, State-of-The-Art, and Future Directions

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3198481

Abstract: With the unprecedented development of deep learning, autonomous vehicles (AVs) have achieved tremendous progress nowadays. However, AV supported by DNN models is vulnerable to data poisoning attacks, hindering the large-scale application of autonomous driving. For… read more here.

Keywords: attacks defenses; data poisoning; state art; poisoning attacks ... See more keywords