Sign Up to like & get
recommendations!
0
Published in 2017 at "Cryptography and Communications"
DOI: 10.1007/s12095-017-0271-4
Abstract: Naïve implementation of block ciphers are subject to side-channel and fault injection attacks. To deceive side-channel attacks and to detect fault injection attacks, the designer inserts specially crafted error correcting codes in the implementation. The…
read more here.
Keywords:
side channel;
injection attacks;
fault injection;
channel fault ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "International Journal of Control"
DOI: 10.1080/00207179.2016.1207099
Abstract: ABSTRACT As more and more critical infrastructures such as transportation, power systems and water are being embedded with sensing and control and linked to the Internet, the resulting security vulnerability can be exploited to inflict…
read more here.
Keywords:
systems bounded;
injection attacks;
control systems;
stealthy output ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "International Journal of Systems Science"
DOI: 10.1080/00207721.2021.1872118
Abstract: In this paper, the secure distributed set-membership filtering problem is investigated for general nonlinear system over wireless sensor networks. For the purpose of getting close to practical wireless sensor networks, both the bias injection attacks…
read more here.
Keywords:
set membership;
membership filtering;
bias injection;
injection attacks ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2932843
Abstract: Ultrasonic sensors are used across a variety of industrial areas, as they measure distance simply via calculating the difference of time between transmission and reception of signals. However, recently, attackers have been targeting ultrasonic sensors…
read more here.
Keywords:
ultrasonic sensors;
model;
signal injection;
injection attacks ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3217212
Abstract: Fault injection attacks (FIA) are a class of active physical attacks, mostly used for malicious purposes such as extraction of cryptographic keys, privilege escalation, attacks on neural network implementations. There are many techniques that can…
read more here.
Keywords:
injection;
fault injection;
attacks really;
injection attacks ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2022.3233010
Abstract: Implantable Cardioverter Defibrillators (ICDs) are medical cyber-physical systems that monitor cardiac activity and administer therapy shocks in response to sensed irregular electrograms (EGMs) to prevent cardiac arrest. Prior work has shown that the analog sensors…
read more here.
Keywords:
injection;
signal injection;
injection attacks;
optimal signal ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3146769
Abstract: Recommender system, as a data-driven way to help customers locate products that match their interests, is increasingly critical for providing competitive customer suggestions in many web services. However, recommender systems are highly vulnerable to malicious…
read more here.
Keywords:
injection;
intention understanding;
user intention;
detection ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2022.3157595
Abstract: This article studies fully distributed data-driven problems for nonlinear discrete-time multiagent systems (MASs) with fixed and switching topologies preventing injection attacks. We first develop an enhanced compact form dynamic linearization model by applying the designed…
read more here.
Keywords:
multiagent systems;
distributed event;
bipartite consensus;
injection attacks ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Transactions on Smart Grid"
DOI: 10.1109/tsg.2017.2788040
Abstract: This paper develops a multi-level game-theoretic framework for determining a cost-effective defensive strategy for protecting power systems from false data injection attacks like load redistribution attacks. First, a multi-level optimization problem considering interactions among defenders,…
read more here.
Keywords:
defensive strategy;
data injection;
strategy;
minimax regret ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Smart Grid"
DOI: 10.1109/tsg.2022.3141803
Abstract: False data injection attacks (FDIAs) can bypass conventional bad data detection methods. Recently developed FDIA detection methods based on statistical consistency of measurement values may not work effectively when false data do not significantly deviate…
read more here.
Keywords:
false data;
injection attacks;
state estimation;
data injection ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Smart Grid"
DOI: 10.1109/tsg.2022.3164874
Abstract: Cyber, especially false data injection attacks (FDIAs), are gradually becoming a kind of severe threat to modern power grids. This paper proposes a blind FDIA approach against the state estimation of power grids based on…
read more here.
Keywords:
blind fdia;
state estimation;
injection attacks;
data injection ... See more keywords