Sign Up to like & get
recommendations!
0
Published in 2017 at "Cryptography and Communications"
DOI: 10.1007/s12095-017-0271-4
Abstract: Naïve implementation of block ciphers are subject to side-channel and fault injection attacks. To deceive side-channel attacks and to detect fault injection attacks, the designer inserts specially crafted error correcting codes in the implementation. The…
read more here.
Keywords:
side channel;
injection attacks;
fault injection;
channel fault ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Automatika"
DOI: 10.1080/00051144.2025.2546168
Abstract: The presence of time delays prevents the controller from responding to disturbances promptly, resulting in excessive overshoot and prolonged settling times. Moreover, traditional predefined-time stability theorems are not directly applicable to systems with operational delays.…
read more here.
Keywords:
time;
control;
false data;
predefined time ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "International Journal of Control"
DOI: 10.1080/00207179.2016.1207099
Abstract: ABSTRACT As more and more critical infrastructures such as transportation, power systems and water are being embedded with sensing and control and linked to the Internet, the resulting security vulnerability can be exploited to inflict…
read more here.
Keywords:
systems bounded;
injection attacks;
control systems;
stealthy output ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "International Journal of Systems Science"
DOI: 10.1080/00207721.2021.1872118
Abstract: In this paper, the secure distributed set-membership filtering problem is investigated for general nonlinear system over wireless sensor networks. For the purpose of getting close to practical wireless sensor networks, both the bias injection attacks…
read more here.
Keywords:
set membership;
membership filtering;
bias injection;
injection attacks ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2932843
Abstract: Ultrasonic sensors are used across a variety of industrial areas, as they measure distance simply via calculating the difference of time between transmission and reception of signals. However, recently, attackers have been targeting ultrasonic sensors…
read more here.
Keywords:
ultrasonic sensors;
model;
signal injection;
injection attacks ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3217212
Abstract: Fault injection attacks (FIA) are a class of active physical attacks, mostly used for malicious purposes such as extraction of cryptographic keys, privilege escalation, attacks on neural network implementations. There are many techniques that can…
read more here.
Keywords:
injection;
fault injection;
attacks really;
injection attacks ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2022.3233010
Abstract: Implantable Cardioverter Defibrillators (ICDs) are medical cyber-physical systems that monitor cardiac activity and administer therapy shocks in response to sensed irregular electrograms (EGMs) to prevent cardiac arrest. Prior work has shown that the analog sensors…
read more here.
Keywords:
injection;
signal injection;
injection attacks;
optimal signal ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Access"
DOI: 10.1109/access.2025.3594245
Abstract: Cooperative and distributed control strategies for direct current (DC) microgrids have made significant advancements in recent years. However, integrating a cyber layer to enhance resilience, scalability, and reliability also exposes the system to potential cyberattacks.…
read more here.
Keywords:
detection;
false data;
detection mitigation;
data injection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Fuzzy Systems"
DOI: 10.1109/tfuzz.2023.3327313
Abstract: This article explores the output regulation (OR) problem for interval type-2 (IT2) switched fuzzy systems (IT2-SFSs) vulnerable to data integrity and derivative injection attacks (DIDIAs). The system under consideration allows for severe instability, where the…
read more here.
Keywords:
derivative injection;
fuzzy systems;
data integrity;
injection attacks ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3146769
Abstract: Recommender system, as a data-driven way to help customers locate products that match their interests, is increasingly critical for providing competitive customer suggestions in many web services. However, recommender systems are highly vulnerable to malicious…
read more here.
Keywords:
injection;
intention understanding;
user intention;
detection ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2022.3157595
Abstract: This article studies fully distributed data-driven problems for nonlinear discrete-time multiagent systems (MASs) with fixed and switching topologies preventing injection attacks. We first develop an enhanced compact form dynamic linearization model by applying the designed…
read more here.
Keywords:
multiagent systems;
distributed event;
bipartite consensus;
injection attacks ... See more keywords