Sign Up to like & get
recommendations!
0
Published in 2018 at "Pattern Analysis and Applications"
DOI: 10.1007/s10044-018-0681-8
Abstract: Biometric-based verification system has emerged as a powerful authentication tool. Despite its advantages over traditional systems, it is prone to several attacks. These attacks may creep through the biometric system and may prove fatal if…
read more here.
Keywords:
attack;
replay attack;
system;
non deterministic ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Wireless Networks"
DOI: 10.1007/s11276-016-1382-0
Abstract: Social networking sites have emerged as a powerful tool for maintaining contact and sharing information between people, allowing users to quickly and easily communicate and interact over the Internet. However, such services have raised serious…
read more here.
Keywords:
replay attack;
privacy;
attack resistance;
common friends ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "Scientific Reports"
DOI: 10.1038/s41598-024-52954-z
Abstract: Replay attack and false data injection attack (FDIA) are two common types of cyber-attacks against supervisory control and data acquisition systems, aiming to disrupt the normal operation of the power system by falsifying meter measurements.…
read more here.
Keywords:
detection;
replay attack;
attack;
random matrix ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Sensors Journal"
DOI: 10.1109/jsen.2024.3417511
Abstract: This article focuses on the security issue of consensus-based distributed filtering under replay attacks over wireless sensor networks. The local information from each sensor, which could be subject to replay attacks, is sent to its…
read more here.
Keywords:
consensus;
replay attack;
replay;
attack detection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Signal Processing Letters"
DOI: 10.1109/lsp.2024.3370490
Abstract: The role of pitch-synchronous source features in the detection of replay attacks on speaker verification systems has been explored earlier. This letter presents some advancements in the processing which enable the use of the entire…
read more here.
Keywords:
replay attack;
attack detection;
source features;
source ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Transactions on Automation Science and Engineering"
DOI: 10.1109/tase.2020.3013760
Abstract: Supervisory control and data acquisition (SCADA) systems are widely used for industrial control of critical infrastructures, such as power plants and manufacturing systems. There is abundant evidence of SCADA systems being subject to cyberattacks. With…
read more here.
Keywords:
equipment;
equipment faults;
scada systems;
replay attack ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Transactions on Fuzzy Systems"
DOI: 10.1109/tfuzz.2022.3215284
Abstract: This article investigates the fault detection problem of unmanned marine vehicles (UMVs) under the influence caused by replay attacks. First, the dynamics of UMV are modeled by a Takagi--Sugeno (T--S) fuzzy system with an unknown…
read more here.
Keywords:
fault detection;
unmanned marine;
detection;
marine vehicles ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Network Science and Engineering"
DOI: 10.1109/tnse.2023.3312545
Abstract: Smart vehicles and industrial control systems becoming increasingly complex. They are comprised of a large number of connected intelligence sensor devices. For such systems, Controller Area Network (CAN) bus offer high-integrity serial communication capabilities. It…
read more here.
Keywords:
data traceability;
replay attack;
crypto;
encryption ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Vehicular Technology"
DOI: 10.1109/tvt.2024.3392944
Abstract: Open radio access network (ORAN)-based vehicular networks play a pivotal role in future traffic data sharing. Due to the openness of the ORAN framework, it is necessary to encrypt the sharing data to prevent unauthorized…
read more here.
Keywords:
replay attack;
control;
oran based;
vehicular networks ... See more keywords