Sign Up to like & get
recommendations!
0
Published in 2018 at "Pattern Analysis and Applications"
DOI: 10.1007/s10044-018-0681-8
Abstract: Biometric-based verification system has emerged as a powerful authentication tool. Despite its advantages over traditional systems, it is prone to several attacks. These attacks may creep through the biometric system and may prove fatal if…
read more here.
Keywords:
attack;
replay attack;
system;
non deterministic ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Wireless Networks"
DOI: 10.1007/s11276-016-1382-0
Abstract: Social networking sites have emerged as a powerful tool for maintaining contact and sharing information between people, allowing users to quickly and easily communicate and interact over the Internet. However, such services have raised serious…
read more here.
Keywords:
replay attack;
privacy;
attack resistance;
common friends ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Transactions on Automation Science and Engineering"
DOI: 10.1109/tase.2020.3013760
Abstract: Supervisory control and data acquisition (SCADA) systems are widely used for industrial control of critical infrastructures, such as power plants and manufacturing systems. There is abundant evidence of SCADA systems being subject to cyberattacks. With…
read more here.
Keywords:
equipment;
equipment faults;
scada systems;
replay attack ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Transactions on Fuzzy Systems"
DOI: 10.1109/tfuzz.2022.3215284
Abstract: This article investigates the fault detection problem of unmanned marine vehicles (UMVs) under the influence caused by replay attacks. First, the dynamics of UMV are modeled by a Takagi--Sugeno (T--S) fuzzy system with an unknown…
read more here.
Keywords:
fault detection;
unmanned marine;
detection;
marine vehicles ... See more keywords