Filters








58 Hits in 7.2 sec

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak, Stefan Mangard
2018 IEEE Communications Surveys and Tutorials  
In this paper, we propose a new categorization system for side-channel attacks, which is necessary as side-channel attacks have evolved significantly since their scientific investigations during the smart  ...  Our proposed classification system allows to analyze side-channel attacks systematically, and facilitates the development of novel countermeasures.  ...  ), feature abuses, malware detection, and app repackaging.  ... 
doi:10.1109/comst.2017.2779824 fatcat:4r5ceyc7pbdfxdmngtdncv4n5m

2020 Index IEEE Robotics and Automation Letters Vol. 5

2020 IEEE Robotics and Automation Letters  
., +, LRA April 2020 1366-1372 A Novel Sensing Method to Detect Tissue Boundaries During Robotic Needle Insertion Based on Laser Doppler Flowmetry.  ...  ., +, LRA Oct. 2020 6694-6701 Needles A Novel Sensing Method to Detect Tissue Boundaries During Robotic Needle Insertion Based on Laser Doppler Flowmetry.  ... 
doi:10.1109/lra.2020.3032821 fatcat:qrnouccm7jb47ipq6w3erf3cja

Comprehensive Survey of Research on Emerging Communication Technologies from ICETC2020

Takuji TACHIBANA
2022 IEICE transactions on communications  
For emergency rescue evacuation support systems, [98] proposed a disaster detection method that integrates sensor information and human detection, while [99] proposed a route searching method that  ...  For video viewing users, [95] proposed a method that estimates QoE with a genetic algorithm (GA) from users' electroencephalogram (EEG) data.  ... 
doi:10.1587/transcom.2021cei0003 fatcat:rlzsk3s3abfkjc4zy6pwxyu4pm

Frontmatter [chapter]

Nilanjan Dey, Gitanjali Shinde, Parikshit Mahalle, Henning Olesen
2019 The Internet of Everything  
Often, this similar procedure works using a computer application that catches a digital picture of an individual's face via video frame and also compares it to images in a database of stored records.  ...  A central server provides a secure channel for data gathering and video forum service.  ...  Their results showed that the probability of growing PD is more if 7 Deep brain monitoring using implantable sensor and microcontroller: a review Avinash S. Devare and G.  ... 
doi:10.1515/9783110628517-fm fatcat:3npfgq3o65f5pdbphf6pi4qn3a

Neurosciences and Wireless Networks: The Potential of Brain-Type Communications and Their Applications

Renan C. Moioli, Pedro H. J. Nardelli, Michael Taynnan Barros, Walid Saad, Amin Hekmatmanesh, Pedro E. Goria Silva, Arthur S. de Sena, Merim Dzaferagic, Harun Siljak, Werner Van Leekwijck, Dick Carrillo, Steven Latre
2021 IEEE Communications Surveys and Tutorials  
In particular, this tutorial first provides a novel integrative approach that bridges the gap between these two seemingly disparate fields.  ...  In particular, we propose a novel systematization that divides the contributions into two groups, one focused on what neurosciences will offer to future wireless technologies in terms of new applications  ...  Hanna Niemelä for valuable comments and for proofreading this paper.  ... 
doi:10.1109/comst.2021.3090778 fatcat:pqvgf6h3fzc2xe27dtoddh6epu

Modelling Cyberspace to Determine Cybersecurity Training Requirements

Adrian Venables
2021 Frontiers in Education  
Cyberspace is a constantly evolving and expanding environment that is being used for an ever-increasing range of purposes.  ...  This chapter seeks to address this issue by presenting a method to model cyberspace in three dimensions with humans included as an integral part.  ...  For example, propagation by air or space can only be by radiofrequency (RF) transmission, whereas at sea, it may be via undersea cable or wirelessly between vessels or with the shore.  ... 
doi:10.3389/feduc.2021.768037 fatcat:n5fmqwo7kvg63paulefp7kzxsu

Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses [article]

Ilias Giechaskiel, Kasper Bonne Rasmussen
2019 arXiv   pre-print
By highlighting cross-influences between different types of out-of-band signal injections, this paper underscores the need for a common language irrespective of the attack method.  ...  These attacks target the conversion process from a physical quantity to an analog property---a process that fundamentally cannot be authenticated.  ...  The attack methods used are acoustic, conducted, Ǎ electromagnetic, and optical.  ... 
arXiv:1901.06935v3 fatcat:r774b46irvd6hc5dmtd42hksay

Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses

Ilias Giechaskiel, Kasper B. Rasmussen
2019 IEEE Communications Surveys and Tutorials  
By highlighting cross-influences between different types of out-of-band signal injections, this paper underscores the need for a common language irrespective of the attack method.  ...  These attacks target the conversion process from a physical quantity to an analog property-a process that fundamentally cannot be authenticated.  ...  The attack methods used are acoustic, conducted, Ǎ electromagnetic, and optical.  ... 
doi:10.1109/comst.2019.2952858 fatcat:injy5gxjuzhxzjs5mxqjkgp6zy

An Introductory Tutorial on Brain–Computer Interfaces and Their Applications

Andrea Bonci, Simone Fiori, Hiroshi Higashi, Toshihisa Tanaka, Federica Verdini
2021 Electronics  
Recent advances in biomedical engineering, computer science, and neuroscience are making brain–computer interfaces a reality, paving the way to restoring and potentially augmenting human physical and mental  ...  Applications of brain–computer interfaces are being explored in applications as diverse as security, lie detection, alertness monitoring, gaming, education, art, and human cognition augmentation.  ...  The contribution of [73] suggested a method for the extraction of discriminative features in electroencephalography evoked-potential latency.  ... 
doi:10.3390/electronics10050560 fatcat:g2d57exmcbghlkf2rekmgdjhae

Program

2021 2021 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)  
It will be suitable for measuring various biopotential signals in the future. 16:55 Investigation on Error-Tolerability Enhancement of Videos via Re-Encoding for Computer Vision: A Case Study on Object  ...  we propose a novel learnable image encryption method for privacy-preserving deep neural networks (DNNs).  ... 
doi:10.1109/icce-tw52618.2021.9602919 fatcat:aetmvxb7hfah7iuucbamos2wgu

A taxonomy of cyber-physical threats and impact in the smart home

Ryan Heartfield, George Loukas, Sanja Budimir, Anatolij Bezemskij, Johnny R.J. Fontaine, Avgoustinos Filippoupolitis, Etienne Roesch
2018 Computers & security  
In the past, home automation was a small market for technology enthusiasts.  ...  Here, we classify applicable cyber threats according to a novel taxonomy, focusing not only on the attack vectors that can be used, but also the potential impact on the systems and ultimately on the occupants  ...  The infection would occur when some of these devices were connected to a computer via USB to load new photos.  ... 
doi:10.1016/j.cose.2018.07.011 fatcat:cq6g7sb5uvaavoth4myqadhmau

Grokya: a Privacy-Friendly Framework for Ubiquitous Computing [article]

Daniel Filipe G. Farinha
2016 arXiv   pre-print
In a world where for-profit enterprises are increasingly looking to maximize profits by engaging in privacy invading consumer-profiling techniques, the rise of ubiquitous computing and the Internet of  ...  The proposed project aims to fill a gap that no other solution is addressing, which is to reach a win-win scenario that works for both the enterprises and the consumers.  ...  IMPLANTABLE AND INGESTIBLE COMPUTING 2.2.2.3.  ... 
arXiv:1602.03956v1 fatcat:ykdx2jeklrclrprq52dyfitkjy

6G Internet of Things: A Comprehensive Survey

Dinh C. Nguyen, Ming Ding, Pubudu N. Pathirana, Aruna Seneviratne, Jun Li, Dusit Niyato, Octavia Dobre, H. Vincent Poor
2021 IEEE Internet of Things Journal  
The sixth generation (6G) wireless communication networks are envisioned to revolutionize customer services and applications via the Internet of Things (IoT) towards a future of fully intelligent and autonomous  ...  Particularly, compared to the other related survey papers, we provide an in-depth discussion of the roles of 6G in a wide range of prospective IoT applications via five key domains, namely Healthcare Internet  ...  In the near future, the security for local gradient computation at UAVs should be taken into account in federated training, by integrating attack detection methods such as access control and data authentication  ... 
doi:10.1109/jiot.2021.3103320 fatcat:fgm4ndqp6napjlt3z4ikthdsfy

Addressing Security and Privacy Challenges in Internet of Things [article]

Arsalan Mosenia
2018 arXiv   pre-print
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a holistic and transformative approach for providing numerous services.  ...  via OpSecure.  ...  Next, we consider ECG sensors, and assume that the signal processing method is the traditional computation method for arrhythmia detection, as discussed in [322] .  ... 
arXiv:1807.06724v1 fatcat:f45cytbjkjgyjiytvr2ygdcsze

Deep learning-based ambient assisted living for self-management of cardiovascular conditions

Maria Ahmed Qureshi, Kashif Naseer Qureshi, Gwanggil Jeon, Francesco Piccialli
2021 Neural computing & applications (Print)  
This study helps to identify the strengths and weaknesses of novel ambient assisted living environments for medical applications.  ...  For each theme, a detailed investigation shows (1) how these new technologies are nowadays integrated into diagnostic systems and (2) how new technologies like IoT sensors, cloud models, machine and deep  ...  stranger or a person with malicious intent [61] .  ... 
doi:10.1007/s00521-020-05678-w fatcat:fkabjm33xza2ncgq6ecu2qifaq
« Previous Showing results 1 — 15 out of 58 results