A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
A survey on security issues in cognitive radio based cooperative sensing
2021
IET Communications
Then a categorization of the defence mechanisms for defending both the attacks has been proposed as active and passive. ...
Active mechanisms are suitable for an immediate defence in a limited time span, while passive mechanisms are suitable for flexible CSS systems that are ready to detect the attacks over a period of time ...
In [93] , a dynamic secure routing game framework to effectively combat jamming attacks in distributed cognitive radio networks has been proposed. ...
doi:10.1049/cmu2.12131
fatcat:ivw2dsepevfi5izquylly65jg4
A Survey on Recent Advanced Research of CPS Security
2021
Applied Sciences
Malicious attacks on CPSs can lead to both property damage and casualties. Therefore, it is worth surveying CPS security by reviewing and analyzing the latest high-quality related works. ...
Finally, we also perform a statistical analysis in terms of paper publication times, author institutes, countries, and sponsors to show the current worldwide CPS security research situation. ...
To defend against this kind of attack, they proposed a monitoring scheme that leverages radio frequency [10] to observe a power grid's status. ...
doi:10.3390/app11093751
fatcat:fxby2wjzpnchrfshvilxalmptm
Recent Advancements in Intrusion Detection Systems for the Internet of Things
2019
Security and Communication Networks
Thus, many IoT systems are not sufficiently protected against typical network attacks like Denial-of-Service (DoS) and routing attacks. ...
Besides looking on approaches developed particularly for IoT, we introduce also work for the three similar network types mentioned above and discuss if they are also suitable for IoT systems. ...
The goal of the game is to determine the weakest node in the network and thereafter to propose strategies to defend it against malicious attacks. ...
doi:10.1155/2019/4301409
fatcat:qupk6elzcvbkrarqf25epmjdci
Olympus: Sensor Privacy through Utility Aware Obfuscation
2019
Proceedings on Privacy Enhancing Technologies
We present Olympus, a privacy framework that limits the risk of disclosing private user information by obfuscating sensor data while minimally affecting the functionality the data are intended for. ...
Personal data garnered from various sensors are often offloaded by applications to the cloud for analytics. This leads to a potential risk of disclosing private user information. ...
Thus, the learned obfuscation defends against a specific attacker, namely the pretrained Estimator. ...
doi:10.2478/popets-2019-0002
dblp:journals/popets/RavalMP19
fatcat:xpezsfu7izbrli6evpoxyty4tm
The Confluence of Networks, Games and Learning
[article]
2021
arXiv
pre-print
This paper articulates the confluence of networks, games and learning, which establishes a theoretical underpinning for understanding multi-agent decision-making over networks. ...
We provide an selective overview of game-theoretic learning algorithms within the framework of stochastic approximation theory, and associated applications in some representative contexts of modern network ...
To address these issues, [113] provides a learning-based secure scheme, which allows the network to defend against unknown attacks with minimum level of deterioration in performance. ...
arXiv:2105.08158v1
fatcat:lgclhfg4drbpfix5qoarmnktf4
Foreword of Special Issue on "Nomadic Services and Applications"
2011
Journal of Networks
Liu, “A game theoretic
[1] C. Diot, B. N. Levine, B. lyles, H. Kassem, and D. ...
Agrawal, and S.Suri, “A game-theoretic
framework for incentives in P2P systems,” in Proc. ...
doi:10.4304/jnw.6.5.687-688
fatcat:3qws6kqycnffxnh6n6th6ioc5a
Deep Neural Mobile Networking
[article]
2020
arXiv
pre-print
This thesis attacks important problems in the mobile networking area from various perspectives by harnessing recent advances in deep neural networks. ...
This makes monitoring and managing the multitude of network elements intractable with existing tools and impractical for traditional machine learning algorithms that rely on hand-crafted feature engineering ...
Summary In this chapter, we introduced TIKI-TAKA, a framework for defending against adversarial attacks on deep learning based NIDS. ...
arXiv:2011.05267v1
fatcat:yz2zp5hplzfy7h5kptmho7mbhe
2020 Index IEEE Internet of Things Journal Vol. 7
2020
IEEE Internet of Things Journal
., Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT; JIoT July 2020 6550-6565 Jamalipour, A., see Murali, S., JIoT Jan. 2020 379-388 James, L.A., see Wanasinghe, T.R., ...
., +, JIoT July 2020 6392-6401 Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing. ...
Asheralieva, A., +, JIoT March 2020 1974-1993 Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing. ...
doi:10.1109/jiot.2020.3046055
fatcat:wpyblbhkrbcyxpnajhiz5pj74a
A Survey on DDoS Attack and Defense Strategies: From Traditional Schemes to Current Techniques
2013
Interdisciplinary Information Sciences
In this way, resources are reserved against such attack traffic to deny or degrade the services for legitimate users. ...
The attack employs client server technology and a stream of data packets is sent to the victim for exhausting its services, connections, bandwidth etc. ...
A game theoretic approach is used in [102] to offer defense against DoS/DDoS cyber attacks. The DDoS attack is modeled as a one-shot & zero-sum game with non-cooperation. ...
doi:10.4036/iis.2013.173
fatcat:pgvcutvfajejpmgatezon5ftdq
2021 Index IEEE Internet of Things Journal Vol. 8
2021
IEEE Internet of Things Journal
The Author Index contains the primary entry for each item, listed under the first author's name. ...
., +, JIoT Oct. 1, 2021 14623-14637 EyeLoc: Smartphone Vision-Enabled Plug-n-Play Indoor Localization in Large Shopping Malls. ...
., +, JIoT Aug. 15, 2021 12734-12747 EyeLoc: Smartphone Vision-Enabled Plug-n-Play Indoor Localization in Large Shopping Malls. ...
doi:10.1109/jiot.2022.3141840
fatcat:42a2qzt4jnbwxihxp6rzosha3y
Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges
[article]
2020
arXiv
pre-print
We explore the vulnerabilities of EH networks, and we provide a comprehensive overview of the scientific literature, including attack vectors, cryptography techniques, physical-layer security schemes for ...
For each of the identified macro-areas, we compare the scientific contributions across a range of shared features, indicating the pros and cons of the described techniques, the research challenges, and ...
ACKNOWLEDGEMENTS The authors would like to thank the anonymous reviewers for their comments and suggestions, that helped improving the quality of the manuscript. ...
arXiv:2004.10394v2
fatcat:o4iwqkcdvfgmtjmwmxgvrbt3je
Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network
[article]
2015
Ph.d.-serien for Det Teknisk-Naturvidenskabelige Fakultet, Aalborg Universitet
The Socio-technical theory was used as a theoretical framework for this research. ...
Theoretical Framing -The Socio-technical Theory (STS) Socio-technical theory has proven to be a useful theoretical framework in blending people with technology for addressing organizational problems; or ...
doi:10.5278/vbn.phd.engsci.00017
fatcat:dqz324xtjbgy3jjyameuc2z3ii
Cost Benefits of Using Machine Learning Features in NIDS for Cyber Security in UK Small Medium Enterprises (SME)
2021
Future Internet
in the office, in terms of their credibility in handling zero-day attacks against the costs of achieving so. ...
A cost model was used to compare the outcome of SMEs' decision making, in getting the right framework in place in securing their data. ...
Therefore, it is crucial for SMEs to also understand how Machine Learning plays an important role in the detection of zero-day attacks. However, this does come with a cost. ...
doi:10.3390/fi13080186
fatcat:jyggowbzurcdrezu5jhr3g5okm
Cyber-Physical Systems Security: Limitations, Issues and Future Trends
2020
Microprocessors and microsystems
Moreover, CPS security vulnerabilities, threats and attacks are reviewed, while the key issues and challenges are identified. ...
Their integration with IoT led to a new CPS aspect, the Internet of Cyber-Physical Things (IoCPT). ...
In fact, AI is now being consid-ered as a game-changing solution against a variety of cyberphysical attacks targeting CPS systems, devices and communication points. ...
doi:10.1016/j.micpro.2020.103201
pmid:32834204
pmcid:PMC7340599
fatcat:omeihta4vbe55cohyhbhi56mzm
AI and ML – Enablers for Beyond 5G Networks
2020
Zenodo
Reinforcement learning is concerned about how intelligent agents must take actions in order to maximize a collective reward, e.g. to improve a property of the system. ...
In network planning, attention is given to the network element placement problem and to dimensioning considerations for C-RAN clusters. ...
For this purpose, OptSFC will model the state of the network using an incomplete information Markov game, as the defender does not know directly what the attacker is doing, but can perceive it through ...
doi:10.5281/zenodo.4299895
fatcat:ngzbopfm6bb43lnrmep6nz5icm
« Previous
Showing results 1 — 15 out of 885 results