A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities
[article]
2018
arXiv
pre-print
Advanced driver assistance systems are advancing at a rapid pace and all major companies started investing in developing the autonomous vehicles. ...
An attacker can control brake, accelerate and even steering which can lead to catastrophic consequences. ...
point for the attackers to exploit [7] . ...
arXiv:1810.04144v1
fatcat:ccdkej7qdfcvhb2pypfr6vqo24
Accurate rogue access point localization leveraging fine-grained channel information
2014
2014 IEEE Conference on Communications and Network Security
Rogue access point (AP) has emerged as an important security problem in WLANs. However, it is a challenge task to localize the rogue AP with both high accuracy and minimal infrastructure cost. ...
., directional antenna) need to be pre-deployed for rogue AP localization with high cost. ...
A rogue AP is an unauthorized access point not deployed by the WLAN administrator but created by an adversary to conduct a man-in-the-middle attack [3] . ...
doi:10.1109/cns.2014.6997488
dblp:conf/cns/ZhengWC014
fatcat:mb5gamdlnbauhpmt3yjknrhx2u
Safeguarding unmanned aerial systems: an approach for identifying malicious aerial nodes
2020
IET Communications
, and better detection rate. ...
A framework for safeguarding UAS against malicious attackers and recovering the rogue UAVs is proposed in the study. ...
DSRC, WAVE, VANET
signed PDU (hash
function), certificate
authority, symmetric key
encryption
misconfigure attacks, man in the
middle, unauthorised access, rogue
access point, DoD, DDoS, replay ...
doi:10.1049/iet-com.2020.0073
fatcat:guulooew3baf7ptqv6xwimd7ta
Production of the Extended Scattered Disk by Rogue Planets
2006
Astrophysical Journal
After the rogue is removed from the system (on a characteristic timescale of 200 Myr), most extended scattered disk orbits are not appreciably modified over the age of the solar system. ...
We show that if the early outer solar system contained one or more additional planets of an Earth mass or larger, these planets are likely to be temporarily emplaced in the Kuiper Belt's "scattered disk ...
A Neptune that migrated later would then never have had gravitational access to the q 1 40 AU ESDOs emplaced in an earlier phase. ...
doi:10.1086/505214
fatcat:xmr6tuq3xvghbg73b6zxhxyzfm
Survey on Security Challenges for Swarm Robotics
2009
2009 Fifth International Conference on Autonomic and Autonomous Systems
In particular, swarms of robots potentially employ different types of communication channels; have special concepts of identity; and exhibit adaptive emergent behaviour which could be modified by an intruder ...
Once an intruder is detected, an appropriate response will need to be formulated according to an Intrusion Protection System. ...
Control: Systems employing swarm intelligence do not have a hierarchical structure with points of control. ...
doi:10.1109/icas.2009.62
dblp:conf/icas/HigginsTM09
fatcat:hwrd2oem6jgczk6v3xqxrrp5fe
Analysis of Cyberattack Patterns by User Behavior Analytics
2018
Academic and Applied Research in Military and Public
Meanwhile, it is very difficult to detect such attacks in time, due to the strategy, tactics and chosen tools behind them. ...
We also emphasize through a case study, how devastating a cyberattack can be for a company and why UBA would be a good candidate in a modern cyber defense system. ...
The Hungarian public administration lacks funding and cybersecurity is not the major pain point for them, therefore we cannot expect a rapid change in APT detection. ...
doi:10.32565/aarms.2018.3.7
fatcat:uy3gy75nirf5djml77ag4e3sqa
Rogue seasonality detection in supply chains
2012
International Journal of Production Economics
"A lgorithm s for rapid o u tb reak detection: A research synthesis." Journal o f Biomedical Informatics, 38(2), pp. 99-113. B uckley, S., Ettl, M ., Lin, G ., and W an g , K .-Y . (2005). ...
Modeling an MTO system in the way suggested by Naim et al. (2007) ensures no rogue seasonality generation, which meant that it could be an effective baseline for devising rogue seasonality detection and ...
H ausm an, W . H. (2003) . Lu, J. C., H uo, X ., V idakovic, B., and C hen, D. (2006) . "W avelet-based data reduction techniques for process fault detection." Technometrics, 48 (1), pp. 26-40. ...
doi:10.1016/j.ijpe.2012.03.026
fatcat:rtvbshcmizcv7mvkipk3uqoqei
A new secure authentication based distance bounding protocol
2021
PeerJ Computer Science
Numerous systems are being employed in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented. ...
In Mafia Fraud, an attempts are made to get accepted as the prover either by replaying of messages or by the help a malicious key. ...
This becomes an indirect form of authentication and also caters for Relay and Replay attacks on its own. ...
doi:10.7717/peerj-cs.517
pmid:34013037
pmcid:PMC8114813
fatcat:h4hwkjk7brcjhmnahenqie5yjq
Wireless LAN Security Threats & Vulnerabilities
2014
International Journal of Advanced Computer Science and Applications
However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organization, IT staff and IT security professionals. ...
paper discusses the various security issues and vulnerabilities related to the IEEE 802.11 Wireless LAN encryption standard and common threats/attacks pertaining to the home and enterprise Wireless LAN system ...
This attack provides the launch point for further attacks [19] . 2) Rogue Access Point: In this type of attack, an intruder installs an unsecured AP usually in public areas like airports, shared office ...
doi:10.14569/ijacsa.2014.050125
fatcat:x7jj7stoqng67lkk5jksoesxqe
A taxonomy of cyber-physical threats and impact in the smart home
2018
Computers & security
/netw. accessibility Gateway architecture ...
The adoption of Internet of Things technologies, cloud computing, artificial intelligence and an increasingly wide range of sensing and actuation capabilities has led to smart homes that are more practical ...
On selecting a target WiFi access point, (2) the attacker identifies connected WiFi nodes and targets specific MAC address to de-authenticate from the WiFi access point. ...
doi:10.1016/j.cose.2018.07.011
fatcat:cq6g7sb5uvaavoth4myqadhmau
Machine Learning for the Detection and Identification of Internet of Things (IoT) Devices: A Survey
[article]
2021
arXiv
pre-print
Therefore, non-cryptographic IoT device identification and rogue device detection become efficient solutions to secure existing systems and will provide additional protection to systems with cryptographic ...
The first step in securing the IoT is detecting rogue IoT devices and identifying legitimate ones. ...
Signal propagation pattern modeling only provides an indirect evaluation on whether specific signals come from devices in close locations or with similar propagation paths. ...
arXiv:2101.10181v1
fatcat:in5x7tp5fbdernmlzyvv52muke
Securing Edge Networks with Securebox
[article]
2017
arXiv
pre-print
policy dissemination across all connected networks in mitigating new threats or attacks detected by the system. ...
Our proposal differs from the existing solutions by integrating the SDN and cloud into a unified edge security solution, and by offering a collaborative protection mechanism that enables rapid security ...
Some IoT devices are connected to an IoT hub or user's smart phone which is further connected to the Internet, therefore, providing an indirect way to access these devices. ...
arXiv:1712.07740v1
fatcat:trn6tkhajnhshd6jliqjus7oym
A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing
2022
Security and Communication Networks
The MEC system entities cannot be permanently trusted due to the dynamic and shareable nature of MEC deployments. ...
The open architecture of cloud computing and network access at the edge provides malicious actors with many attack vectors. ...
An asset management system requires a policy document, defined procedures, and a tool to enforce an asset register. ...
doi:10.1155/2022/3178760
doaj:8e6954631e4e4624b362a282a83209f6
fatcat:qanzit2m35en5mrmfljkyr25ju
Plant Virus Epidemiology: Applications and Prospects for Mathematical Modeling and Analysis to Improve Understanding and Disease Control
2018
Plant Disease
The publisher's version can be accessed at: • https://dx. ...
In some circumstances, after an initial delay, there can be more rapid increase within barriers once the vector population is established. ...
This applies to the estimates used for continuous roguing in Jeger et al. (2004) which, as pointed out by Cunniffe et al. (2014) , were overestimated. ...
doi:10.1094/pdis-04-17-0612-fe
fatcat:b6bxmfyvobdi3dob56diuvp6ii
The Wolf of Name Street
2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17
Additionally, we determine that 1.28M domains are at risk of a denial-of-service attack by relying on an outdated nameserver. ...
Overall, we nd that over 12,000 domains are susceptible to near-immediate compromise, while 52.8M domains are being targeted by nameserver bitsquatters that respond with rogue IP addresses. ...
Websites will send reset-password links to the mail servers listed in a domain's MX records and intrusion detection systems will treat links as less likely to be malicious if they point to long-existing ...
doi:10.1145/3133956.3133988
dblp:conf/ccs/VissersBGJN17
fatcat:igorwwq4srdf3k6lkuluq72cdq
« Previous
Showing results 1 — 15 out of 1,881 results