1,881 Hits in 4.8 sec

A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities [article]

Amara Dinesh Kumar, Koti Naga Renu Chebrolu, Vinayakumar R, Soman KP
2018 arXiv   pre-print
Advanced driver assistance systems are advancing at a rapid pace and all major companies started investing in developing the autonomous vehicles.  ...  An attacker can control brake, accelerate and even steering which can lead to catastrophic consequences.  ...  point for the attackers to exploit [7] .  ... 
arXiv:1810.04144v1 fatcat:ccdkej7qdfcvhb2pypfr6vqo24

Accurate rogue access point localization leveraging fine-grained channel information

Xiuyuan Zheng, Chen Wang, Yingying Chen, Jie Yang
2014 2014 IEEE Conference on Communications and Network Security  
Rogue access point (AP) has emerged as an important security problem in WLANs. However, it is a challenge task to localize the rogue AP with both high accuracy and minimal infrastructure cost.  ...  ., directional antenna) need to be pre-deployed for rogue AP localization with high cost.  ...  A rogue AP is an unauthorized access point not deployed by the WLAN administrator but created by an adversary to conduct a man-in-the-middle attack [3] .  ... 
doi:10.1109/cns.2014.6997488 dblp:conf/cns/ZhengWC014 fatcat:mb5gamdlnbauhpmt3yjknrhx2u

Safeguarding unmanned aerial systems: an approach for identifying malicious aerial nodes

Mohd Abuzar Sayeed, Rajesh Kumar, Vishal Sharma
2020 IET Communications  
, and better detection rate.  ...  A framework for safeguarding UAS against malicious attackers and recovering the rogue UAVs is proposed in the study.  ...  DSRC, WAVE, VANET signed PDU (hash function), certificate authority, symmetric key encryption misconfigure attacks, man in the middle, unauthorised access, rogue access point, DoD, DDoS, replay  ... 
doi:10.1049/iet-com.2020.0073 fatcat:guulooew3baf7ptqv6xwimd7ta

Production of the Extended Scattered Disk by Rogue Planets

Brett Gladman, Collin Chan
2006 Astrophysical Journal  
After the rogue is removed from the system (on a characteristic timescale of 200 Myr), most extended scattered disk orbits are not appreciably modified over the age of the solar system.  ...  We show that if the early outer solar system contained one or more additional planets of an Earth mass or larger, these planets are likely to be temporarily emplaced in the Kuiper Belt's "scattered disk  ...  A Neptune that migrated later would then never have had gravitational access to the q 1 40 AU ESDOs emplaced in an earlier phase.  ... 
doi:10.1086/505214 fatcat:xmr6tuq3xvghbg73b6zxhxyzfm

Survey on Security Challenges for Swarm Robotics

Fiona Higgins, Allan Tomlinson, Keith M. Martin
2009 2009 Fifth International Conference on Autonomic and Autonomous Systems  
In particular, swarms of robots potentially employ different types of communication channels; have special concepts of identity; and exhibit adaptive emergent behaviour which could be modified by an intruder  ...  Once an intruder is detected, an appropriate response will need to be formulated according to an Intrusion Protection System.  ...  Control: Systems employing swarm intelligence do not have a hierarchical structure with points of control.  ... 
doi:10.1109/icas.2009.62 dblp:conf/icas/HigginsTM09 fatcat:hwrd2oem6jgczk6v3xqxrrp5fe

Analysis of Cyberattack Patterns by User Behavior Analytics

Csaba Krasznay, Balázs Péter Hámornik
2018 Academic and Applied Research in Military and Public  
Meanwhile, it is very difficult to detect such attacks in time, due to the strategy, tactics and chosen tools behind them.  ...  We also emphasize through a case study, how devastating a cyberattack can be for a company and why UBA would be a good candidate in a modern cyber defense system.  ...  The Hungarian public administration lacks funding and cybersecurity is not the major pain point for them, therefore we cannot expect a rapid change in APT detection.  ... 
doi:10.32565/aarms.2018.3.7 fatcat:uy3gy75nirf5djml77ag4e3sqa

Rogue seasonality detection in supply chains

Vinaya Shukla, Mohamed M. Naim, Nina F. Thornhill
2012 International Journal of Production Economics  
"A lgorithm s for rapid o u tb reak detection: A research synthesis." Journal o f Biomedical Informatics, 38(2), pp. 99-113. B uckley, S., Ettl, M ., Lin, G ., and W an g , K .-Y . (2005).  ...  Modeling an MTO system in the way suggested by Naim et al. (2007) ensures no rogue seasonality generation, which meant that it could be an effective baseline for devising rogue seasonality detection and  ...  H ausm an, W . H. (2003) . Lu, J. C., H uo, X ., V idakovic, B., and C hen, D. (2006) . "W avelet-based data reduction techniques for process fault detection." Technometrics, 48 (1), pp. 26-40.  ... 
doi:10.1016/j.ijpe.2012.03.026 fatcat:rtvbshcmizcv7mvkipk3uqoqei

A new secure authentication based distance bounding protocol

Ahmed Raheeq Sultan, Imran Rashid, Fawad Khan, Shahzaib Tahir, Maruf Pasha, Aiman Sultan
2021 PeerJ Computer Science  
Numerous systems are being employed in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented.  ...  In Mafia Fraud, an attempts are made to get accepted as the prover either by replaying of messages or by the help a malicious key.  ...  This becomes an indirect form of authentication and also caters for Relay and Replay attacks on its own.  ... 
doi:10.7717/peerj-cs.517 pmid:34013037 pmcid:PMC8114813 fatcat:h4hwkjk7brcjhmnahenqie5yjq

Wireless LAN Security Threats & Vulnerabilities

Md. Waliullah, Diane Gan
2014 International Journal of Advanced Computer Science and Applications  
However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organization, IT staff and IT security professionals.  ...  paper discusses the various security issues and vulnerabilities related to the IEEE 802.11 Wireless LAN encryption standard and common threats/attacks pertaining to the home and enterprise Wireless LAN system  ...  This attack provides the launch point for further attacks [19] . 2) Rogue Access Point: In this type of attack, an intruder installs an unsecured AP usually in public areas like airports, shared office  ... 
doi:10.14569/ijacsa.2014.050125 fatcat:x7jj7stoqng67lkk5jksoesxqe

A taxonomy of cyber-physical threats and impact in the smart home

Ryan Heartfield, George Loukas, Sanja Budimir, Anatolij Bezemskij, Johnny R.J. Fontaine, Avgoustinos Filippoupolitis, Etienne Roesch
2018 Computers & security  
/netw. accessibility Gateway architecture  ...  The adoption of Internet of Things technologies, cloud computing, artificial intelligence and an increasingly wide range of sensing and actuation capabilities has led to smart homes that are more practical  ...  On selecting a target WiFi access point, (2) the attacker identifies connected WiFi nodes and targets specific MAC address to de-authenticate from the WiFi access point.  ... 
doi:10.1016/j.cose.2018.07.011 fatcat:cq6g7sb5uvaavoth4myqadhmau

Machine Learning for the Detection and Identification of Internet of Things (IoT) Devices: A Survey [article]

Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song
2021 arXiv   pre-print
Therefore, non-cryptographic IoT device identification and rogue device detection become efficient solutions to secure existing systems and will provide additional protection to systems with cryptographic  ...  The first step in securing the IoT is detecting rogue IoT devices and identifying legitimate ones.  ...  Signal propagation pattern modeling only provides an indirect evaluation on whether specific signals come from devices in close locations or with similar propagation paths.  ... 
arXiv:2101.10181v1 fatcat:in5x7tp5fbdernmlzyvv52muke

Securing Edge Networks with Securebox [article]

Ibbad Hafeez, Aaron Yi Ding, Sasu Tarkoma
2017 arXiv   pre-print
policy dissemination across all connected networks in mitigating new threats or attacks detected by the system.  ...  Our proposal differs from the existing solutions by integrating the SDN and cloud into a unified edge security solution, and by offering a collaborative protection mechanism that enables rapid security  ...  Some IoT devices are connected to an IoT hub or user's smart phone which is further connected to the Internet, therefore, providing an indirect way to access these devices.  ... 
arXiv:1712.07740v1 fatcat:trn6tkhajnhshd6jliqjus7oym

A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing

Belal Ali, Simsam Hijjawi, Leith H. Campbell, Mark A. Gregory, Shuo Li
2022 Security and Communication Networks  
The MEC system entities cannot be permanently trusted due to the dynamic and shareable nature of MEC deployments.  ...  The open architecture of cloud computing and network access at the edge provides malicious actors with many attack vectors.  ...  An asset management system requires a policy document, defined procedures, and a tool to enforce an asset register.  ... 
doi:10.1155/2022/3178760 doaj:8e6954631e4e4624b362a282a83209f6 fatcat:qanzit2m35en5mrmfljkyr25ju

Plant Virus Epidemiology: Applications and Prospects for Mathematical Modeling and Analysis to Improve Understanding and Disease Control

M. J. Jeger, L. V. Madden, F. van den Bosch
2018 Plant Disease  
The publisher's version can be accessed at: • https://dx.  ...  In some circumstances, after an initial delay, there can be more rapid increase within barriers once the vector population is established.  ...  This applies to the estimates used for continuous roguing in Jeger et al. (2004) which, as pointed out by Cunniffe et al. (2014) , were overestimated.  ... 
doi:10.1094/pdis-04-17-0612-fe fatcat:b6bxmfyvobdi3dob56diuvp6ii

The Wolf of Name Street

Thomas Vissers, Timothy Barron, Tom Van Goethem, Wouter Joosen, Nick Nikiforakis
2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17  
Additionally, we determine that 1.28M domains are at risk of a denial-of-service attack by relying on an outdated nameserver.  ...  Overall, we nd that over 12,000 domains are susceptible to near-immediate compromise, while 52.8M domains are being targeted by nameserver bitsquatters that respond with rogue IP addresses.  ...  Websites will send reset-password links to the mail servers listed in a domain's MX records and intrusion detection systems will treat links as less likely to be malicious if they point to long-existing  ... 
doi:10.1145/3133956.3133988 dblp:conf/ccs/VissersBGJN17 fatcat:igorwwq4srdf3k6lkuluq72cdq
« Previous Showing results 1 — 15 out of 1,881 results