標(biāo)題: Titlebook: Attacks and Defenses for the Internet-of-Things; 5th International Wo Wenjuan Li,Steven Furnell,Weizhi Meng Conference proceedings 2022 The [打印本頁(yè)] 作者: 寓言 時(shí)間: 2025-3-21 18:57
書目名稱Attacks and Defenses for the Internet-of-Things影響因子(影響力)
書目名稱Attacks and Defenses for the Internet-of-Things影響因子(影響力)學(xué)科排名
書目名稱Attacks and Defenses for the Internet-of-Things網(wǎng)絡(luò)公開(kāi)度
書目名稱Attacks and Defenses for the Internet-of-Things網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Attacks and Defenses for the Internet-of-Things被引頻次
書目名稱Attacks and Defenses for the Internet-of-Things被引頻次學(xué)科排名
書目名稱Attacks and Defenses for the Internet-of-Things年度引用
書目名稱Attacks and Defenses for the Internet-of-Things年度引用學(xué)科排名
書目名稱Attacks and Defenses for the Internet-of-Things讀者反饋
書目名稱Attacks and Defenses for the Internet-of-Things讀者反饋學(xué)科排名
作者: 溫室 時(shí)間: 2025-3-21 21:40
,Evolving a?Boolean Masked Adder Using Neuroevolution, performance, masking their implementations results in a huge penalty. Since efficient protection against side-channel attacks is a requirement in lots of use cases, we focus on optimizing the Boolean masking of the modular addition. Contrary to recent related work, we target evolving a masked full 作者: JADED 時(shí)間: 2025-3-22 04:24
Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extble performance in detecting attacks. However, the lack of transparency in their decision-making process and the scarcity of attack data for training purposes pose a major challenge for the development of ML-based IDS systems for Internet of Things (IoT). Therefore, employing anomaly detection metho作者: 孤獨(dú)無(wú)助 時(shí)間: 2025-3-22 05:13
,Constraints and?Evaluations on?Signature Transmission Interval for?Aggregate Signatures with?Interanerated invalid signatures in the case an aggregate signature is detected as invalid. In existing FT-AS schemes (whose tracing functionality requires multi-rounds), a verifier needs to send a feedback to an aggregator for efficiently tracing the invalid signer(s). However, in practice, if this feedb作者: 威脅你 時(shí)間: 2025-3-22 11:04
Post-quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unc crucial. Authenticated key exchange protocols establish shared cryptographic keys between the parties and, in addition, authenticate their identities. Usually, the identities are based on a pair of private and public keys. Physical Unclonable Functions (PUFs) are widely used recently to bind physic作者: 參考書目 時(shí)間: 2025-3-22 13:29
,Effective Segmentation of?RSSI Timeseries Produced by?Stationary IoT Nodes: Comparative Study,e profiling for the purpose of authentication, localization, and physical security perimeter monitoring. Previous research on the use of RSSI-based wireless node profiling assumes that RSSI timeseries are stationary and independent identically distributed (i.i.d.). Unfortunately, in real-world envir作者: 任意 時(shí)間: 2025-3-22 18:16
,Consumer-Friendly Methods for?Privacy Protection Against Cleaning Robots, as the “privacy paradox” phenomenon states, consumers behave differently even if many claim to be concerned about smart robot privacy issues. In this paper, we describe our attempt to discover effective measures for average consumers to guard against potential privacy intrusions by cleaning robots.作者: headway 時(shí)間: 2025-3-22 23:44
,Resource Efficient Federated Deep Learning for?IoT Security Monitoring,ge devices. A disadvantage of the FL paradigm is the requirement of many communication rounds before model convergence. As a result, there is a challenge for running on-device FL with resource-hungry algorithms such as Deep Neural Network (DNN), especially in the resource-constrained Internet of Thi作者: 身體萌芽 時(shí)間: 2025-3-23 05:18
Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy andinterface. Due to the lack of message authentication mechanisms, this leads to major security vulnerabilities for example regarding the connection with malicious devices. Therefore, we apply a modular, protocol-independent firewall approach by placing a man-in-the-middle between the third-party dong作者: 解脫 時(shí)間: 2025-3-23 05:57
Mapping the Security Events to the MITRE ATT &CK Attack Patterns to Forecast Attack Propagation (Exevent correlation techniques intended for the detection of cyber security incidents and different types of cyber attacks, as well as there are a lot of techniques for multi-step attack modeling. At the same time, most modern security event management solutions do not allow mapping the detected secur作者: 逃避系列單詞 時(shí)間: 2025-3-23 12:29
Attacks and Defenses for the Internet-of-Things978-3-031-21311-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 仔細(xì)閱讀 時(shí)間: 2025-3-23 15:18 作者: 驕傲 時(shí)間: 2025-3-23 18:55
https://doi.org/10.1007/978-3-031-21311-3malware and unwanted software; IoT security and privacy; IoT forensic techniques; usable security and p作者: 短程旅游 時(shí)間: 2025-3-24 00:32
978-3-031-21310-6The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: 使堅(jiān)硬 時(shí)間: 2025-3-24 05:54
Donovan Stanberry,Lystra Fletcher-Paultitute of Standards and Technology (NIST). We evaluate the speed and code size of various software implementations on five different platforms featuring four different architectures. Moreover, we benchmark the dynamic memory utilization of the remaining NIST LWC algorithms on one 32-bit ARM controll作者: aerial 時(shí)間: 2025-3-24 07:55
William?A. Mcintosh,Marissa Cisneros performance, masking their implementations results in a huge penalty. Since efficient protection against side-channel attacks is a requirement in lots of use cases, we focus on optimizing the Boolean masking of the modular addition. Contrary to recent related work, we target evolving a masked full 作者: AVERT 時(shí)間: 2025-3-24 12:30
William?A. Mcintosh,Marissa Cisnerosble performance in detecting attacks. However, the lack of transparency in their decision-making process and the scarcity of attack data for training purposes pose a major challenge for the development of ML-based IDS systems for Internet of Things (IoT). Therefore, employing anomaly detection metho作者: HUMID 時(shí)間: 2025-3-24 18:07
William?A. Mcintosh,Marissa Cisnerosnerated invalid signatures in the case an aggregate signature is detected as invalid. In existing FT-AS schemes (whose tracing functionality requires multi-rounds), a verifier needs to send a feedback to an aggregator for efficiently tracing the invalid signer(s). However, in practice, if this feedb作者: CULP 時(shí)間: 2025-3-24 19:10
William?A. Mcintosh,Marissa Cisneros crucial. Authenticated key exchange protocols establish shared cryptographic keys between the parties and, in addition, authenticate their identities. Usually, the identities are based on a pair of private and public keys. Physical Unclonable Functions (PUFs) are widely used recently to bind physic作者: FRONT 時(shí)間: 2025-3-25 00:13
William?A. Mcintosh,Marissa Cisnerose profiling for the purpose of authentication, localization, and physical security perimeter monitoring. Previous research on the use of RSSI-based wireless node profiling assumes that RSSI timeseries are stationary and independent identically distributed (i.i.d.). Unfortunately, in real-world envir作者: 切割 時(shí)間: 2025-3-25 06:15
Pierre Lemée,Rapha?l Charron,Arnaud Bridier as the “privacy paradox” phenomenon states, consumers behave differently even if many claim to be concerned about smart robot privacy issues. In this paper, we describe our attempt to discover effective measures for average consumers to guard against potential privacy intrusions by cleaning robots.作者: 館長(zhǎng) 時(shí)間: 2025-3-25 09:27 作者: Nonflammable 時(shí)間: 2025-3-25 14:30 作者: 裙帶關(guān)系 時(shí)間: 2025-3-25 17:18
Pierre Lemée,Rapha?l Charron,Arnaud Bridierevent correlation techniques intended for the detection of cyber security incidents and different types of cyber attacks, as well as there are a lot of techniques for multi-step attack modeling. At the same time, most modern security event management solutions do not allow mapping the detected secur作者: headway 時(shí)間: 2025-3-25 20:40
Donovan Stanberry,Lystra Fletcher-Paule-art to the novel LWC ciphers. Our research gives an overview over the performance of the latest software implementations of the NIST LWC finalists and shows under which circumstances which candidate is performing the best in our individual test cases. Additionally, we make all benchmarking results作者: 不可磨滅 時(shí)間: 2025-3-26 01:06
William?A. Mcintosh,Marissa Cisnerosementation to solutions found by traditional search methods. Moreover, the leakage of our new solution is validated by a .-test conducted with a leakage simulator. We present under which circumstances our masked implementation outperforms related work and prove the feasibility of successfully using 作者: Talkative 時(shí)間: 2025-3-26 07:03
William?A. Mcintosh,Marissa Cisnerosn the ML decision-making process in IoT security monitoring by explaining why a prediction is made, providing quantifiable data on which features influence the prediction and to what extent, which are generated from SHaply Adaptive values exPlanations (SHAP) linking optimal credit allocation to loca作者: Externalize 時(shí)間: 2025-3-26 08:28 作者: QUAIL 時(shí)間: 2025-3-26 16:18
William?A. Mcintosh,Marissa Cisnerosr has been selected by the Post-Quantum Cryptography standardization process of the National Institute of Standards and Technology (NIST) for key establishment protocols. In this work, we propose to strengthen a Kyber key exchange protocol with BPUFs extracted from SRAMs included in IoT devices. Exp作者: Substance 時(shí)間: 2025-3-26 18:28
William?A. Mcintosh,Marissa Cisneros must consider breaking down a given RSSI dataset into its constituting sub-segments. Unfortunately, the effect of environmental variables on RSSI values tend to be random, which makes the problem of RSSI timeseries segmentation even more challenging. Thus, it is necessary to study the effectiveness作者: Living-Will 時(shí)間: 2025-3-26 22:15 作者: 向下五度才偏 時(shí)間: 2025-3-27 01:42 作者: 鎮(zhèn)痛劑 時(shí)間: 2025-3-27 06:10
Pierre Lemée,Rapha?l Charron,Arnaud BridierAttack Analyzer (Indicators Of Attack)” rules describing security incidents (signatures) using Sigma language and integrated with the MITRE ATT &CK database. The developed technique allows mapping the events detected in the system under analysis to the MITRE ATT &CK attack patterns and in prospect f作者: incision 時(shí)間: 2025-3-27 10:25
,The Final Round: Benchmarking NIST LWC Ciphers on?Microcontrollers,e-art to the novel LWC ciphers. Our research gives an overview over the performance of the latest software implementations of the NIST LWC finalists and shows under which circumstances which candidate is performing the best in our individual test cases. Additionally, we make all benchmarking results作者: 嬉耍 時(shí)間: 2025-3-27 14:23 作者: BIAS 時(shí)間: 2025-3-27 18:30 作者: Vldl379 時(shí)間: 2025-3-28 01:13
,Constraints and?Evaluations on?Signature Transmission Interval for?Aggregate Signatures with?Interathat the time required for the feedback is 605.3 ms for a typical parameter setting, which indicates that if the acceptable feedback time is significantly larger than a few hundred ms, the existing FT-AS scheme would effectively work in such systems. However, there are situations where such feedback作者: 卵石 時(shí)間: 2025-3-28 04:30 作者: 豪華 時(shí)間: 2025-3-28 09:53
,Effective Segmentation of?RSSI Timeseries Produced by?Stationary IoT Nodes: Comparative Study, must consider breaking down a given RSSI dataset into its constituting sub-segments. Unfortunately, the effect of environmental variables on RSSI values tend to be random, which makes the problem of RSSI timeseries segmentation even more challenging. Thus, it is necessary to study the effectiveness作者: 墊子 時(shí)間: 2025-3-28 13:30
,Resource Efficient Federated Deep Learning for?IoT Security Monitoring,ed edge nodes. The performance was evaluated using various realistic IoT and non-IoT benchmark datasets on virtual and testbed environments build with GB-BXBT-2807 edge-computing-like devices. The experimental results show that the proposed method can reduce memory usage by 81% in the simulated envi作者: crutch 時(shí)間: 2025-3-28 18:23
Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and successfully tested it against third-party dongles available on the market. Thus, our approach enables a security layer to enhance automotive privacy and security of dongle users, which is of high relevance due to missing message authentications on the level of the electronic control units.作者: 潛伏期 時(shí)間: 2025-3-28 20:41 作者: neolith 時(shí)間: 2025-3-29 01:45 作者: DAMN 時(shí)間: 2025-3-29 03:59 作者: 斗志 時(shí)間: 2025-3-29 07:31 作者: 安裝 時(shí)間: 2025-3-29 12:03 作者: 拱墻 時(shí)間: 2025-3-29 16:32