Impersonation Attack Detection in IoT Networks
暂无分享,去创建一个
[1] Mohammad Reza Nosouhi,et al. Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios , 2023, IEEE Transactions on Dependable and Secure Computing.
[2] Mohammad Reza Nosouhi,et al. RF Fingerprinting-Based IoT Node Authentication Using Mahalanobis Distance Correlation Theory , 2022, IEEE Networking Letters.
[3] F. Kraemer,et al. Value of Information in Wireless Sensor Network Applications and the IoT: A Review , 2022, IEEE Sensors Journal.
[4] Keshav Sood,et al. A Tutorial on Next Generation Heterogeneous IoT Networks and Node Authentication , 2021, IEEE Internet of Things Magazine.
[5] Jiawei Yuan,et al. Machine-Learning PUF-based Detection of RF Anomalies in a Cluttered RF Environment , 2021, 2021 IEEE International Symposium on Technologies for Homeland Security (HST).
[6] Woongsup Lee,et al. Deep-Learning-Aided RF Fingerprinting for NFC Security , 2021, IEEE Communications Magazine.
[7] Shuping Sun. Segmentation-Based Adaptive Feature Extraction Combined With Mahalanobis Distance Classification Criterion for Heart Sound Diagnostic System , 2021, IEEE Sensors Journal.
[8] Ihsan Ali,et al. Data Collection in Studies on Internet of Things (IoT), Wireless Sensor Networks (WSNs), and Sensor Cloud (SC): Similarities and Differences , 2021, IEEE Access.
[9] Martins Ezuma,et al. Detection and Classification of UAVs Using RF Fingerprints in the Presence of Wi-Fi and Bluetooth Interference , 2020, IEEE Open Journal of the Communications Society.
[10] Linghe Kong,et al. SLoRa: towards secure LoRa communications with fine-grained physical layer features , 2020, SenSys.
[11] Vijay Varadharajan,et al. Alleviating Heterogeneity in SDN-IoT Networks to Maintain QoS and Enhance Security , 2020, IEEE Internet of Things Journal.
[12] Paul D. Yoo,et al. IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction , 2020, IEEE Access.
[13] Lijun Qian,et al. Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning , 2019, 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC).
[14] Lee Friedman,et al. Assessment of the Effectiveness of Seven Biometric Feature Normalization Techniques , 2019, IEEE Transactions on Information Forensics and Security.
[15] Raúl Mohedano,et al. On the Mahalanobis Distance Classification Criterion for Multidimensional Normal Distributions , 2013, IEEE Transactions on Signal Processing.
[16] Taekyoung Kwon,et al. Impersonation attacks on software-only two-factor authentication schemes , 2002, IEEE Commun. Lett..
[17] Mohammad Reza Nosouhi,et al. Towards Spoofing Resistant Next Generation IoT Networks , 2022, IEEE Transactions on Information Forensics and Security.
[18] Zhi Sun,et al. RF Impairment Model-Based IoT Physical-Layer Identification for Enhanced Domain Generalization , 2022, IEEE Transactions on Information Forensics and Security.
[19] Craig Iaboni,et al. Internet-of-Things Curriculum, Pedagogy, and Assessment for STEM Education: A Review of Literature , 2022, IEEE Access.
[20] Anastasios N. Bikos,et al. Securing Digital Ledger Technologies-Enabled IoT Devices: Taxonomy, Challenges and Solutions , 2022, IEEE Access.
[21] Hongsong Zhu,et al. Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods , 2021, IEEE Access.
[22] Yunhong Zhu,et al. Micrometeoroid and Orbital Debris Impact Detection and Location Based on FBG Sensor Network Using Combined Artificial Neural Network and Mahalanobis Distance Method , 2021, IEEE Transactions on Instrumentation and Measurement.
[23] Na Su,et al. Incremental Attribute Reduction Method Based on Chi-Square Statistics and Information Entropy , 2020, IEEE Access.
[24] Ling Zhou,et al. A Novel Approach for Fault Detection in Integrated Navigation Systems , 2020, IEEE Access.