Sensor attack detection using history based pairwise inconsistency
暂无分享,去创建一个
Yu Jiang | Xiaojuan Li | Houbing Song | Yong Guan | Kang Yang | Zhiping Shi | Rui Wang | Chenxia Luo | Zhiping Shi | Yong Guan | Houbing Song | Rui Wang | Xiaojuan Li | Kang Yang | Yu Jiang | Chenxia Luo
[1] Kim-Kwang Raymond Choo,et al. Security and Privacy for the Internet of Drones: Challenges and Solutions , 2018, IEEE Communications Magazine.
[2] Christophe Champod,et al. Risk evaluation for spoofing against a sensor supplied with liveness detection. , 2011, Forensic science international.
[3] Rongxing Lu,et al. From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework , 2017, IEEE Access.
[4] Shwetak N. Patel,et al. Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.
[5] Keith Marzullo,et al. Tolerating failures of continuous-valued sensors , 1990, TOCS.
[6] Kim-Kwang Raymond Choo,et al. Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps , 2018, Future Gener. Comput. Syst..
[7] Kim-Kwang Raymond Choo,et al. An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks , 2017, J. Netw. Comput. Appl..
[8] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[9] Insup Lee,et al. Attack-resilient sensor fusion , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[10] Yong Yu,et al. Survey on key revocation mechanisms in wireless sensor networks , 2016, J. Netw. Comput. Appl..
[11] Insup Lee,et al. Attack-Resilient Sensor Fusion for Safety-Critical Cyber-Physical Systems , 2016, ACM Trans. Embed. Comput. Syst..
[12] R. E. Kalman,et al. A New Approach to Linear Filtering and Prediction Problems , 2002 .
[13] Md. Rafiqul Islam,et al. A secure and resilient cross‐domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy , 2017, Concurr. Comput. Pract. Exp..
[14] Beibei Li,et al. Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system , 2017, J. Parallel Distributed Comput..
[15] Richard G. Baraniuk,et al. Robust Distributed Estimation Using the Embedded Subgraphs Algorithm , 2006, IEEE Transactions on Signal Processing.
[16] Tie Qiu,et al. Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things , 2017, IEEE Internet of Things Journal.
[17] Todd E. Humphreys,et al. Drone Hack: Spoofing Attack Demonstration on a Civilian Unmanned Aerial Vehicle , 2012 .
[18] Paulo Tabuada,et al. Non-invasive Spoofing Attacks for Anti-lock Braking Systems , 2013, CHES.
[19] Yunmin Zhu,et al. Optimal interval estimation fusion based on sensor interval estimates with confidence degrees , 2006, Autom..
[20] Ahmed Frikha,et al. Analytic hierarchy process for multi-sensor data fusion based on belief function theory , 2015, Eur. J. Oper. Res..
[21] Guowu Yang,et al. Uncertainty Model for Configurable Hardware/Software and Resource Partitioning , 2016, IEEE Transactions on Computers.
[22] Goran Frehse,et al. Formal Analysis of Timing Effects on Closed-Loop Properties of Control Software , 2014, 2014 IEEE Real-Time Systems Symposium.
[23] Paul Rad,et al. Driverless vehicle security: Challenges and future research opportunities , 2020, Future Gener. Comput. Syst..
[24] Yu Jiang,et al. Design and Optimization of Multiclocked Embedded Systems Using Formal Techniques , 2015, IEEE Transactions on Industrial Electronics.
[25] Yu Jiang,et al. Design of Mixed Synchronous/Asynchronous Systems with Multiple Clocks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[26] Tony J. Dodd,et al. Multi-sensor data fusion in defence and aerospace , 1998, The Aeronautical Journal (1968).
[27] Xiong Li,et al. Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks , 2017, Comput. Networks.
[28] Christian Brecher,et al. Cyber-Physical Systems: Foundations, Principles and Applications , 2016 .
[29] Beibei Li,et al. DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System , 2016, IEEE Transactions on Information Forensics and Security.
[30] Stephen P. Boyd,et al. A scheme for robust distributed sensor fusion based on average consensus , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[31] Insup Lee,et al. Resilient multidimensional sensor fusion using measurement history , 2014, HiCoNS.
[32] S. Sitharama Iyengar,et al. Robust Distributed Comupting and Sensing Algorithm , 1996, Computer.
[33] Kim-Kwang Raymond Choo,et al. Resilient interconnection in cyber-physical control systems , 2017, Comput. Secur..
[34] Insup Lee,et al. Adaptive Transient Fault Model for Sensor Attack Detection , 2016, 2016 IEEE 4th International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA).
[35] Alan S. Willsky,et al. A survey of design methods for failure detection in dynamic systems , 1976, Autom..
[36] Ulrich Schmid,et al. How to reconcile fault-tolerant interval intersection with the Lipschitz condition , 2001, Distributed Computing.