GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2020
    In:  IEEE Transactions on Industrial Informatics Vol. 16, No. 2 ( 2020-2), p. 1373-1384
    In: IEEE Transactions on Industrial Informatics, Institute of Electrical and Electronics Engineers (IEEE), Vol. 16, No. 2 ( 2020-2), p. 1373-1384
    Type of Medium: Online Resource
    ISSN: 1551-3203 , 1941-0050
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2020
    detail.hit.zdb_id: 2172163-4
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    EDP Sciences ; 2018
    In:  MATEC Web of Conferences Vol. 173 ( 2018), p. 01011-
    In: MATEC Web of Conferences, EDP Sciences, Vol. 173 ( 2018), p. 01011-
    Abstract: With the arrival of Industry 4.0, more and more industrial control systems are connected with the outside world, which brings tremendous convenience to industrial production and control, and also introduces many potential security hazards. After a large number of attack cases analysis, we found that attacks in SCADA systems can be divided into internal attacks and external attacks. Both types of attacks are inevitable. Traditional firewalls, IDSs and IPSs are no longer suitable for industrial control systems. Therefore, we propose behavior-based anomaly detection and build three baselines of normal behaviors. Experiments show that using our proposed detection model, we can quickly detect a variety of attacks on SCADA (Supervisory Control And Data Acquisition) systems.
    Type of Medium: Online Resource
    ISSN: 2261-236X
    Language: English
    Publisher: EDP Sciences
    Publication Date: 2018
    detail.hit.zdb_id: 2673602-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    EDP Sciences ; 2018
    In:  MATEC Web of Conferences Vol. 173 ( 2018), p. 03039-
    In: MATEC Web of Conferences, EDP Sciences, Vol. 173 ( 2018), p. 03039-
    Abstract: Attacks that use sophisticated and complex methods in-creased recently, aiming to infiltrate the Supervisory Control and Data Acquisition (SCADA) system and stay undetected. Therefore, attackers often get access to authorized permissions of SCADA and bring catastrophic damages by sending ‘legitimate’ control commands. Furthermore, insiders may also misuse or abuse their permissions to damage SCADA system, which is difficult to predict and protect against them. Most existing security systems employ standard signature-based or anomaly-based approaches, which are not able to identify this type of malicious activities. In this paper, we use machine learning algorithms based on Singular Values Decomposition (SVD) to create profiles of users and devices. The major contribution of this paper is providing a general process to detect anomalies, independent of specific use-cases. Suspicious actions are altered to analysts with relevant contextual information for further investigation and action. We provide detailed description of algorithms, methodology, processing of profiling and anomaly detection. Having profiles of different users and devices can provide us a baseline of normal behavior to compare against unusual behaviors. To demonstrate the proposed method, attack scenarios have been simulated at a Compressed Natural Gas (CNG) system in our lab. Experimental results illustrate that the proposed method is effective for abnormal behaviors in SCADA system.
    Type of Medium: Online Resource
    ISSN: 2261-236X
    Language: English
    Publisher: EDP Sciences
    Publication Date: 2018
    detail.hit.zdb_id: 2673602-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    European Alliance for Innovation n.o. ; 2020
    In:  ICST Transactions on Security and Safety Vol. 7, No. 26 ( 2020-10-30), p. 170236-
    In: ICST Transactions on Security and Safety, European Alliance for Innovation n.o., Vol. 7, No. 26 ( 2020-10-30), p. 170236-
    Type of Medium: Online Resource
    ISSN: 2032-9393
    Language: English
    Publisher: European Alliance for Innovation n.o.
    Publication Date: 2020
    detail.hit.zdb_id: 3003088-2
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Association for the Advancement of Artificial Intelligence (AAAI) ; 2021
    In:  Proceedings of the AAAI Conference on Artificial Intelligence Vol. 35, No. 11 ( 2021-05-18), p. 9825-9833
    In: Proceedings of the AAAI Conference on Artificial Intelligence, Association for the Advancement of Artificial Intelligence (AAAI), Vol. 35, No. 11 ( 2021-05-18), p. 9825-9833
    Abstract: With the capability of trading accuracy for latency on-the-fly, the technique of adaptive early-exit inference has emerged as a promising line of research to accelerate the deep learning inference. However, studies in this line of research commonly use a group of thresholds to control the accuracy-latency trade-off, where a thorough and general methodology on how to determine these thresholds has not been conducted yet, especially with regard to the common requirements of average inference latency. To address this issue and enable latency-aware adaptive early-exit inference, in the present paper, we approximately formulate the threshold determination problem of finding the accuracy-maximum threshold setting that meets a given average latency requirement, and then propose a threshold determination method to tackle our formulated non-convex problem. Theoretically, we prove that, for certain parameter settings, our method finds an approximate stationary point of the formulated problem. Empirically, on top of various models across multiple datasets (CIFAR-10, CIFAR-100, ImageNet and two time-series datasets), we show that our method can well handle the average latency requirements, and consistently finds good threshold settings in negligible time.
    Type of Medium: Online Resource
    ISSN: 2374-3468 , 2159-5399
    Language: Unknown
    Publisher: Association for the Advancement of Artificial Intelligence (AAAI)
    Publication Date: 2021
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Elsevier BV ; 2020
    In:  Computer Networks Vol. 169 ( 2020-03), p. 107092-
    In: Computer Networks, Elsevier BV, Vol. 169 ( 2020-03), p. 107092-
    Type of Medium: Online Resource
    ISSN: 1389-1286
    Language: English
    Publisher: Elsevier BV
    Publication Date: 2020
    detail.hit.zdb_id: 1499744-7
    detail.hit.zdb_id: 224452-4
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2023
    In:  IEEE Transactions on Mobile Computing Vol. 22, No. 1 ( 2023-1-1), p. 1-18
    In: IEEE Transactions on Mobile Computing, Institute of Electrical and Electronics Engineers (IEEE), Vol. 22, No. 1 ( 2023-1-1), p. 1-18
    Type of Medium: Online Resource
    ISSN: 1536-1233 , 1558-0660 , 2161-9875
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2023
    detail.hit.zdb_id: 2082213-3
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Elsevier BV ; 2019
    In:  Computers & Security Vol. 87 ( 2019-11), p. 101582-
    In: Computers & Security, Elsevier BV, Vol. 87 ( 2019-11), p. 101582-
    Type of Medium: Online Resource
    ISSN: 0167-4048
    Language: English
    Publisher: Elsevier BV
    Publication Date: 2019
    detail.hit.zdb_id: 2001917-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Association for Computing Machinery (ACM) ; 2021
    In:  ACM Transactions on Multimedia Computing, Communications, and Applications Vol. 17, No. 1 ( 2021-02-28), p. 1-23
    In: ACM Transactions on Multimedia Computing, Communications, and Applications, Association for Computing Machinery (ACM), Vol. 17, No. 1 ( 2021-02-28), p. 1-23
    Abstract: Similar to conventional video, the increasingly popular 360  virtual reality (VR) video requires copyright protection mechanisms. The classic approach for copyright protection is the introduction of a digital watermark into the video sequence. Due to the nature of spherical panorama, traditional watermarking schemes that are dedicated to planar media cannot work efficiently for 360  VR video. In this article, we propose a spherical wavelet watermarking scheme to accommodate 360  VR video. With our scheme, the watermark is first embedded into the spherical wavelet transform domain of the 360  VR video. The spherical geometry of the 360  VR video is used as the host space for the watermark so that the proposed watermarking scheme is compatible with the multiple projection formats of 360  VR video. Second, the just noticeable difference model, suitable for head-mounted displays (HMDs), is used to control the imperceptibility of the watermark on the viewport. Third, besides detecting the watermark from the spherical projection, the proposed watermarking scheme also supports detecting watermarks robustly from the viewport projection. The watermark in the spherical domain can protect not only the 360  VR video but also its corresponding viewports. The experimental results show that the embedded watermarks are reliably extracted both from the spherical and the viewport projections of the 360  VR video, and the robustness of the proposed scheme to various copyright attacks is significantly better than that of the competing planar-domain approaches when detecting the watermark from viewport projection.
    Type of Medium: Online Resource
    ISSN: 1551-6857 , 1551-6865
    RVK:
    Language: English
    Publisher: Association for Computing Machinery (ACM)
    Publication Date: 2021
    detail.hit.zdb_id: 2182650-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Oxford University Press (OUP) ; 2022
    In:  The Computer Journal Vol. 65, No. 12 ( 2022-12-30), p. 3062-3080
    In: The Computer Journal, Oxford University Press (OUP), Vol. 65, No. 12 ( 2022-12-30), p. 3062-3080
    Abstract: Rotational-XOR cryptanalysis is a very recent technique for ARX ciphers. In this paper, the probability propagation formula of RX-cryptanalysis in modular addition is extended, and the calculation of RX-difference probability for any rotation parameter ($0 & lt;k & lt;n$) can be realized. By proposing a concept of RX-offset and constructing the corresponding distribution table, the propagation of RX-difference in modular addition can be derived from the propagation of XOR-difference. Combined with the improvement of the automatic search tool for XOR-differential characteristics of ARX ciphers, we only need to add one more operation in each round, i.e. traverse the possible value of RX-offset and XOR it with the output XOR-difference of modular addition, thus it can achieve the search for RX-differential characteristics. With this method, the RX-differential distinguisher of ARX-C primitives without or with linear key schedule can be searched. For the applications, we have obtained the third-party RX-cryptanalysis results for Alzette and CHAM for the first time as far as we know.
    Type of Medium: Online Resource
    ISSN: 0010-4620 , 1460-2067
    RVK:
    RVK:
    Language: English
    Publisher: Oxford University Press (OUP)
    Publication Date: 2022
    detail.hit.zdb_id: 1477172-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...