Attack and Defence Modelling for Attacks via the Speech Interface.
Mary K. BisphamIoannis AgrafiotisMichael GoldsmithPublished in: ICISSP (2019)
Keyphrases
- countermeasures
- malicious users
- attack detection
- malicious attacks
- denial of service attacks
- differential power analysis
- dos attacks
- ddos attacks
- attack scenarios
- power analysis
- block cipher
- injection attacks
- user interface
- data corruption
- denial of service
- cyber attacks
- fault injection
- speech recognition
- digital watermark
- hands free
- security measures
- security risks
- network intrusion
- network intrusions
- information security
- intrusion detection system
- detecting malicious
- audio visual
- network security
- malicious activities
- normal traffic
- network analysis
- phishing attacks
- speech signal
- network anomaly detection
- information leakage
- security vulnerabilities
- intrusion detection
- network intrusion detection
- defense mechanisms
- watermarking scheme
- anomaly detection
- automatic speech recognition
- text input
- network attacks
- malicious nodes
- dialogue system
- security mechanisms
- security protocols
- detection mechanism