Model-based Randomness Monitor for Stealthy Sensor Attacks.
Paul J. BonczekShijie GaoNicola BezzoPublished in: CoRR (2020)
Keyphrases
- real time
- sensor data
- sensor networks
- countermeasures
- intrusion detection and prevention
- image watermarking
- security threats
- security protocols
- malicious users
- wearable sensors
- multi sensor
- data driven
- dos attacks
- monitoring system
- high sensitivity
- computer systems
- traffic analysis
- malicious attacks
- attack detection
- information systems
- neural network