Deterring Deepfake Attacks with an Electrical Network Frequency Fingerprints Approach.
Deeraj NagothuRonghua XuYu ChenErik BlaschAlexander J. AvedPublished in: Future Internet (2022)
Keyphrases
- traffic analysis
- network anomaly detection
- security threats
- peer to peer
- network model
- distribution networks
- network traffic
- computer networks
- wireless sensor networks
- network intrusion
- fault injection
- ddos attacks
- buffer overflow
- network attacks
- insider threat
- social networks
- intrusion detection and prevention
- denial of service attacks
- power grid
- communication networks
- complex networks
- network structure
- social network analysis