Actuator and Sensor Attacks Detection Method based on Attack Reconstruction.
Dinh Duy Kha NguyenCédric EscuderoEmil DumitrescuEric ZamaïPublished in: MED (2024)
Keyphrases
- detection method
- countermeasures
- attack detection
- malicious attacks
- malicious users
- differential power analysis
- denial of service attacks
- attack scenarios
- face detection
- detection algorithm
- power analysis
- fault injection
- cyber attacks
- data corruption
- security risks
- block cipher
- ddos attacks
- network attacks
- detecting malicious
- normal traffic
- feature detection
- digital watermark
- injection attacks
- defense mechanisms
- sensor networks
- security vulnerabilities
- security measures
- three dimensional
- dos attacks
- intrusion detection system
- information leakage
- control system
- intrusion detection and prevention
- phishing attacks
- buffer overflow
- normal behavior
- smart card
- digital images
- malicious nodes
- watermarking scheme
- information security
- high resolution
- secret key
- noisy images
- intrusion detection
- anomaly detection