Distort to Detect, not Affect: Detecting Stealthy Sensor Attacks with Micro-distortion.
Suman SouravBinbin ChenPublished in: SmartGridComm (2021)
Keyphrases
- detecting malicious
- misuse detection
- detect malicious
- automatic detection
- intrusion detection and prevention
- automatically detecting
- intrusion detection
- network attacks
- detecting anomalous
- sensor networks
- real time
- intrusion detection system
- anomaly detection
- countermeasures
- sensor data
- sensor fusion
- normal behavior
- low false alarm rate
- robust detection
- detect anomalies
- detection method
- image watermarking
- security threats
- malicious attacks
- computer security
- malicious activities
- network intrusion detection
- network intrusion detection systems
- image quality
- digital images
- multi sensor