Toward attack-resistant localization under infrastructure attacks.
Jie YangYingying ChenPublished in: Secur. Commun. Networks (2012)
Keyphrases
- countermeasures
- malicious users
- attack detection
- malicious attacks
- differential power analysis
- denial of service attacks
- power analysis
- cyber attacks
- attack scenarios
- security risks
- fault injection
- ddos attacks
- block cipher
- injection attacks
- dos attacks
- digital watermark
- data corruption
- network intrusion
- network intrusions
- detecting malicious
- denial of service
- normal traffic
- network security
- information leakage
- phishing attacks
- end hosts
- critical infrastructure
- security measures
- network attacks
- malicious nodes
- distributed denial of service attacks
- information security
- attack graphs
- java card
- defense mechanisms
- digital images
- anomaly detection
- detect malicious
- smart card
- normal behavior
- misuse detection
- malicious activities
- buffer overflow
- attack graph
- network intrusion detection
- fault model
- intrusion detection system
- wireless sensor networks