|
|
|
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici
The growth of the Internet of Things (IoT) has led to a significant rise in cyber attacks and an expanded attack surface for the average consumer. In order to protect consumers and infrastructure, research into detecting malicious IoT activity must be of...
ver más
|
|
|
|
|
|
|
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici
This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices?a Raspberry Pi 3 model B and a Dragon...
ver más
|
|
|
|
|
|
|
Guilherme Perin, Lichao Wu and Stjepan Picek
The adoption of deep neural networks for profiling side-channel attacks opened new perspectives for leakage detection. Recent publications showed that cryptographic implementations featuring different countermeasures could be broken without feature selec...
ver más
|
|
|
|
|
|
|
Hui Yan and Chaoyuan Cui
Cache side channel attacks, as a type of cryptanalysis, seriously threaten the security of the cryptosystem. These attacks continuously monitor the memory addresses associated with the victim?s secret information, which cause frequent memory access on th...
ver más
|
|
|
|
|
|
|
Zhanjun Hao, Guowei Wang and Xiaochao Dang
Casualties caused by people trapped in cars have been common in recent years. Despite a variety of solutions, complex detection devices need to be arranged, or privacy is poor. Since device-free Wi-Fi sensing has attracted much attention due to its simpl...
ver más
|
|
|
|
|
|
|
Honghe Huang, Zhen Zuo, Bei Sun, Peng Wu and Jiaju Zhang
Side-scan sonar systems play an important role in tasks such as marine terrain exploration and underwater target identification. Target segmentation of side-scan sonar images is an effective method of underwater target detection. However, the principle o...
ver más
|
|
|
|
|
|
|
Dimitrios Myridakis, Paul Myridakis and Athanasios Kakarountas
Recently, there has been a sharp increase in the production of smart devices and related networks, and consequently the Internet of Things. One concern for these devices, which is constantly becoming more critical, is their protection against attacks due...
ver más
|
|
|
|
|
|
|
Philippe Bagot, Nicolas Huybrechts and Philippe Sergent
The wide spatial and temporal coverage of remotely sensing images is an essential asset to analyze the morphological behaviour of fast-changing coastal environments such as estuarine systems. This paper investigates the reliability of intertidal topograp...
ver más
|
|
|
|
|
|
|
Dimitrios Myridakis, Georgios Spathoulas, Athanasios Kakarountas and Dimitrios Schinianakis
The continuous growth of the number of Internet of Things (IoT) devices and their inclusion to public and private infrastructures has introduced new applciations to the market and our day-to-day life. At the same time, these devices create a potential th...
ver más
|
|
|
|
|
|
|
Alessio Radice and Barbara Zanchi
The realization of hydromorphologic laboratory experiments on the propagation of aggrading or degrading sediment fronts requires simultaneous measurements of the sediment feeding rate, the profile of the free surface, and the flume bed elevation. In this...
ver más
|
|
|
|