243 research outputs found

    When keystroke meets password: Attacks and defenses

    Get PDF

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    Fuel Conservation by the Application of Spill Prevention and Failsafe Engineering (A Guideline Manual)

    Full text link
    From a series of nationwide plant surveys dedicated to spill prevention, containment and countermeasure evaluation, coupled with spill response action activities, a need was determined for a spill prevention guideline manual. From Federally accumulated statistics for oil and hazardous substance spills, the authors culled information on spills of hydrocarbon products. In 1978, a total of 1456 oil spills were reported compared to 1451 in 1979. The 1978 spills were more severe, however, since 7;289,163 gallons of oil were accident~y discharged. In 1979, the gallons spilled was reduced to 3,663,473. These figures are derived from reported spills; it is highly possible that an equal amount was spilled and not reported. Spills effectively contained within a plant property that do not enter a n~vigational waterway need not be reported. Needless to say, there is a tremendous annual loss of oil products due to accidental spillage during transportation, cargo transfer, bulk storage and processing. As an aid to plant engineers and managers, Fe~eral workers, fire marshalls and fire and casualty insurance inspectors, the documen~ is offered as a spill prevention guide. The'manual defines state-of-the-art spill prevention practices and automation techniques that can reduce spills caused by human error. Whenever practical, the cost of implementation is provided to aid equipment acquisition and installation budgeting. To emphasize the need for spill prevention activities, historic spills are briefly described after which remedial action is defined in an appropriate section of the manual. The section on plant security goes into considerable depth since to date no Federal agency or traqe association has provided industry with guidelines on this important phase of plant operation. The intent of the document is to provide finger-tip reference material that can be used by interested parties in a nationwide effort to reduce loss of oil from preventable spills

    Spoofing Detection in Voice Biometrics: Cochlear Modelling and Perceptually Motivated Features

    Full text link
    The automatic speaker verification (ASV) system is one of the most widely adopted biometric technology. However, ASV is vulnerable to spoofing attacks that can significantly affect its reliability. Among the different variants of spoofing attacks, replay attacks pose a major threat as they do not require any expert knowledge to implement and are difficult to detect. The primary focus of this thesis is on understanding and developing biologically inspired models and techniques to detect replay attacks. This thesis develops a novel framework for implementing an active cochlear filter model as a frontend spectral analyser for spoofing attack detection to leverage the remarkable sensitivity and selectivity of the mammalian auditory system over a broad range of intensities and frequencies. In particular, the developed model aims to mimic the active mechanism in the cochlea, enabling sharp frequency tuning and level-dependent compression, which amplifies and tune to low energy signal to make a broad dynamic range of signals audible. Experimental evaluations of the developed models in the context of replay detection systems exhibit a significant performance improvement, highlighting the potential benefits of the use of biologically inspired front ends. In addition, since replay detection relies on the discerning channel characteristics and the effect of the acoustic environment, acoustic cues essential for speech perception such as amplitude- and frequency-modulation (AM, FM) features are also investigated. Finally, to capture discriminative cues present in the temporal domain, the temporal masking psychoacoustic phenomenon in auditory processing is exploited, and the usefulness of the masking pattern is investigated. This led to a novel feature parameterisation which helps improve replay attack detection

    DRONE DELIVERY OF CBNRECy – DEW WEAPONS Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD)

    Get PDF
    Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD) is our sixth textbook in a series covering the world of UASs and UUVs. Our textbook takes on a whole new purview for UAS / CUAS/ UUV (drones) – how they can be used to deploy Weapons of Mass Destruction and Deception against CBRNE and civilian targets of opportunity. We are concerned with the future use of these inexpensive devices and their availability to maleficent actors. Our work suggests that UASs in air and underwater UUVs will be the future of military and civilian terrorist operations. UAS / UUVs can deliver a huge punch for a low investment and minimize human casualties.https://newprairiepress.org/ebooks/1046/thumbnail.jp

    Sea Mines and Countermeasures: A Bibliography

    Get PDF
    This compilation was prepared for the Dudley Knox Library, Naval Postgraduate School, Monterey, CA
    • …
    corecore