243 research outputs found
Security and Privacy for Modern Wireless Communication Systems
The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks
Fuel Conservation by the Application of Spill Prevention and Failsafe Engineering (A Guideline Manual)
From a series of nationwide plant surveys dedicated to spill prevention, containment and countermeasure evaluation, coupled with spill response action activities, a need was determined for a spill prevention guideline manual. From Federally accumulated statistics for oil and hazardous substance spills, the authors culled information on spills of hydrocarbon products. In 1978, a total of 1456 oil spills were reported compared to 1451 in 1979. The 1978 spills were more severe, however, since 7;289,163 gallons of oil were accident~y discharged. In 1979, the gallons spilled was reduced to 3,663,473. These figures are derived from reported spills; it is highly possible that an equal amount was spilled and not reported. Spills effectively contained within a plant property that do not enter a n~vigational waterway need not be reported. Needless to say, there is a tremendous annual loss of oil products due to accidental spillage during transportation, cargo transfer, bulk storage and processing. As an aid to plant engineers and managers, Fe~eral workers, fire marshalls and fire and casualty insurance inspectors, the documen~ is offered as a spill prevention guide. The'manual defines state-of-the-art spill prevention practices and automation techniques that can reduce spills caused by human error. Whenever practical, the cost of implementation is provided to aid equipment acquisition and installation budgeting. To emphasize the need for spill prevention activities, historic spills are briefly described after which remedial action is defined in an appropriate section of the manual. The section on plant security goes into considerable depth since to date no Federal agency or traqe association has provided industry with guidelines on this important phase of plant operation. The intent of the document is to provide finger-tip reference material that can be used by interested parties in a nationwide effort to reduce loss of oil from preventable spills
Spoofing Detection in Voice Biometrics: Cochlear Modelling and Perceptually Motivated Features
The automatic speaker verification (ASV) system is one of the most widely adopted biometric
technology. However, ASV is vulnerable to spoofing attacks that can significantly affect its
reliability. Among the different variants of spoofing attacks, replay attacks pose a major threat as
they do not require any expert knowledge to implement and are difficult to detect. The primary focus
of this thesis is on understanding and developing biologically inspired models and techniques to
detect replay attacks.
This thesis develops a novel framework for implementing an active cochlear filter model as a frontend
spectral analyser for spoofing attack detection to leverage the remarkable sensitivity and
selectivity of the mammalian auditory system over a broad range of intensities and frequencies. In
particular, the developed model aims to mimic the active mechanism in the cochlea, enabling sharp
frequency tuning and level-dependent compression, which amplifies and tune to low energy signal
to make a broad dynamic range of signals audible. Experimental evaluations of the developed models
in the context of replay detection systems exhibit a significant performance improvement,
highlighting the potential benefits of the use of biologically inspired front ends.
In addition, since replay detection relies on the discerning channel characteristics and the effect of
the acoustic environment, acoustic cues essential for speech perception such as amplitude- and
frequency-modulation (AM, FM) features are also investigated. Finally, to capture discriminative
cues present in the temporal domain, the temporal masking psychoacoustic phenomenon in auditory
processing is exploited, and the usefulness of the masking pattern is investigated. This led to a novel
feature parameterisation which helps improve replay attack detection
DRONE DELIVERY OF CBNRECy – DEW WEAPONS Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD)
Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD) is our sixth textbook in a series covering the world of UASs and UUVs. Our textbook takes on a whole new purview for UAS / CUAS/ UUV (drones) – how they can be used to deploy Weapons of Mass Destruction and Deception against CBRNE and civilian targets of opportunity. We are concerned with the future use of these inexpensive devices and their availability to maleficent actors. Our work suggests that UASs in air and underwater UUVs will be the future of military and civilian terrorist operations. UAS / UUVs can deliver a huge punch for a low investment and minimize human casualties.https://newprairiepress.org/ebooks/1046/thumbnail.jp
Sea Mines and Countermeasures: A Bibliography
This compilation was prepared for the Dudley Knox Library, Naval Postgraduate School, Monterey, CA
- …