[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Stone et al., 2012 - Google Patents

Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure

Stone et al., 2012

Document ID
16194867317872659636
Author
Stone S
Temple M
Publication year
Publication venue
International Journal of Critical Infrastructure Protection

External Links

Snippet

Advances in the processing power and efficiency of computers have led to the proliferation of information technology (IT) systems in nearly every aspect of our daily lives. The pervasiveness and reliance on IT systems, however, have increased the susceptibility to …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0723Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0701Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for power management
    • G06K19/0702Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for power management the arrangement including a battery

Similar Documents

Publication Publication Date Title
Stone et al. Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure
Liu et al. Zero-bias deep learning for accurate identification of Internet-of-Things (IoT) devices
Stone et al. Detecting anomalous programmable logic controller behavior using rf-based hilbert transform features and a correlation-based verification process
Alotaibi et al. A stacked deep learning approach for IoT cyberattack detection
Kuyama et al. Method for detecting a malicious domain by using whois and dns features
Patil et al. Network traffic anomaly detection using PCA and BiGAN
Mustafa et al. Multitask learning for security and privacy in IoV (Internet of Vehicles)
Guo et al. Survey of mobile device authentication methods based on RF fingerprint
Veena et al. C SVM classification and KNN techniques for cyber crime detection
Chen et al. Fiden: Intelligent fingerprint learning for attacker identification in the industrial Internet of Things
US20230164180A1 (en) Phishing detection methods and systems
Dinesh et al. Identification of phishing attacks using machine learning algorithm
Zhao et al. Explanation-guided backdoor attacks on model-agnostic rf fingerprinting
Budžys et al. Deep learning-based authentication for insider threat detection in critical infrastructure
Lee et al. Offensive Security of Keyboard Data Using Machine Learning for Password Authentication in IoT
Hamid et al. Android malware classification using K-means clustering algorithm
Marco Facial Recognition Authentication Adds an Extra Layer of Security to Mobile Banking Systems
Ali et al. Detecting Conventional and Adversarial Attacks Using Deep Learning Techniques: A Systematic Review
Abdulla et al. The Era of Internet of Things: Towards better security using machine learning
Vyas et al. Intrusion detection systems: a modern investigation
Conti et al. Biometric sensors rapid prototyping on field-programmable gate arrays
US11457042B1 (en) Multi-tiered system for detecting and reducing unauthorized network access
Bentahar et al. Biometric cryptosystem scheme for Internet of Things using fuzzy commitment principle
Qiu et al. A Physical Fingerprint-Based Intrusion Detection and Localization in Fieldbus Network
Yadav et al. Website security for detection and prevention of attacks