Stone et al., 2012 - Google Patents
Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructureStone et al., 2012
- Document ID
- 16194867317872659636
- Author
- Stone S
- Temple M
- Publication year
- Publication venue
- International Journal of Critical Infrastructure Protection
External Links
Snippet
Advances in the processing power and efficiency of computers have led to the proliferation of information technology (IT) systems in nearly every aspect of our daily lives. The pervasiveness and reliance on IT systems, however, have increased the susceptibility to …
- 238000001514 detection method 0 title abstract description 45
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
- G06K19/07309—Means for preventing undesired reading or writing from or onto record carriers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0701—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for power management
- G06K19/0702—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for power management the arrangement including a battery
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Stone et al. | Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure | |
Liu et al. | Zero-bias deep learning for accurate identification of Internet-of-Things (IoT) devices | |
Stone et al. | Detecting anomalous programmable logic controller behavior using rf-based hilbert transform features and a correlation-based verification process | |
Alotaibi et al. | A stacked deep learning approach for IoT cyberattack detection | |
Kuyama et al. | Method for detecting a malicious domain by using whois and dns features | |
Patil et al. | Network traffic anomaly detection using PCA and BiGAN | |
Mustafa et al. | Multitask learning for security and privacy in IoV (Internet of Vehicles) | |
Guo et al. | Survey of mobile device authentication methods based on RF fingerprint | |
Veena et al. | C SVM classification and KNN techniques for cyber crime detection | |
Chen et al. | Fiden: Intelligent fingerprint learning for attacker identification in the industrial Internet of Things | |
US20230164180A1 (en) | Phishing detection methods and systems | |
Dinesh et al. | Identification of phishing attacks using machine learning algorithm | |
Zhao et al. | Explanation-guided backdoor attacks on model-agnostic rf fingerprinting | |
Budžys et al. | Deep learning-based authentication for insider threat detection in critical infrastructure | |
Lee et al. | Offensive Security of Keyboard Data Using Machine Learning for Password Authentication in IoT | |
Hamid et al. | Android malware classification using K-means clustering algorithm | |
Marco | Facial Recognition Authentication Adds an Extra Layer of Security to Mobile Banking Systems | |
Ali et al. | Detecting Conventional and Adversarial Attacks Using Deep Learning Techniques: A Systematic Review | |
Abdulla et al. | The Era of Internet of Things: Towards better security using machine learning | |
Vyas et al. | Intrusion detection systems: a modern investigation | |
Conti et al. | Biometric sensors rapid prototyping on field-programmable gate arrays | |
US11457042B1 (en) | Multi-tiered system for detecting and reducing unauthorized network access | |
Bentahar et al. | Biometric cryptosystem scheme for Internet of Things using fuzzy commitment principle | |
Qiu et al. | A Physical Fingerprint-Based Intrusion Detection and Localization in Fieldbus Network | |
Yadav et al. | Website security for detection and prevention of attacks |