Ecu fingerprinting through parametric signal modeling and artificial neural networks for in-vehicle security against spoofing attacks
Fully connected autonomous vehicles are more vulnerable than ever to hacking and data
theft. The controller area network (CAN) protocol is used for communication between in …
theft. The controller area network (CAN) protocol is used for communication between in …
A prototype web application to support human-centered audiovisual content authentication and crowdsourcing
Media authentication relies on the detection of inconsistencies that may indicate malicious
editing in audio and video files. Traditionally, authentication processes are performed by …
editing in audio and video files. Traditionally, authentication processes are performed by …
State of the art survey on comparison of physical fingerprinting-based intrusion detection techniques for in-vehicle security
Controller area network (CAN) is used as a legacy protocol for in-vehicle communication.
However, it lacks basic security features such as message authentication, integrity …
However, it lacks basic security features such as message authentication, integrity …
Investigation of audio tampering in broadcast content
Audio content forgery detection in broadcasting is crucial to prevent misinformation
spreading. Tools for the authentication of audio files can be proven very useful, and several …
spreading. Tools for the authentication of audio files can be proven very useful, and several …
Exploiting frequency response for the identification of microphone using artificial neural networks
Microphone identification addresses the challenge of identifying the microphone signature
from the recorded signal. An audio recording system (consisting of microphone, A/D …
from the recorded signal. An audio recording system (consisting of microphone, A/D …
A robust, reliable and deployable framework for in-vehicle security
A Hafeez - 2020 - deepblue.lib.umich.edu
Cyber attacks on financial and government institutions, critical infrastructure, voting systems,
businesses, modern vehicles, etc., are on the rise. Fully connected autonomous vehicles are …
businesses, modern vehicles, etc., are on the rise. Fully connected autonomous vehicles are …
Audio-driven multimedia content authentication as a service
In the current paper, we present a framework for providing supervisory tools for multimedia
Content Authentication As A Service (CAAAS). A double compression method for …
Content Authentication As A Service (CAAAS). A double compression method for …