Camera-based autonomous systems that emulate human perception are
increa...
The complexity of modern processor architectures has given rise to
sophi...
Industrial Control Systems (ICSs) rely on insecure protocols and devices...
In 2006, the OPC Foundation released the first specification for OPC Uni...
In recent years, a number of process-based anomaly detection schemes for...
The Bluetooth standard specifies two incompatible wireless transports:
B...
Modern Industrial Control Systems (ICSs) allow remote communication thro...
This document describes and analyzes a system for secure and
privacy-pre...
Recently, a number of deep learning-based anomaly detection algorithms w...
For years, attack graphs have been an important tool for security assess...
Internet of Things (IoT) devices have become ubiquitous and are spread a...
Recently, botnets such as Mirai and Persirai targeted IoT devices on a l...
Security experts have demonstrated numerous risks imposed by Internet of...