A review of security issues and solutions for precision health in Internet-of-Medical-Things systems
Precision medicine provides a holistic perspective of an individual's health, including
genetic, environmental, and lifestyle aspects to realize individualized therapy. The …
genetic, environmental, and lifestyle aspects to realize individualized therapy. The …
Heat transfer-inspired network for image super-resolution reconstruction
Image super-resolution (SR) is a critical image preprocessing task for many applications.
How to recover features as accurately as possible is the focus of SR algorithms. Most …
How to recover features as accurately as possible is the focus of SR algorithms. Most …
A Survey on Acoustic Side Channel Attacks on Keyboards
A Taheritajar, ZM Harris, R Rahaeimehr - arXiv preprint arXiv:2309.11012, 2023 - arxiv.org
In today's digital world, protecting personal and sensitive information is crucial. A new threat
has emerged called acoustic side-channel attacks on keyboards, which exploit unintentional …
has emerged called acoustic side-channel attacks on keyboards, which exploit unintentional …
Application of an autonomous object behavior model to classify the cybersecurity state
VV Semenov, IS Lebedev, ME Sukhoparov… - … Conference on Next …, 2019 - Springer
This paper considers the issues of ensuring the cybersecurity of autonomous objects.
Prerequisites that determine the application of additional independent methods for …
Prerequisites that determine the application of additional independent methods for …
Behavioral acoustic emanations: Attack and verification of pin entry using keypress sounds
This paper explores the security vulnerability of Personal Identification Number (PIN) or
numeric passwords. Entry Device (PEDs) that use small strings of data (PINs, keys or …
numeric passwords. Entry Device (PEDs) that use small strings of data (PINs, keys or …
Keypad entry inference with sensor fusion from mobile and smart wearables
Y Liu, UM Qureshi, GP Hancke - Computers & Security, 2022 - Elsevier
This paper investigates the threat of password leakage from sensors on mobile phones and
smart wearables. We investigate attack methods for recovering a short random number …
smart wearables. We investigate attack methods for recovering a short random number …
Processing of signal information in problems of monitoring information security of unmanned autonomous objects
VV Semenov, IS Lebedev - Nauchno-Tekhnicheskii Vestnik …, 2019 - search.proquest.com
Abstract Subject of Research. We consider problematic issues of ensuring the information
security of autonomous unmanned objects. Prerequisites are revealed that determine the …
security of autonomous unmanned objects. Prerequisites are revealed that determine the …
Short-range audio channels security: Survey of mechanisms, applications, and research challenges
M Caprolu, S Sciancalepore… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Short-range audio channels have appealing distinguishing characteristics: ease of use, low
deployment costs, and easy to tune frequencies, to cite a few. Moreover, thanks to their …
deployment costs, and easy to tune frequencies, to cite a few. Moreover, thanks to their …
Выявление аномального функционирования устройств индустрии 4.0 на основе поведенческих паттернов
МЕ Сухопаров, ВВ Семенов… - Проблемы …, 2020 - elibrary.ru
Исследуется задача выявления аномального функционирования устройств
«Индустрии 4.0» на основе поведенческих паттернов, использующих информацию …
«Индустрии 4.0» на основе поведенческих паттернов, использующих информацию …
ArmSpy: Video-assisted PIN Inference Leveraging Keystroke-induced Arm Posture Changes
PIN inference attack leveraging keystroke-induced side-channel information poses a
substantial threat to the security of people's privacy and properties. Among various PIN …
substantial threat to the security of people's privacy and properties. Among various PIN …