Security
The optical chaos communication (OCC) can provide physical layer security for high-speed data transmission. In these OCC systems, the time delay signature (TDS) serves as a crucial encryption key. We propose a method based on reservoir computing (RC) network for TDS extraction of OCC systems. The mapping relationship between the system output time series and its delay variants is learned by the RC network. Then, the convergence performance of the RC network is measured and used for TDS extraction. The effectiveness is verified by extracting TDS of the two main types of optical time-delay fe
- Categories:
The optical chaos communication (OCC) can provide physical layer security for high-speed data transmission. In these OCC systems, the time delay signature (TDS) serves as a crucial encryption key. We propose a method based on reservoir computing (RC) network for TDS extraction of OCC systems. The mapping relationship between the system output time series and its delay variants is learned by the RC network. Then, the convergence performance of the RC network is measured and used for TDS extraction. The effectiveness is verified by extracting TDS of the two main types of optical time-delay fe
- Categories:
The optical chaos communication (OCC) can provide physical layer security for high-speed data transmission. In these OCC systems, the time delay signature (TDS) serves as a crucial encryption key. We propose a method based on reservoir computing (RC) network for TDS extraction of OCC systems. The mapping relationship between the system output time series and its delay variants is learned by the RC network. Then, the convergence performance of the RC network is measured and used for TDS extraction. The effectiveness is verified by extracting TDS of the two main types of optical time-delay fe
- Categories:
Human facial data hold tremendous potential to address a variety of classification problems, including face recognition, age estimation, gender identification, emotion analysis, and race classification. However, recent privacy regulations, such as the EU General Data Protection Regulation, have restricted the ways in which human images may be collected and used for research.
- Categories:
Dynamic malicious software detection aims to assess whether executable programs exhibit malicious behavior by thoroughly studying and analyzing their dynamic features. However, many current methodologies insufficiently explore the semantic features of API sequences and instead rely more on mining parameter information during API call processes to enhance detection performance. This leads to issues such as excessive dependence on prior knowledge, larger model parameter sizes, and higher computational complexities.
- Categories:
The Illinois 200-Bus Cyber-Physical System (CPS) serves as an important case for studying risk analysis through the integration of physical and cyber components. This system designed to reflect real-world architectures. Access Complexity scores are assigned to its network edges based on the Common Vulnerability Scoring System (CVSS) Access Complexity (AC), allowing for the simulation of adversarial pathways within the system.
- Categories:
Traditional authentication models are vulnerable to security breaches when personal data is exposed. This study introduces novel hybrid visual stimuli protocols integrating event-related potentials (ERP) and steady-state visually evoked potentials (SSVEP) to develop an authentication system that enhances both performance and personalization in neural interfaces. Our model utilizes distinctive neural patterns elicited by a range of visual stimuli based on 4-digit numbers, such as familiar numbers (personal birthdates, excluding targets), standard targets, and non-targets.
- Categories:
A real world radio frequency fingerprinting (RFF) dataset for enhancement strategy by exploiting the physical unclonable function (PUF) to tune the RF hardware impairments in a unique and secure manner, which is exemplified by taking power amplifiers (PAs) in RF chains as an example. This is achieved by intentionally and slightly tuning the PA non-linearity characteristics using the active load-pulling technique. The dataset is collected from the cable-connected measurement and over-the-air measurement.
- Categories:
This dataset presents real-world IoT device traffic captured under a scenario termed "Active," reflecting typical usage patterns encountered by everyday users. Our methodology emphasizes the collection of authentic data, employing rigorous testing and system evaluations to ensure fidelity to real-world conditions while minimizing noise and irrelevant capture.
- Categories:
The Army Cyber Institute (ACI) Internet of Things (IoT) Network Traffic Dataset 2023 (ACI-IoT-2023) is a novel dataset tailored for machine learning (ML) applications in the realm of IoT network security. This effort focuses on delivering a distinctive and realistic dataset designed to train and evaluate ML models for IoT network environments. By addressing a gap in existing resources, this dataset aims to propel advancements in ML-based solutions, ultimately fortifying the security of IoT operations.
- Categories: