Malicious Intent

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 1836 Experts worldwide ranked by ideXlab platform

Honggang Wang - One of the best experts on this subject based on the ideXlab platform.

  • Toward trustworthy vehicular social networks
    IEEE Communications Magazine, 2015
    Co-Authors: Qing Yang, Honggang Wang
    Abstract:

    Wireless vehicular networks offer the promise of connectivity to vehicles that could provide a myriad of safety and driving-enhancing services to drivers and passengers. With wireless technology available in each car, it is expected that huge amounts of information will be exchanged between vehicles or between vehicles and roadside infrastructure. Due to defective sensors, software viruses, or even Malicious Intent, legitimate vehicles might inject untrustworthy information into the network. Besides relying on the public key infrastructure, this article proposes a social network approach to study trustworthy information sharing in a vehicular network. We first cover recent research progress in measuring direct trust and modeling indirect trust in online social networks, and then discuss how to apply them to vehicular social networks despite several pressing research challenges.

Qing Yang - One of the best experts on this subject based on the ideXlab platform.

  • Toward trustworthy vehicular social networks
    IEEE Communications Magazine, 2015
    Co-Authors: Qing Yang, Honggang Wang
    Abstract:

    Wireless vehicular networks offer the promise of connectivity to vehicles that could provide a myriad of safety and driving-enhancing services to drivers and passengers. With wireless technology available in each car, it is expected that huge amounts of information will be exchanged between vehicles or between vehicles and roadside infrastructure. Due to defective sensors, software viruses, or even Malicious Intent, legitimate vehicles might inject untrustworthy information into the network. Besides relying on the public key infrastructure, this article proposes a social network approach to study trustworthy information sharing in a vehicular network. We first cover recent research progress in measuring direct trust and modeling indirect trust in online social networks, and then discuss how to apply them to vehicular social networks despite several pressing research challenges.

Suman Banerjee - One of the best experts on this subject based on the ideXlab platform.

  • Towards Secure Localization Using Wireless "Congruity'
    Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007
    Co-Authors: Arunesh Mishra, Shravan Rayanchu, Ashutosh Shukla, Suman Banerjee
    Abstract:

    Traditional methods for localization in wireless networks rely on the correlation of the received signal strength with physical distance. It is also well known, that these mechanisms fail in an adversarial setting due to the lack of robustness of the signal strength property to Malicious Intent. In this paper, we present a property of the wireless medium, which we call "wireless congruity', that captures the relative similarities in wireless media characteristics (such as packet receptions, idle channel time, etc.) as observed by two receivers that are in physical proximity of each other. We show that wireless congruity holds promise for secure localization by presenting an initial yet encouraging set of results obtained through extensive experimentation in a rich indoor wireless environment.

  • HotMobile - Towards Secure Localization Using Wireless "Congruity'
    Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007
    Co-Authors: Arunesh Mishra, Shravan Rayanchu, Ashutosh Shukla, Suman Banerjee
    Abstract:

    Traditional methods for localization in wireless networks rely on the correlation of the received signal strength with physical distance. It is also well known, that these mechanisms fail in an adversarial setting due to the lack of robustness of the signal strength property to Malicious Intent. In this paper, we present a property of the wireless medium, which we call "wireless congruity', that captures the relative similarities in wireless media characteristics (such as packet receptions, idle channel time, etc.) as observed by two receivers that are in physical proximity of each other. We show that wireless congruity holds promise for secure localization by presenting an initial yet encouraging set of results obtained through extensive experimentation in a rich indoor wireless environment.

Gabriel C. Birch - One of the best experts on this subject based on the ideXlab platform.

  • ICCST - Counter Unmanned Aerial System Security Education
    2018 International Carnahan Conference on Security Technology (ICCST), 2018
    Co-Authors: Jaclynn J. Stubbs, Camron G. Kouhestani, Gabriel C. Birch
    Abstract:

    Unmanned aircraft system (UAS) technologies have gained immense popularity in the commercial sector and have enabled capabilities that were not available just a short time ago. Once limited to the domain of highly skilled hobbyists or precision military instruments, consumer UAS are now widespread due to increased computational power, manufacturing techniques, and numerous commercial applications. The rise of consumer UAS and the low barrier to entry necessary to utilize these systems provides an increased potential for using a UAS as a delivery platform for Malicious Intent. This creates a new security concern which must be addressed. The contribution presented in this work is the realization of counter UAS security technology concepts viewed through the traditional security framework and the associated challenges to such a framework.

  • Counter Unmanned Aerial System Security Education
    2018 International Carnahan Conference on Security Technology (ICCST), 2018
    Co-Authors: Jaclynn J. Stubbs, Camron G. Kouhestani, Gabriel C. Birch
    Abstract:

    Unmanned aircraft system (UAS) technologies have gained immense popularity in the commercial sector and have enabled capabilities that were not available just a short time ago. Once limited to the domain of highly skilled hobbyists or precision military instruments, consumer UAS are now widespread due to increased computational power, manufacturing techniques, and numerous commercial applications. The rise of consumer UAS and the low barrier to entry necessary to utilize these systems provides an increased potential for using a UAS as a delivery platform for Malicious Intent. This creates a new security concern which must be addressed. The contribution presented in this work is the realization of counter UAS security technology concepts viewed through the traditional security framework and the associated challenges to such a framework.

Yuki Sawa - One of the best experts on this subject based on the ideXlab platform.

  • ICSC - Detecting Phishing Attacks Using Natural Language Processing and Machine Learning
    2018 IEEE 12th International Conference on Semantic Computing (ICSC), 2020
    Co-Authors: Tianrui Peng, Ian G. Harris, Yuki Sawa
    Abstract:

    Phishing attacks are one of the most common and least defended security threats today. We present an approach which uses natural language processing techniques to analyze text and detect inappropriate statements which are indicative of phishing attacks. Our approach is novel compared to previous work because it focuses on the natural language text contained in the attack, performing semantic analysis of the text to detect Malicious Intent. To demonstrate the effectiveness of our approach, we have evaluated it using a large benchmark set of phishing emails.

  • Detecting Phishing Attacks Using Natural Language Processing and Machine Learning
    2018 IEEE 12th International Conference on Semantic Computing (ICSC), 2018
    Co-Authors: Tianrui Peng, Ian Harris, Yuki Sawa
    Abstract:

    Phishing attacks are one of the most common and least defended security threats today. We present an approach which uses natural language processing techniques to analyze text and detect inappropriate statements which are indicative of phishing attacks. Our approach is novel compared to previous work because it focuses on the natural language text contained in the attack, performing semantic analysis of the text to detect Malicious Intent. To demonstrate the effectiveness of our approach, we have evaluated it using a large benchmark set of phishing emails.