Search results for: SIDE CHANNEL ATTACK - Bridge of Knowledge

Search

Search results for: SIDE CHANNEL ATTACK

Filters

total: 1367
filtered: 867

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: SIDE CHANNEL ATTACK

  • Estimating the uncertainty of discharge coefficient predicted for oblique side weir using Monte Carlo method

    Publication

    Side weir is a hydraulic structure, which is used in irrigation systems to divert some water from main to side channel. It is installed at the entrance of the side channel to control and measure passing water into the side channel. Many studies provided side weir water surface profile and coefficient of discharge to measure water discharge diverted into the side channel. These studies dealt with different side weir shapes (rectangular,...

    Full text available to download

  • Fake VIP Attacks and Their Mitigation via Double-Blind Reputation

    Publication

    - Year 2017

    In a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...

    Full text available to download

  • Radio Channel Measurements in Off-Body Communications in a Ferry Passenger Cabin

    Publication

    - Year 2017

    This paper presents an off-body radio channel measurements in a ferry passenger cabin at 2.45 GHz band, for static sleeping scenarios with different body orientation and on-body antennas placements, and also for upper and lower sleeping berths. The measurements have been performed with two types of on-body wearable receiving antennas: FlexPIFA (flexible planar inverted F antenna), and FlexNotch (flexible adhesive-backed notch antenna)...

  • Power equalization of AES FPGA implementation

    This paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis(DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorialcircuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) deviceusing the standard and power-equalized methods....

    Full text available to download

  • Diver Observations by Means of Acoustic Methods

    Publication

    Searching for objects, especially small ones, moving under water near its the free surface, is always not an easy task. Designing tools for the detection of such targets is a real challenge when the possibility of a terrorist attack is a real threat. This paper presents some aspects of diver detection by means of acoustics methods, both active (side scan sonar) and passive ones (linear receiving antenna). This approach is quite...

    Full text available to download

  • Device for spoofing in global positioning system

    This article describes the device which may be used to generate false GPS signals and emit them into radio communication channel. Such attack is called GPS spoofing. Each GPS receiver which remains in the range of a spoofing device (called spoofer) indicates time and position coordinates which are predetermined by the spoofer’s operator. Spoofing may be used e.g. in order to disable the terrorist group from obtaining correct navigation...

    Full text to download in external service

  • Effect of asymmetric fluid flow distribution on flow boiling in a microchannel heat sink – An experimental investigation

    Publication

    - APPLIED THERMAL ENGINEERING - Year 2022

    Flow boiling in microchannels is emerging as an exclusive cooling solution for miniaturized high-power electronic devices alongside having other high heat flux applications. Size miniaturization at microscale strangely increases heat transfer performance as well as flow boiling instabilities. Many flow boiling instabilities are interrelated and result from imperfect hydrodynamic conditions. One of such problems is flow maldistribution among...

    Full text to download in external service

  • Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks

    Publication

    Quality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...

    Full text available to download

  • Prediction of coking dynamics for wet coal charge

    Publication

    - Chemical and Process Engineering-Inżynieria Chemiczna i Procesowa - Year 2015

    A one-dimensional transient mathematical model describing thermal and flow phenomena during coal coking in an oven chamber was studied in the paper. It also accounts for heat conduction in the ceramic oven wall when assuming a constant temperature at the heating channel side. The model was solved numerically using partly implicit methods for gas flow and heat transfer problems. The histories of temperature, gas evolution and internal...

    Full text available to download

  • Adversarial attack algorithm for traffic sign recognition

    Publication

    - MULTIMEDIA TOOLS AND APPLICATIONS - Year 2022

    Deep learning suffers from the threat of adversarial attacks, and its defense methods have become a research hotspot. In all applications of deep learning, intelligent driving is an important and promising one, facing serious threat of adversarial attack in the meanwhile. To address the adversarial attack, this paper takes the traffic sign recognition as a typical object, for it is the core function of intelligent driving. Considering...

    Full text to download in external service

  • Heat exchange enhancement of jet impingement cooling with the novel humped-cone heat sink

    Publication

    - Case Studies in Thermal Engineering - Year 2021

    Jet impingement cooling technology is applicable to control temperature of devices, where very high heat flux is generated within a small area. This paper is about the improvement of the jet impingement cooling efficiency by the heat sink geometry modification. Two reference cases were sourced from the literature – flat heat sink and modified one with cone in the jet stagnation region. Such a change improves cooling capability...

    Full text available to download

  • Client-side versus server-side geographic data processing performance comparison: Data and code

    Publication

    - Data in Brief - Year 2019

    The data and code presented in this article are related to the research article entitled “Analysis of Server-side and Client-side Web-GIS data processing methods on the example of JTS and JSTS using open data from OSM and Geoportal” (Kulawiak et al., 2019). The provided 12 datasets include multi-point and multi-polygon data of different scales and volumes, representing real-world geographic features. The datasets cover the area...

    Full text available to download

  • The Boltzmann sequence-structure channel

    Publication

    - Year 2016

    We rigorously study a channel that maps binary sequences to self-avoiding walks in the two-dimensional grid, inspired by a model of protein statistics. This channel, which we also call the Boltzmann sequence-structure channel, is characterized by a Boltzmann/Gibbs distribution with a free parameter corresponding to temperature. In our previous work, we verified experimentally that the channel capacity has a phase transition for...

    Full text to download in external service

  • Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange

    This paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...

  • Stability of trusses with linear elastic side-supports

    Publication

    The present research is devoted to study of a lateral buckling of truss with linear elastic side supports. The elastic support reaction in relation to force in compressed chord and coefficient of buckling length related to side support distance are also calculated. The effect of slope of side support on limit force is also considered. The nonlinear analysis of two roof trusses are carried out. The results are compared to design...

  • High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks

    Publication
    • G. Savva
    • K. Manousakis
    • J. Rak
    • I. Tomkos
    • G. Ellinas

    - IEEE Access - Year 2021

    This work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...

    Full text available to download

  • Performance of the Direct Sequence Spread Spectrum Underwater Acoustic Communication System with Differential Detection in Strong Multipath Propagation Conditions

    The underwater acoustic communication (UAC) operating in very shallow-water should ensure reliable transmission in conditions of strong multipath propagation, significantly disturbing the received signal. One of the techniques to achieve this goal is the direct sequence spread spectrum (DSSS) technique, which consists in binary phase shift keying (BPSK) according to a pseudo-random spreading sequence. This paper describes the DSSS...

    Full text available to download

  • Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network

    Publication

    - Year 2017

    In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...

    Full text available to download

  • Phase Transition in a Sequence-Structure Channel

    Publication

    - Year 2015

    We study an interesting channel which maps binary sequences to self-avoiding walks in the two-dimensional grid, inspired by a model of protein folding from statistical physics. The channel is characterized by a Boltzmann/Gibbs distribution with a free parameter corresponding to temperature. We estimate the conditional entropy between the input sequence and the output fold, giving an upper bound which exhibits an unusual phase transition...

    Full text to download in external service

  • Deep learning techniques for biometric security: A systematic review of presentation attack detection systems

    Publication

    - ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE - Year 2024

    Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...

    Full text to download in external service

  • A simplified channel estimation procedure for NB-IoT downlink

    Publication

    - Year 2024

    This paper presents a low-complexity channel estimation procedure which is suitable for use in energy-efficient NB-IoT user equipment devices. The procedure is based on the well-established least squares scheme, followed by linear interpolation in the time domain and averaging in the frequency domain. The quality of channel estimation vs. signal-to-noise ratio is evaluated for two channel models and compared with the performance...

    Full text to download in external service

  • A simple test for quantum channel capacity

    Publication

    Based on state and channel isomorphism we point out that semidefiniteprogramming can be used as a quick test for nonzero one-way quantum channelcapacity. This can be achieved by searching for symmetric extensions of statesisomorphic to a given quantum channel. With this method we provide examplesof quantum channels that can lead to high entanglement transmission but stillhave zero one-way capacity, in particular, regions of symmetric...

    Full text to download in external service

  • A Simplistic Downlink Channel Estimation Method for NB-IoT

    Publication

    This paper presents a downlink channel estimation method intended for a Narrowband Internet of Things (NB-IoT) access link. Due to its low computational complexity, this method is well suited for energy-efficient IoT devices, still providing acceptable reception quality in terms of signal-to-noise (SNR) performance. This paper describes the physical layer of NB-IoT within the scope of channel estimation, and also reviews existing...

    Full text available to download

  • On the Characteristic Graph of a Discrete Symmetric Channel

    We present some characterizations of characteristic graphs of row and/or column symmetric channels. We also give a polynomial-time algorithm that decides whether there exists a discrete symmetric channel whose characteristic graph is equal to a given input graph. In addition, we show several applications of our results.

    Full text to download in external service

  • Monitoring of single-side lap grinding with electroplated tools

    Publication

    - Year 2018

    The results presented in the paper show that utilising microphones as audible sound sensors is a suitable approach for monitoring a single-side lap grinding process due to the low levels of noise generated by the drives of a machine tool. The results confirm that sound signal analysis is a feasible and relatively simple method to monitor a lap grinding process with the use of an audible sound sensor. Proposed method can be used...

  • Local buckling of composite channel columns

    The investigation concerns local buckling of compressed flanges of axially compressed composite channel columns. Cooperation of the member flange and web is taken into account here. The buckling mode of the member flange is defined by rotation angle a flange about the line of its connection with the web. The channel column under investigation is made of unidirectional fibre-reinforced laminate. Two approaches to member orthotropic...

    Full text available to download

  • The Imaging of Gdansk Bay Seabed by Using Side Sonar

    This paper is mainly aimed at presentation of an impact of environmental conditions on imaging accuracy by using hydro-acoustic systems in waters of a high non-uniformity of spatial distribution of hydrological parameters. Impact of refraction on erroneous estimation of range, in case of wave radiation into water under a large angle, like in side sonars or multi-beam echo-sounders, is especially important. In this paper seasonal...

    Full text available to download

  • Estimation of Coherence Bandwidth for Underwater Acoustic Communication Channel

    Publication

    A shallow underwater acoustic communication channel is characterized by strong multipath propagation. The signal reaching the receiver consists of a direct waveform and a number of its delayed and suppressed replica. A significant time dispersion of the transmitted signal and selective fading of its spectrum are observed. Coherence bandwidth defines maximal bandwidth, wherein the channel amplitude characteristic remains constant...

    Full text to download in external service

  • Access to Side-On Bonded Tungsten Phosphanylphosphinidene Complexes

    Metathesis reactions between diimido complexes of tungsten(VI)[(ArN)2WCl2] (Ar = 2,6-iPr2C6H3) and lithium derivatives of diphosphanes R2P-P(SiMe3)Li (R = tBu and iPr) yield two anionic diimido complexes of tungsten with side-on bonded phosphanylphosphinidene ligands, [(ArN)2WCl(η2-R2P-P)]-. Both complexes are structurally characterized. A possible reaction mechanism and the role of donor solvents are discussed on the basis of...

    Full text to download in external service

  • Sensitivity analysis of critical forces of trusses with side bracing

    The present research is devoted to the study of out-of-plane buckling of trusses with elastic side bracing. Inthis paper, a sensitivity analysis of critical buckling loads of a truss due to bracing stiffness is carried out. A method based on the sensitivity analysis for the determination of the threshold bracing stiffness conditionfor full bracing of a truss is proposed. The influence lines of the unit change of the bracing stiffness...

    Full text to download in external service

  • Seafloor relief reconstruction from side scan sonar data

    Publication

    Side scan sonar is one of the most widely used imaging systems in the underwater environment. It is relatively cheap and easy to deploy, in comparison with more powerful sensors. Although side scan sonar does not provide seafloor bathymetry directly, its records are directly related to seafloor images. In the paper, the method for 3D seafloor relief reconstruction from side scan sonar data is presented. The method is based on the...

    Full text available to download

  • Limitations of WSSUS modeling of stationary underwater acoustic communication channel

    Publication

    - HYDROACOUSTICS - Year 2016

    Performances of underwater acoustic communication (UAC) systems are strongly related to specific propagation conditions of the underwater channel. Due to their large variability, there is a need for adaptive matching of the UAC systems signaling to the transmission properties of the channel. This requires a knowledge of instantaneous channel characteristics, in terms of the specific parameters of stochastic models. The wide-sense...

    Full text available to download

  • Stability of truss with side - supports. The case of linear and rotational elastic supports

    Publication

    - Year 2008

    The research is devoted to study lateral buckling of truss with linear and rotational elastic side-supports. Geometrically nonlinear analysis of example truss with linear and rotational elastic sidesupports is carried out. The limit normal force in compressed chord of the truss due to stiffness of side supports is calculated. The elastic support reaction in relation to force in compressed chordand coefficient of buckling length...

  • Characteristics of the polarised off-body channel in indoor environments

    Publication

    This paper addresses the depolarisation effect in off-body body area networks channels, based on measurements performed at 2.45 GHz in an indoor environment. Seven different scenarios, involving both static and dynamic users, were considered, taking a statistical perspective. The analysis of the cross-polarisation discrimination is performed, as well as the analysis of path loss in co- and cross-polarised channels. Results show...

    Full text available to download

  • Wideband Off-Body Channel Characteristics with Dynamic User

    Publication

    - Year 2019

    This paper presents the preliminary results of a dynamic off-body channel characterisation study, based on wideband measurements at 5.8 GHz in an indoor environment. The Channel Impulse Response (CIR) was measured for a scenario with the user approaching and departing from the off-body antenna. A CIR deconvolution procedure was performed jointly in two polarisations, and the received signal power, Cross-Polarisation Discrimination...

  • Steady magnetohydrodynamic flow in a diverging channel with suction or blowing

    Publication

    - ZEITSCHRIFT FUR ANGEWANDTE MATHEMATIK UND PHYSIK - Year 2013

    An analysis is made of steady two-dimensional divergent flow of an electrically conducting incompressible viscous fluid in a channel formed by two non-parallel walls, the flow being caused by a source of fluid volume at the intersection of the walls. The fluid is permeated by a magnetic field produced by an electric current along the line of intersection of the channel walls. The walls are porous and subjected to either suction...

    Full text to download in external service

  • Considerations of Adaptive Digital Communications in Underwater Acoustic Channel

    Publication

    Down-link communication (DLC) and air transportable communication (ATAC) buoys as well as autonomous underwater vehicles (AUV) use acoustic links for gathering oceanographic data from underwater monitoring systems. The underwater channel propagation conditions are diverse in nature and require a special adaptive approach to the communication system design. The article presents a methodology for the communication systems design,...

    Full text available to download

  • Don't forget the dark side of green transformation

    Publication

    - Year 2022

    Design/methodology/approach – The study is a continuation of the research by Durst and Zieba (2019) related to knowledge risks and their potential outcomes. This present study makes an update on the literature on knowledge risks and green transformation and describes knowledge risks that can be faced in this process. Originality/value – The paper offers new insights for researchers dealing with the topic of knowledge risks in...

    Full text to download in external service

  • A game-theoretic study of CSMA/CA under a backoff attack

    Analizowany jest rozdział pasma realizowany przez protokół CSMA/CA w obecności anonimowych stacji egoistycznych, atakujących wykładniczy mechanizm odczekania. Przy założeniu ruchu nasycającego sieć pokazuje się, że powstaje w ten sposób niekooperacyjna gra o strukturze wypłat wieloosobowego dylematu więźnia. Wykorzystując własności macierzy wypłat zaproponowano strategię dla odpowiedniej gry wieloetapowej, zapewniającą asymptotyczne...

  • Solvability of a Markovian model of an IEEE 802.11 LANunder a backoff attack

    Publication

    - Year 2005

    Przedstawiono ulepszony model jakościowy mechanizmu CSMA/CA dla bezprzewodowych sieci lokalnych z indywidualną konfiguracją okien rywalizacji. Sformułowano warunki dostateczne rozwiązywalności modelu oraz wykazano obecność bezwarunkowej motywacji do zmniejszania okien rywalizacji.

  • Performance of an ad-hoc 802.11 LAN under a backoff attack

    Publication

    - Year 2005

    Samowolna rekonfiguracja wartości okien rywalizacji w protokole MAC sieci bezprzewodowych 802.11 może prowadzić do niesprawiedliwego rozdziału dostępnego pasma transmisyjnego. Dla dużego obciążenia ruchowego sformułowano prosty model markowowski umożliwiający szybką symulację Monte Carlo dla oceny udziału w pasmie poszczególnych stacji sieci. Traktując otrzymane wielkości jako wypłaty w grze niekoalicyjnej przedstawiono niektóre...

  • Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features

    Publication

    - Year 2017

    Automatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...

    Full text to download in external service

  • Visualization of a lifeboat motion during lowering along ship’s side

    Publication

    This paper presents description of a computer program for motion visualization of a lifeboat lowered along ship’s side. The program is a post-processor which reads results of numerical calculations of simulated objects’ motions. The data is used to create scene composed of 3D surfaces to visualize mutual spatial positions of a lifeboat, ship’s side and water waving surface. Since the numerical data contain description of a simulation...

    Full text available to download

  • Assessment of the Accuracy of a Virtual Multi-Channel Temperature Measuring Instrument

    Publication

    The multi-channel temperature measurement system developed works with NTC thermistors. The article presents the results of theoretical and empirical evaluation of accuracy obtained in measurement channels. The basis for the theoretical assessment is the mathematical model for each of the measurement channels and the characteristics of the system elements included in the circuits of the measurement channel. Two different methods were...

    Full text available to download

  • Including the Dark Side of Entrepreneurship in the Entrepreneurship Education

    Publication

    Pursuing an entrepreneurial career is often rewarding in terms of both economic and psychological outcomes. However, becoming an entrepreneur also has its darker side that affects professional and personal life. Meanwhile, the positivity bias is prevalent in entrepreneurial education and research. It is recognized as emphasizing the advantages of becoming an entrepreneur and giving considerably less attention to potential downsides....

    Full text available to download

  • Interconnection of the Customer-Side Resources Using Single Phase VAPF

    Publication

    - Year 2007

    The paper introduces method for utilization of the customer-side generated energy using single phase voltage active power filter. Structure and control method of the power electronics converter has been described and some simulation results are shown to prove usefulness of this arrangements. Proposed application realizes the following functions: power quality improvement, uninterruptible supplying and energy costs reduction.

    Full text to download in external service

  • Characteristics of the Polarised Off-Body Channel in Indoor Environments

    Publication

    - Year 2016

    This paper addresses the depolarisation effect in off-body Body Area Networks channels, based on measurements performed at 2.45 GHz in an indoor environment. Seven different scenarios, involving both static and dynamic users, were considered, taking a statistical perspective. The analysis of the cross-polarisation discrimination is performed, as well as the analysis of path loss in co- and cross-polarised channels. Results show...

  • Measurement of transverse force with polarization-maintaining side-hole fibers.

    Publication

    - Year 2004

    W pracy badano możliwości wykorzystania przenoszących stan polaryzacji światłowodów typu Side-Hole do pomiaru siły działającej prostopadle do osi symetrii światłowodu. Na podstawie wyników modelowania stwierdzono, ze niektóre światłowody tego typu charakteryzują się większą czułością aniżeli standardowe światłowody przenoszące stan polaryzacji. W wyniku przeprowadzonych pomiarów potwierdzono wyniki modelowania.

  • Multi-Channel Virtual Instrument for Measuring Temperature—A Case Study

    Publication

    - Electronics - Year 2023

    The article presents the hardware and software configuration of the developed multi-channel temperature measurement system as well as calibration procedures and measurement results verifying the properties of measurement channels. The system has been developed and dedicated primarily for measuring the temperature distribution in a laboratory model simulating underground power lines. With the adopted configuration of the analog...

    Full text available to download

  • Receiver-side fingerprinting method based on quaternion sandwich product

    In this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...