Academic literature on the topic 'Data Tampering'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data Tampering.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data Tampering"
Greenberg, J. "Researcher Admits Tampering with Data." Science News 130, no. 22 (1986): 340. http://dx.doi.org/10.2307/3971179.
Full textKak, Subhash C. "How to detect tampering of data." Information Processing Letters 20, no. 2 (1985): 109–10. http://dx.doi.org/10.1016/0020-0190(85)90074-2.
Full textJOHNSTON, ROGER G., MICHAEL J. TIMMONS, and JON S. WARNER. "Protecting Nuclear Safeguards Monitoring Data from Tampering." Science & Global Security 15, no. 3 (2007): 185–209. http://dx.doi.org/10.1080/08929880701715076.
Full textNiu, Dongmei, Hongxia Wang, Minquan Cheng, and Canghong Shi. "Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction." Security and Communication Networks 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/2516324.
Full textHuang, Da-Wen, Wanping Liu, and Jichao Bi. "Data tampering attacks diagnosis in dynamic wireless sensor networks." Computer Communications 172 (April 2021): 84–92. http://dx.doi.org/10.1016/j.comcom.2021.03.007.
Full textSari, Dewi Yunita. "ALGORITMA K-MEANS UNTUK MENDETEKSI FRAME PADA VIDEO ASLI DAN VIDEO TAMPERING." TEKNOKOM 3, no. 1 (2020): 17–21. http://dx.doi.org/10.31943/teknokom.v3i1.44.
Full textPutra Justicia, Amirul. "Analysis of Forensic Video in Storage Data Using Tampering Method." International Journal of Cyber-Security and Digital Forensics 7, no. 3 (2018): 328–35. http://dx.doi.org/10.17781/p002471.
Full textSinharay, Sandip, and Matthew S. Johnson. "Three New Methods for Analysis of Answer Changes." Educational and Psychological Measurement 77, no. 1 (2016): 54–81. http://dx.doi.org/10.1177/0013164416632287.
Full textBalsamo, Duilio, Paolo Bajardi, Alberto Salomone, and Rossano Schifanella. "Patterns of Routes of Administration and Drug Tampering for Nonmedical Opioid Consumption: Data Mining and Content Analysis of Reddit Discussions." Journal of Medical Internet Research 23, no. 1 (2021): e21212. http://dx.doi.org/10.2196/21212.
Full textM. Buddhika Harshanath, S. "Privacy and Security Data-sharing Technologies for Tampering Protection and Detection." IEIE Transactions on Smart Processing & Computing 8, no. 1 (2019): 43–48. http://dx.doi.org/10.5573/ieiespc.2019.8.1.043.
Full textDissertations / Theses on the topic "Data Tampering"
Arapantonis, Elpidoforos. "Data tampering in Vehicle CAN Bus networks." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-76776.
Full textPATTA, SIVA VENKATA PRASAD. "Intelligent Decision Support Systems for Compliance Options : A Systematic Literature Review and Simulation." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18449.
Full textBall, Jr Maynard Marshall. "On Resilience to Computable Tampering." Thesis, 2021. https://doi.org/10.7916/d8-debr-bw49.
Full text"A robust anti-tampering scheme for software piracy protection." 2011. http://library.cuhk.edu.hk/record=b5894617.
Full textLai, Pao-Hsun, and 賴保勳. "Novel Techniques of Data Hiding in HTML Documents for Copyright Protection, Tampering Detection, and Covert Communication." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/26333362318610672051.
Full textSun, He-Nan, and 孫赫男. "A new reliable Thevenin parameter esitmation method of power grids to resist phasor measurement data tampering and measure the error stochastically." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/xx844c.
Full textBook chapters on the topic "Data Tampering"
Alberti, Michele, Vinaychandran Pondenkandath, Marcel Würsch, et al. "Are You Tampering with My Data?" In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11012-3_25.
Full textAsaad, Aras, and Sabah Jassim. "Topological Data Analysis for Image Tampering Detection." In Digital Forensics and Watermarking. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64185-0_11.
Full textLiu, Qingzhong, Andrew H. Sung, Zhongxue Chen, and Lei Chen. "Exposing Image Tampering with the Same Quantization Matrix." In Multimedia Data Mining and Analytics. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-14998-1_15.
Full textKar, Diptendu Mohan, and Indrajit Ray. "That’s My DNA: Detecting Malicious Tampering of Synthesized DNA." In Data and Applications Security and Privacy XXXIII. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22479-0_4.
Full textSaeed, Fatek, and Anurag Dixit. "Hybrid HSW Based Zero Watermarking for Tampering Detection of Text Contents." In Lecture Notes on Data Engineering and Communications Technologies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24643-3_96.
Full textIqbal, Mubashar, and Raimundas Matulevičius. "Comparison of Blockchain-Based Solutions to Mitigate Data Tampering Security Risk." In Business Process Management: Blockchain and Central and Eastern Europe Forum. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30429-4_2.
Full textSun, Shengjie, Yabin Xu, and Zhuang Wu. "Research on Tampering Detection of Material Gene Data Based on Fragile Watermarking." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8083-3_20.
Full textShen, Yi, and Lu Zhang. "Anti-tampering Monitoring Method of Network Sensitive Information Based on Big Data Analysis." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36405-2_9.
Full textWild, Stefan, Fabian Wiedemann, Sebastian Heil, Alexey Tschudnowsky, and Martin Gaedke. "ProProtect3: An Approach for Protecting User Profile Data from Disclosure, Tampering, and Improper Use in the Context of WebID." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46562-2_4.
Full textMa, Qiang, Wenting Wang, Ti Guan, Yong Liu, and Lin Lin. "Modbus Protocol Based on the Characteristics of the Transmission of Industrial Data Packet Forgery Tampering and Industrial Security Products Testing." In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9714-1_37.
Full textConference papers on the topic "Data Tampering"
Shrivastava, Rajesh Kumar, Sanket Mishra, V. E. Archana, and Chittaranjan Hota. "Preventing data tampering in IoT networks." In 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, 2019. http://dx.doi.org/10.1109/ants47819.2019.9117939.
Full textYu, Lu, Juan Deng, Richard R. Brooks, and Seok Bae Yun. "Automobile ECU Design to Avoid Data Tampering." In CISR '15: 10th Annual Cyber and Information Security Research Conference. ACM, 2015. http://dx.doi.org/10.1145/2746266.2746276.
Full textZhao, Lianying, and Mohammad Mannan. "TEE-aided Write Protection Against Privileged Data Tampering." In Network and Distributed System Security Symposium. Internet Society, 2019. http://dx.doi.org/10.14722/ndss.2019.23197.
Full textPei, Jianhua, Jingyu Wang, and Dongyuan Shi. "Data-Driven Measurement Tampering Detection Considering Spatial-Temporal Correlations." In 2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2). IEEE, 2019. http://dx.doi.org/10.1109/ei247390.2019.9061946.
Full textTetteh, Reginald, and Samah Mohamed Saeed. "Analysis of Test Data Tampering Attack on Manufacturing Testing." In 2020 15th Design & Technology of Integrated Systems in Nanoscale Era (DTIS). IEEE, 2020. http://dx.doi.org/10.1109/dtis48698.2020.9081029.
Full textRashid, Anum, Muhammad Naveed Aman, Mukhtar Ullah, and Biplab Sikdar. "Detecting Data Tampering In Synchrophasors Using Power Flow Entropy." In 2018 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia). IEEE, 2018. http://dx.doi.org/10.1109/isgt-asia.2018.8467959.
Full textWang, Ren. "Iterative Encryption Method of Transmission Data Anti-Tampering Based on Big Data." In 2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS). IEEE, 2019. http://dx.doi.org/10.1109/icvris.2019.00036.
Full textRao, Praveen, Srini Bhagavan, and Laurent Njilla. "A new tool for detecting tampering of big data programs." In Cyber Sensing 2020, edited by Peter Chin and Igor V. Ternovskiy. SPIE, 2020. http://dx.doi.org/10.1117/12.2564693.
Full textMercier, Hugues, Maxime Augier, and Arjen K. Lenstra. "STEP-archival: Storage integrity and anti-tampering using data entanglement." In 2015 IEEE International Symposium on Information Theory (ISIT). IEEE, 2015. http://dx.doi.org/10.1109/isit.2015.7282724.
Full textAman, Muhammad Naveed, Kashif Javed, Biplab Sikdar, and Kee Chaing Chua. "Detecting data tampering attacks in synchrophasor networks using time hopping." In 2016 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, 2016. http://dx.doi.org/10.1109/isgteurope.2016.7856326.
Full text