Academic literature on the topic 'Data Tampering'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data Tampering.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Data Tampering"

1

Greenberg, J. "Researcher Admits Tampering with Data." Science News 130, no. 22 (November 29, 1986): 340. http://dx.doi.org/10.2307/3971179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kak, Subhash C. "How to detect tampering of data." Information Processing Letters 20, no. 2 (February 1985): 109–10. http://dx.doi.org/10.1016/0020-0190(85)90074-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

JOHNSTON, ROGER G., MICHAEL J. TIMMONS, and JON S. WARNER. "Protecting Nuclear Safeguards Monitoring Data from Tampering." Science & Global Security 15, no. 3 (December 3, 2007): 185–209. http://dx.doi.org/10.1080/08929880701715076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Niu, Dongmei, Hongxia Wang, Minquan Cheng, and Canghong Shi. "Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction." Security and Communication Networks 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/2516324.

Full text
Abstract:
This paper presents a reference sharing mechanism-based self-embedding watermarking scheme. The host image is embedded with watermark bits including the reference data for content recovery and the authentication data for tampering location. The special encoding matrix derived from the generator matrix of selected systematic Maximum Distance Separable (MDS) code is adopted. The reference data is generated by encoding all the representative data of the original image blocks. On the receiver side, the tampered image blocks can be located by the authentication data. The reference data embedded in one image block can be shared by all the image blocks to restore the tampered content. The tampering coincidence problem can be avoided at the extreme. The maximal tampering rate is deduced theoretically. Experimental results show that, as long as the tampering rate is less than the maximal tampering rate, the content recovery is deterministic. The quality of recovered content does not decrease with the maximal tampering rate.
APA, Harvard, Vancouver, ISO, and other styles
5

Huang, Da-Wen, Wanping Liu, and Jichao Bi. "Data tampering attacks diagnosis in dynamic wireless sensor networks." Computer Communications 172 (April 2021): 84–92. http://dx.doi.org/10.1016/j.comcom.2021.03.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sari, Dewi Yunita. "ALGORITMA K-MEANS UNTUK MENDETEKSI FRAME PADA VIDEO ASLI DAN VIDEO TAMPERING." TEKNOKOM 3, no. 1 (April 19, 2020): 17–21. http://dx.doi.org/10.31943/teknokom.v3i1.44.

Full text
Abstract:
Sebuah video tersusun dari frame dalam jumlah yang banyak, Apabila terdapat frame-frame yang menunjukkan ketidakwajaran maka dapat disimpulkan bahwa file rekaman video tersebut telah mengalami tampering. Video yang telah mengalami tampering mengalami perubahan dari bentuk aslinya berupa penambahan atau perubahan video. Banyaknya kasus pemasalahan video asli yang di manipulasi menjadi video tampering maka peneliti mendeteksi keaslian video tersebut dengan menggunakan Algoritma K-Means. Fitur yang digunakan dalam penelitian ini adalah beberapa rangkaian frame dari sebuah video kemudian di proses dengan menampilkan clustering atau kelompok data Red Green Blue. Untuk menentukan centroid awal digunakan cara yaitu diambil nilai pixel dari Red Green Blue. Hasil yang dicapai antara frame video asli dan frame video tampering mempunyai nilai yang berbeda yaitu frame 4 pada video asli dengan jumlah pixel yang lebih sedikit dibanding dengan jumlah pixel pada video tampering.
APA, Harvard, Vancouver, ISO, and other styles
7

Putra Justicia, Amirul. "Analysis of Forensic Video in Storage Data Using Tampering Method." International Journal of Cyber-Security and Digital Forensics 7, no. 3 (2018): 328–35. http://dx.doi.org/10.17781/p002471.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sinharay, Sandip, and Matthew S. Johnson. "Three New Methods for Analysis of Answer Changes." Educational and Psychological Measurement 77, no. 1 (July 11, 2016): 54–81. http://dx.doi.org/10.1177/0013164416632287.

Full text
Abstract:
In a pioneering research article, Wollack and colleagues suggested the “erasure detection index” (EDI) to detect test tampering. The EDI can be used with or without a continuity correction and is assumed to follow the standard normal distribution under the null hypothesis of no test tampering. When used without a continuity correction, the EDI often has inflated Type I error rates. When used with a continuity correction, the EDI has satisfactory Type I error rates, but smaller power compared with the EDI without a continuity correction. This article suggests three methods for detecting test tampering that do not rely on the assumption of a standard normal distribution under the null hypothesis. It is demonstrated in a detailed simulation study that the performance of each suggested method is slightly better than that of the EDI. The EDI and the suggested methods were applied to a real data set. The suggested methods, although more computation intensive than the EDI, seem to be promising in detecting test tampering.
APA, Harvard, Vancouver, ISO, and other styles
9

Balsamo, Duilio, Paolo Bajardi, Alberto Salomone, and Rossano Schifanella. "Patterns of Routes of Administration and Drug Tampering for Nonmedical Opioid Consumption: Data Mining and Content Analysis of Reddit Discussions." Journal of Medical Internet Research 23, no. 1 (January 4, 2021): e21212. http://dx.doi.org/10.2196/21212.

Full text
Abstract:
Background The complex unfolding of the US opioid epidemic in the last 20 years has been the subject of a large body of medical and pharmacological research, and it has sparked a multidisciplinary discussion on how to implement interventions and policies to effectively control its impact on public health. Objective This study leverages Reddit, a social media platform, as the primary data source to investigate the opioid crisis. We aimed to find a large cohort of Reddit users interested in discussing the use of opioids, trace the temporal evolution of their interest, and extensively characterize patterns of the nonmedical consumption of opioids, with a focus on routes of administration and drug tampering. Methods We used a semiautomatic information retrieval algorithm to identify subreddits discussing nonmedical opioid consumption and developed a methodology based on word embedding to find alternative colloquial and nonmedical terms referring to opioid substances, routes of administration, and drug-tampering methods. We modeled the preferences of adoption of substances and routes of administration, estimating their prevalence and temporal unfolding. Ultimately, through the evaluation of odds ratios based on co-mentions, we measured the strength of association between opioid substances, routes of administration, and drug tampering. Results We identified 32 subreddits discussing nonmedical opioid usage from 2014 to 2018 and observed the evolution of interest among over 86,000 Reddit users potentially involved in firsthand opioid usage. We learned the language model of opioid consumption and provided alternative vocabularies for opioid substances, routes of administration, and drug tampering. A data-driven taxonomy of nonmedical routes of administration was proposed. We modeled the temporal evolution of interest in opioid consumption by ranking the popularity of the adoption of opioid substances and routes of administration, observing relevant trends, such as the surge in synthetic opioids like fentanyl and an increasing interest in rectal administration. In addition, we measured the strength of association between drug tampering, routes of administration, and substance consumption, finding evidence of understudied abusive behaviors, like chewing fentanyl patches and dissolving buprenorphine sublingually. Conclusions This work investigated some important consumption-related aspects of the opioid epidemic using Reddit data. We believe that our approach may provide a novel perspective for a more comprehensive understanding of nonmedical abuse of opioids substances and inform the prevention, treatment, and control of the public health effects.
APA, Harvard, Vancouver, ISO, and other styles
10

M. Buddhika Harshanath, S. "Privacy and Security Data-sharing Technologies for Tampering Protection and Detection." IEIE Transactions on Smart Processing & Computing 8, no. 1 (February 28, 2019): 43–48. http://dx.doi.org/10.5573/ieiespc.2019.8.1.043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Data Tampering"

1

Arapantonis, Elpidoforos. "Data tampering in Vehicle CAN Bus networks." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-76776.

Full text
Abstract:
The paradigm of the automotive industry has changed, over the course of the last10-15 years. Electronics and software, have introduced in many dierents parts ofa vehicle and the drive-by-wire it is taking over the vehicle functions. Connectivityfunctionalities are increasing in the context of the automotive industry as well. Allthe aforementioned parts have more than one common link. This thesis project willfocus on one of these links, which is the security. The focus will be the CAN busprotocol and specically, on investigating the implications of an adversary havingphysical access in a vehicle. An experiment will be contucted as part of this thesiswork, by using open source hardware (Arduino and Raspberry Pi) and a Man-inthe-middle (MITM) attack scenario, will be implemented. The application, whichwill perform the MITM attack (small scale CAN bus fuzzer) will be developedduring this project and it will be distributed as an open source software afterwards.
APA, Harvard, Vancouver, ISO, and other styles
2

PATTA, SIVA VENKATA PRASAD. "Intelligent Decision Support Systems for Compliance Options : A Systematic Literature Review and Simulation." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18449.

Full text
Abstract:
The project revolves around logistics and its adoption to the new rules. Theobjective of this project is to focus on minimizing data tampering to the lowest level possible.To achieve the set goals in this project, Decision support system and simulation havebeen used. However, to get clear insight about how they can be implemented, a systematicliterature review (Case Study incl.) has been conducted, followed by interviews with personnelat Kakinada port to understand the real-time complications in the field. Then, a simulatedexperiment using real-time data from Kakinada port has been conducted to achieve the set goalsand improve the level of transparency on all sides i.e., shipper, port and terminal.
APA, Harvard, Vancouver, ISO, and other styles
3

Ball, Jr Maynard Marshall. "On Resilience to Computable Tampering." Thesis, 2021. https://doi.org/10.7916/d8-debr-bw49.

Full text
Abstract:
Non-malleable codes, introduced by Dziembowski, Pietrzak, and Wichs (ICS 2010), provide a means of encoding information such that if the encoding is tampered with, the result encodes something either identical or completely unrelated. Unlike error-correcting codes (for which the result of tampering must always be identical), non-malleable codes give guarantees even when tampering functions are allowed to change every symbol of a codeword. In this thesis, we will provide constructions of non-malleable codes secure against a variety tampering classes with natural computational semantics: • Bounded-Communication: Functions corresponding to 2-party protocols where each party receives half the input (respectively) and then may communicate <𝒏/4 bits before returning their (respective) half of the tampered output. •Local Functions (Juntas):} each tampered output bit is only a function of n¹-ẟ inputs bits, where ẟ>0 is any constant (the efficiency of our code depends on ẟ). This class includes NC⁰. •Decision Trees: each tampered output bit is a function of n¹/⁴-⁰(¹) adaptively chosen bits. •Small-Depth Circuits: each tampered output bit is produced by a 𝒄log(n)/log log(n)-depth circuit of polynomial size, for some constant 𝒄. This class includes AC⁰. •Low Degree Polynomials: each tampered output field element is produced by a low-degree (relative to the field size) polynomial. •Polynomial-Size Circuit Tampering: each tampered codeword is produced by circuit of size 𝒏ᶜ where 𝒄 is any constant (the efficiency of our code depends on 𝒄). This result assumes that E is hard for exponential size nondeterministic circuits (all other results are unconditional). We stress that our constructions are efficient (encoding and decoding can be performed in uniform polynomial time) and (with the exception of the last result, which assumes strong circuit lower bounds) enjoy unconditional, statistical security guarantees. We also illuminate some potential barriers to constructing codes for more complex computational classes from simpler assumptions.
APA, Harvard, Vancouver, ISO, and other styles
4

"A robust anti-tampering scheme for software piracy protection." 2011. http://library.cuhk.edu.hk/record=b5894617.

Full text
Abstract:
Tsang, Hing Chung.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2011.
Includes bibliographical references (leaves 79-92).
Abstracts in English and Chinese.
Abstract --- p.i
Acknowledgement --- p.iv
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Motivation --- p.1
Chapter 1.2 --- Software Cracking --- p.2
Chapter 1.3 --- Objectives --- p.4
Chapter 1.4 --- Contributions --- p.5
Chapter 1.5 --- Thesis Outline --- p.6
Chapter 2 --- Related Work --- p.8
Chapter 2.1 --- Hardware-based Protection --- p.8
Chapter 2.2 --- Network-based Protection --- p.9
Chapter 2.3 --- Software-based Protection --- p.11
Chapter 2.3.1 --- Obfuscation --- p.11
Chapter 2.3.2 --- Code Encryption --- p.13
Chapter 2.3.3 --- Virtual Machine --- p.15
Chapter 2.3.4 --- Self-checksumming --- p.16
Chapter 2.3.5 --- Watermarking --- p.20
Chapter 2.3.6 --- Self-modifying Code --- p.22
Chapter 2.3.7 --- Software Aging --- p.23
Chapter 3 --- Proposed Protection Scheme --- p.24
Chapter 3.1 --- Introduction --- p.24
Chapter 3.2 --- Protector --- p.27
Chapter 3.2.1 --- A Traditional Protector Structure --- p.28
Chapter 3.2.2 --- Protector Construction --- p.31
Chapter "3,2.3" --- Protector Implementation - Version 1 --- p.32
Chapter 3.2.4 --- Protector Implementation - Version 2 --- p.35
Chapter 3.2.5 --- Tamper Responses --- p.37
Chapter 3.3 --- Protection Tree --- p.39
Chapter 3.4 --- Non-deterministic Execution of Functions --- p.43
Chapter 3.4.1 --- Introduction to n-version Functions --- p.44
Chapter 3.4.2 --- Probability Distributions --- p.45
Chapter 3.4.3 --- Implementation Issues --- p.47
Chapter 3.5 --- Desired Properties --- p.49
Chapter 4 --- Cracking Complexity and Security Analysis --- p.52
Chapter 4.1 --- Cracking Complexity --- p.52
Chapter 4.2 --- Security Analysis --- p.55
Chapter 4.2.1 --- Automation Attacks --- p.55
Chapter 4.2.2 --- Control Flow Graph Analysis --- p.55
Chapter 4.2.3 --- Cloning Attack --- p.56
Chapter 4.2.4 --- Dynamic Tracing --- p.56
Chapter 5 --- Experiments --- p.58
Chapter 5.1 --- Execution Time Overhead --- p.59
Chapter 5.2 --- Tamper Responses --- p.67
Chapter 6 --- Conclusion and Future Work --- p.73
Chapter 6.1 --- Conclusion --- p.73
Chapter 6.2 --- Comparison --- p.75
Chapter 6.3 --- Future Work --- p.77
Bibliography --- p.79
APA, Harvard, Vancouver, ISO, and other styles
5

Lai, Pao-Hsun, and 賴保勳. "Novel Techniques of Data Hiding in HTML Documents for Copyright Protection, Tampering Detection, and Covert Communication." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/26333362318610672051.

Full text
Abstract:
碩士
國立高雄第一科技大學
資訊管理所
92
The rapid advance of technology has made the Internet thrive. Web page is one of the main sources on the Internet people use for both searching and spreading information as well as the most popular service among the others offered. A web page is an HTML document. Via Internet's immediacy, we could use it to send information. A HTML document is easy to duplicate, so it might be misused and even tampered causing the depreciation of the web's credibility. So, this dissertation will introduce some methods used especially in HTML documents to do information hiding in order to achieve covert communication, copyright protection, and tamper detection. The information hiding technique we offer here won't affect how the HTML will look in a web-browser after embedded information. The hiding technique uses Tag to hide information. On the behalf of covert communication, we use Attribute With Default Value and Permutation of Attributes to hide secret information within Tag. After hiding, documents could still be written according to W3C hence quite un-suspect, hidden, and safe. On the behalf of copyright protection, we use five different information hiding techniques to embed the copyright signals. Each technique could embed many copies of copyright and in the mean time the signals in each technique won't affect each other. During extraction process, an additional voting scheme could increase copyright signal's accuracy. And if some of the signals were wrecked, the correct copyright would still be defined from the remaining signals. At last, two tamper detection schemes are proposed which are temper proofing with HTML source codes and webpage displays by using mechanisms of block authentication and dummy signals respectively. First we divide HTML into un-equal blocks. Each block calculates its authentication signal. During the embedding process, we find each dummy signal that is corresponding to its specific authentication signal and embed it into the block it belongs. Experiment proves this way can efficiently detect where has been tampered. Moreover, this dissertation suggests implementation of Active Tamper Detection Agent. When a web page is being tampered in the server, the tamper detection agent will stop the web page service immediately to avoid wrong information spreading via the net.
APA, Harvard, Vancouver, ISO, and other styles
6

Sun, He-Nan, and 孫赫男. "A new reliable Thevenin parameter esitmation method of power grids to resist phasor measurement data tampering and measure the error stochastically." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/xx844c.

Full text
Abstract:
碩士
元智大學
電機工程學系甲組
107
As the scale of modern power grids becomes larger and the structure becomes more and more complex, it is imperative to monitor the power grid from the perspective of the system as a whole.As one of the most important indicators of the system, voltage stability has been given high attention, and the emergence of WAMS based on PMU provides a very effective means for global voltage stability monitoring. As one of the most important indicators of the system, voltage stability has been given high attention, and the emergence of WAMS based on PMU provides a very effective means for global voltage stability monitoring. As one of the most important indicators of the system, voltage stability has been given high attention, and the emergence of WAMS based on PMU provides a very effective means for global voltage stability monitoring: The first method can eliminate the error information that is maliciously injected into the voltage and current of the load ,and it can accurately restore the parameters of the system in the polluted PMU consultation, thereby effectively monitoring the system voltage stability. A new TE parameter equivalent method RPEM is compared with the existing RTPEM method, which effectively solves the problem that RTPEM may degenerates into TLSM when the measurement error does not meet the set range. Considering that the error in the PMU data is not only a one-dimensional Gaussian distribution, but use a more realistic hybrid Gaussian distribution function to simulate the PMU measurement error, and the EM algorithm based on the GMM model is proposed to control the existing secondary voltage. The strategy is improved. The experimental results show that the first method can effectively remove the error added to the load voltage and current, while the RPEM can perfectly cope with the error data beyond the RTPEM constraint range, and the GMM-based EM method is applied in the secondary voltage control. The effect is enormous in both single-dimensional Gaussian distribution and mixed Gaussian distribution.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Data Tampering"

1

Alberti, Michele, Vinaychandran Pondenkandath, Marcel Würsch, Manuel Bouillon, Mathias Seuret, Rolf Ingold, and Marcus Liwicki. "Are You Tampering with My Data?" In Lecture Notes in Computer Science, 296–312. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11012-3_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Asaad, Aras, and Sabah Jassim. "Topological Data Analysis for Image Tampering Detection." In Digital Forensics and Watermarking, 136–46. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64185-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Qingzhong, Andrew H. Sung, Zhongxue Chen, and Lei Chen. "Exposing Image Tampering with the Same Quantization Matrix." In Multimedia Data Mining and Analytics, 327–43. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-14998-1_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kar, Diptendu Mohan, and Indrajit Ray. "That’s My DNA: Detecting Malicious Tampering of Synthesized DNA." In Data and Applications Security and Privacy XXXIII, 61–80. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22479-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Saeed, Fatek, and Anurag Dixit. "Hybrid HSW Based Zero Watermarking for Tampering Detection of Text Contents." In Lecture Notes on Data Engineering and Communications Technologies, 820–26. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24643-3_96.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Iqbal, Mubashar, and Raimundas Matulevičius. "Comparison of Blockchain-Based Solutions to Mitigate Data Tampering Security Risk." In Business Process Management: Blockchain and Central and Eastern Europe Forum, 13–28. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30429-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sun, Shengjie, Yabin Xu, and Zhuang Wu. "Research on Tampering Detection of Material Gene Data Based on Fragile Watermarking." In Communications in Computer and Information Science, 219–31. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8083-3_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shen, Yi, and Lu Zhang. "Anti-tampering Monitoring Method of Network Sensitive Information Based on Big Data Analysis." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 82–89. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36405-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wild, Stefan, Fabian Wiedemann, Sebastian Heil, Alexey Tschudnowsky, and Martin Gaedke. "ProProtect3: An Approach for Protecting User Profile Data from Disclosure, Tampering, and Improper Use in the Context of WebID." In Lecture Notes in Computer Science, 87–127. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46562-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ma, Qiang, Wenting Wang, Ti Guan, Yong Liu, and Lin Lin. "Modbus Protocol Based on the Characteristics of the Transmission of Industrial Data Packet Forgery Tampering and Industrial Security Products Testing." In Advances in Intelligent Information Hiding and Multimedia Signal Processing, 335–44. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9714-1_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Data Tampering"

1

Shrivastava, Rajesh Kumar, Sanket Mishra, V. E. Archana, and Chittaranjan Hota. "Preventing data tampering in IoT networks." In 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, 2019. http://dx.doi.org/10.1109/ants47819.2019.9117939.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yu, Lu, Juan Deng, Richard R. Brooks, and Seok Bae Yun. "Automobile ECU Design to Avoid Data Tampering." In CISR '15: 10th Annual Cyber and Information Security Research Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2746266.2746276.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhao, Lianying, and Mohammad Mannan. "TEE-aided Write Protection Against Privileged Data Tampering." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2019. http://dx.doi.org/10.14722/ndss.2019.23197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pei, Jianhua, Jingyu Wang, and Dongyuan Shi. "Data-Driven Measurement Tampering Detection Considering Spatial-Temporal Correlations." In 2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2). IEEE, 2019. http://dx.doi.org/10.1109/ei247390.2019.9061946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tetteh, Reginald, and Samah Mohamed Saeed. "Analysis of Test Data Tampering Attack on Manufacturing Testing." In 2020 15th Design & Technology of Integrated Systems in Nanoscale Era (DTIS). IEEE, 2020. http://dx.doi.org/10.1109/dtis48698.2020.9081029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rashid, Anum, Muhammad Naveed Aman, Mukhtar Ullah, and Biplab Sikdar. "Detecting Data Tampering In Synchrophasors Using Power Flow Entropy." In 2018 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia). IEEE, 2018. http://dx.doi.org/10.1109/isgt-asia.2018.8467959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Ren. "Iterative Encryption Method of Transmission Data Anti-Tampering Based on Big Data." In 2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS). IEEE, 2019. http://dx.doi.org/10.1109/icvris.2019.00036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rao, Praveen, Srini Bhagavan, and Laurent Njilla. "A new tool for detecting tampering of big data programs." In Cyber Sensing 2020, edited by Peter Chin and Igor V. Ternovskiy. SPIE, 2020. http://dx.doi.org/10.1117/12.2564693.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mercier, Hugues, Maxime Augier, and Arjen K. Lenstra. "STEP-archival: Storage integrity and anti-tampering using data entanglement." In 2015 IEEE International Symposium on Information Theory (ISIT). IEEE, 2015. http://dx.doi.org/10.1109/isit.2015.7282724.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Aman, Muhammad Naveed, Kashif Javed, Biplab Sikdar, and Kee Chaing Chua. "Detecting data tampering attacks in synchrophasor networks using time hopping." In 2016 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, 2016. http://dx.doi.org/10.1109/isgteurope.2016.7856326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography