Academic literature on the topic 'Data Tampering'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data Tampering.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data Tampering"
Greenberg, J. "Researcher Admits Tampering with Data." Science News 130, no. 22 (November 29, 1986): 340. http://dx.doi.org/10.2307/3971179.
Full textKak, Subhash C. "How to detect tampering of data." Information Processing Letters 20, no. 2 (February 1985): 109–10. http://dx.doi.org/10.1016/0020-0190(85)90074-2.
Full textJOHNSTON, ROGER G., MICHAEL J. TIMMONS, and JON S. WARNER. "Protecting Nuclear Safeguards Monitoring Data from Tampering." Science & Global Security 15, no. 3 (December 3, 2007): 185–209. http://dx.doi.org/10.1080/08929880701715076.
Full textNiu, Dongmei, Hongxia Wang, Minquan Cheng, and Canghong Shi. "Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction." Security and Communication Networks 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/2516324.
Full textHuang, Da-Wen, Wanping Liu, and Jichao Bi. "Data tampering attacks diagnosis in dynamic wireless sensor networks." Computer Communications 172 (April 2021): 84–92. http://dx.doi.org/10.1016/j.comcom.2021.03.007.
Full textSari, Dewi Yunita. "ALGORITMA K-MEANS UNTUK MENDETEKSI FRAME PADA VIDEO ASLI DAN VIDEO TAMPERING." TEKNOKOM 3, no. 1 (April 19, 2020): 17–21. http://dx.doi.org/10.31943/teknokom.v3i1.44.
Full textPutra Justicia, Amirul. "Analysis of Forensic Video in Storage Data Using Tampering Method." International Journal of Cyber-Security and Digital Forensics 7, no. 3 (2018): 328–35. http://dx.doi.org/10.17781/p002471.
Full textSinharay, Sandip, and Matthew S. Johnson. "Three New Methods for Analysis of Answer Changes." Educational and Psychological Measurement 77, no. 1 (July 11, 2016): 54–81. http://dx.doi.org/10.1177/0013164416632287.
Full textBalsamo, Duilio, Paolo Bajardi, Alberto Salomone, and Rossano Schifanella. "Patterns of Routes of Administration and Drug Tampering for Nonmedical Opioid Consumption: Data Mining and Content Analysis of Reddit Discussions." Journal of Medical Internet Research 23, no. 1 (January 4, 2021): e21212. http://dx.doi.org/10.2196/21212.
Full textM. Buddhika Harshanath, S. "Privacy and Security Data-sharing Technologies for Tampering Protection and Detection." IEIE Transactions on Smart Processing & Computing 8, no. 1 (February 28, 2019): 43–48. http://dx.doi.org/10.5573/ieiespc.2019.8.1.043.
Full textDissertations / Theses on the topic "Data Tampering"
Arapantonis, Elpidoforos. "Data tampering in Vehicle CAN Bus networks." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-76776.
Full textPATTA, SIVA VENKATA PRASAD. "Intelligent Decision Support Systems for Compliance Options : A Systematic Literature Review and Simulation." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18449.
Full textBall, Jr Maynard Marshall. "On Resilience to Computable Tampering." Thesis, 2021. https://doi.org/10.7916/d8-debr-bw49.
Full text"A robust anti-tampering scheme for software piracy protection." 2011. http://library.cuhk.edu.hk/record=b5894617.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2011.
Includes bibliographical references (leaves 79-92).
Abstracts in English and Chinese.
Abstract --- p.i
Acknowledgement --- p.iv
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Motivation --- p.1
Chapter 1.2 --- Software Cracking --- p.2
Chapter 1.3 --- Objectives --- p.4
Chapter 1.4 --- Contributions --- p.5
Chapter 1.5 --- Thesis Outline --- p.6
Chapter 2 --- Related Work --- p.8
Chapter 2.1 --- Hardware-based Protection --- p.8
Chapter 2.2 --- Network-based Protection --- p.9
Chapter 2.3 --- Software-based Protection --- p.11
Chapter 2.3.1 --- Obfuscation --- p.11
Chapter 2.3.2 --- Code Encryption --- p.13
Chapter 2.3.3 --- Virtual Machine --- p.15
Chapter 2.3.4 --- Self-checksumming --- p.16
Chapter 2.3.5 --- Watermarking --- p.20
Chapter 2.3.6 --- Self-modifying Code --- p.22
Chapter 2.3.7 --- Software Aging --- p.23
Chapter 3 --- Proposed Protection Scheme --- p.24
Chapter 3.1 --- Introduction --- p.24
Chapter 3.2 --- Protector --- p.27
Chapter 3.2.1 --- A Traditional Protector Structure --- p.28
Chapter 3.2.2 --- Protector Construction --- p.31
Chapter "3,2.3" --- Protector Implementation - Version 1 --- p.32
Chapter 3.2.4 --- Protector Implementation - Version 2 --- p.35
Chapter 3.2.5 --- Tamper Responses --- p.37
Chapter 3.3 --- Protection Tree --- p.39
Chapter 3.4 --- Non-deterministic Execution of Functions --- p.43
Chapter 3.4.1 --- Introduction to n-version Functions --- p.44
Chapter 3.4.2 --- Probability Distributions --- p.45
Chapter 3.4.3 --- Implementation Issues --- p.47
Chapter 3.5 --- Desired Properties --- p.49
Chapter 4 --- Cracking Complexity and Security Analysis --- p.52
Chapter 4.1 --- Cracking Complexity --- p.52
Chapter 4.2 --- Security Analysis --- p.55
Chapter 4.2.1 --- Automation Attacks --- p.55
Chapter 4.2.2 --- Control Flow Graph Analysis --- p.55
Chapter 4.2.3 --- Cloning Attack --- p.56
Chapter 4.2.4 --- Dynamic Tracing --- p.56
Chapter 5 --- Experiments --- p.58
Chapter 5.1 --- Execution Time Overhead --- p.59
Chapter 5.2 --- Tamper Responses --- p.67
Chapter 6 --- Conclusion and Future Work --- p.73
Chapter 6.1 --- Conclusion --- p.73
Chapter 6.2 --- Comparison --- p.75
Chapter 6.3 --- Future Work --- p.77
Bibliography --- p.79
Lai, Pao-Hsun, and 賴保勳. "Novel Techniques of Data Hiding in HTML Documents for Copyright Protection, Tampering Detection, and Covert Communication." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/26333362318610672051.
Full text國立高雄第一科技大學
資訊管理所
92
The rapid advance of technology has made the Internet thrive. Web page is one of the main sources on the Internet people use for both searching and spreading information as well as the most popular service among the others offered. A web page is an HTML document. Via Internet's immediacy, we could use it to send information. A HTML document is easy to duplicate, so it might be misused and even tampered causing the depreciation of the web's credibility. So, this dissertation will introduce some methods used especially in HTML documents to do information hiding in order to achieve covert communication, copyright protection, and tamper detection. The information hiding technique we offer here won't affect how the HTML will look in a web-browser after embedded information. The hiding technique uses Tag to hide information. On the behalf of covert communication, we use Attribute With Default Value and Permutation of Attributes to hide secret information within Tag. After hiding, documents could still be written according to W3C hence quite un-suspect, hidden, and safe. On the behalf of copyright protection, we use five different information hiding techniques to embed the copyright signals. Each technique could embed many copies of copyright and in the mean time the signals in each technique won't affect each other. During extraction process, an additional voting scheme could increase copyright signal's accuracy. And if some of the signals were wrecked, the correct copyright would still be defined from the remaining signals. At last, two tamper detection schemes are proposed which are temper proofing with HTML source codes and webpage displays by using mechanisms of block authentication and dummy signals respectively. First we divide HTML into un-equal blocks. Each block calculates its authentication signal. During the embedding process, we find each dummy signal that is corresponding to its specific authentication signal and embed it into the block it belongs. Experiment proves this way can efficiently detect where has been tampered. Moreover, this dissertation suggests implementation of Active Tamper Detection Agent. When a web page is being tampered in the server, the tamper detection agent will stop the web page service immediately to avoid wrong information spreading via the net.
Sun, He-Nan, and 孫赫男. "A new reliable Thevenin parameter esitmation method of power grids to resist phasor measurement data tampering and measure the error stochastically." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/xx844c.
Full text元智大學
電機工程學系甲組
107
As the scale of modern power grids becomes larger and the structure becomes more and more complex, it is imperative to monitor the power grid from the perspective of the system as a whole.As one of the most important indicators of the system, voltage stability has been given high attention, and the emergence of WAMS based on PMU provides a very effective means for global voltage stability monitoring. As one of the most important indicators of the system, voltage stability has been given high attention, and the emergence of WAMS based on PMU provides a very effective means for global voltage stability monitoring. As one of the most important indicators of the system, voltage stability has been given high attention, and the emergence of WAMS based on PMU provides a very effective means for global voltage stability monitoring: The first method can eliminate the error information that is maliciously injected into the voltage and current of the load ,and it can accurately restore the parameters of the system in the polluted PMU consultation, thereby effectively monitoring the system voltage stability. A new TE parameter equivalent method RPEM is compared with the existing RTPEM method, which effectively solves the problem that RTPEM may degenerates into TLSM when the measurement error does not meet the set range. Considering that the error in the PMU data is not only a one-dimensional Gaussian distribution, but use a more realistic hybrid Gaussian distribution function to simulate the PMU measurement error, and the EM algorithm based on the GMM model is proposed to control the existing secondary voltage. The strategy is improved. The experimental results show that the first method can effectively remove the error added to the load voltage and current, while the RPEM can perfectly cope with the error data beyond the RTPEM constraint range, and the GMM-based EM method is applied in the secondary voltage control. The effect is enormous in both single-dimensional Gaussian distribution and mixed Gaussian distribution.
Book chapters on the topic "Data Tampering"
Alberti, Michele, Vinaychandran Pondenkandath, Marcel Würsch, Manuel Bouillon, Mathias Seuret, Rolf Ingold, and Marcus Liwicki. "Are You Tampering with My Data?" In Lecture Notes in Computer Science, 296–312. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11012-3_25.
Full textAsaad, Aras, and Sabah Jassim. "Topological Data Analysis for Image Tampering Detection." In Digital Forensics and Watermarking, 136–46. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64185-0_11.
Full textLiu, Qingzhong, Andrew H. Sung, Zhongxue Chen, and Lei Chen. "Exposing Image Tampering with the Same Quantization Matrix." In Multimedia Data Mining and Analytics, 327–43. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-14998-1_15.
Full textKar, Diptendu Mohan, and Indrajit Ray. "That’s My DNA: Detecting Malicious Tampering of Synthesized DNA." In Data and Applications Security and Privacy XXXIII, 61–80. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22479-0_4.
Full textSaeed, Fatek, and Anurag Dixit. "Hybrid HSW Based Zero Watermarking for Tampering Detection of Text Contents." In Lecture Notes on Data Engineering and Communications Technologies, 820–26. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24643-3_96.
Full textIqbal, Mubashar, and Raimundas Matulevičius. "Comparison of Blockchain-Based Solutions to Mitigate Data Tampering Security Risk." In Business Process Management: Blockchain and Central and Eastern Europe Forum, 13–28. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30429-4_2.
Full textSun, Shengjie, Yabin Xu, and Zhuang Wu. "Research on Tampering Detection of Material Gene Data Based on Fragile Watermarking." In Communications in Computer and Information Science, 219–31. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8083-3_20.
Full textShen, Yi, and Lu Zhang. "Anti-tampering Monitoring Method of Network Sensitive Information Based on Big Data Analysis." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 82–89. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36405-2_9.
Full textWild, Stefan, Fabian Wiedemann, Sebastian Heil, Alexey Tschudnowsky, and Martin Gaedke. "ProProtect3: An Approach for Protecting User Profile Data from Disclosure, Tampering, and Improper Use in the Context of WebID." In Lecture Notes in Computer Science, 87–127. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46562-2_4.
Full textMa, Qiang, Wenting Wang, Ti Guan, Yong Liu, and Lin Lin. "Modbus Protocol Based on the Characteristics of the Transmission of Industrial Data Packet Forgery Tampering and Industrial Security Products Testing." In Advances in Intelligent Information Hiding and Multimedia Signal Processing, 335–44. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9714-1_37.
Full textConference papers on the topic "Data Tampering"
Shrivastava, Rajesh Kumar, Sanket Mishra, V. E. Archana, and Chittaranjan Hota. "Preventing data tampering in IoT networks." In 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, 2019. http://dx.doi.org/10.1109/ants47819.2019.9117939.
Full textYu, Lu, Juan Deng, Richard R. Brooks, and Seok Bae Yun. "Automobile ECU Design to Avoid Data Tampering." In CISR '15: 10th Annual Cyber and Information Security Research Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2746266.2746276.
Full textZhao, Lianying, and Mohammad Mannan. "TEE-aided Write Protection Against Privileged Data Tampering." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2019. http://dx.doi.org/10.14722/ndss.2019.23197.
Full textPei, Jianhua, Jingyu Wang, and Dongyuan Shi. "Data-Driven Measurement Tampering Detection Considering Spatial-Temporal Correlations." In 2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2). IEEE, 2019. http://dx.doi.org/10.1109/ei247390.2019.9061946.
Full textTetteh, Reginald, and Samah Mohamed Saeed. "Analysis of Test Data Tampering Attack on Manufacturing Testing." In 2020 15th Design & Technology of Integrated Systems in Nanoscale Era (DTIS). IEEE, 2020. http://dx.doi.org/10.1109/dtis48698.2020.9081029.
Full textRashid, Anum, Muhammad Naveed Aman, Mukhtar Ullah, and Biplab Sikdar. "Detecting Data Tampering In Synchrophasors Using Power Flow Entropy." In 2018 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia). IEEE, 2018. http://dx.doi.org/10.1109/isgt-asia.2018.8467959.
Full textWang, Ren. "Iterative Encryption Method of Transmission Data Anti-Tampering Based on Big Data." In 2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS). IEEE, 2019. http://dx.doi.org/10.1109/icvris.2019.00036.
Full textRao, Praveen, Srini Bhagavan, and Laurent Njilla. "A new tool for detecting tampering of big data programs." In Cyber Sensing 2020, edited by Peter Chin and Igor V. Ternovskiy. SPIE, 2020. http://dx.doi.org/10.1117/12.2564693.
Full textMercier, Hugues, Maxime Augier, and Arjen K. Lenstra. "STEP-archival: Storage integrity and anti-tampering using data entanglement." In 2015 IEEE International Symposium on Information Theory (ISIT). IEEE, 2015. http://dx.doi.org/10.1109/isit.2015.7282724.
Full textAman, Muhammad Naveed, Kashif Javed, Biplab Sikdar, and Kee Chaing Chua. "Detecting data tampering attacks in synchrophasor networks using time hopping." In 2016 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, 2016. http://dx.doi.org/10.1109/isgteurope.2016.7856326.
Full text