Search results for "Detection techniques"

showing 2 items of 2 documents

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct

Safety Assessment and Migration Tests

2018

This chapter outlines (i) the advances to reduce the uncertainty in nanomaterials (NMs) determination; (ii) the results from migration experiments conducted with nano-clay, nanosilver, and other nanomaterial-containing polymers; and (iii) the different established protocols for risk assessment that ensure consumer's safety. The text starts highlighting the need of an understanding of potential exposure via migration into food and a deeper knowledge of the interaction of NMs with food constituents and their effects upon ingestion. The chapter covers the ability of the analytical techniques utilized to detect nanoparticles per se in food simulants. In addition, the results of the application …

Food packagingFood packagingToxicitySafety assessmentMigration testEnvironmental scienceBiochemical engineeringDetection techniquesRegulationsNanomaterials
researchProduct