Abstract: We study the problem of designing an attacking strategy for a remote state estimator of a linear Gaussian cyber-physical system. We focus on an innovation-based attack on a scenario in which ...
Microsoft has introduced new Windows protections to defend against phishing attacks that abuse Remote Desktop connection (.rdp) files, adding warnings and disabling risky shared resources by default.
The Internet of Things (IoT) has wide applications in many industries, such as manufacturing, agriculture, supply chain, and healthcare. As organizations scale their IoT deployments, managing secure ...
Attackers have been exploiting a zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December. The attacks have been discovered by security researcher Haifei ...
Tesla is the only company that says it allows remote operators to control the vehicle, while Waymo is the only one that uses remote agents based overseas. Tesla is the only company that says it allows ...
Abstract: Flood mapping using remote sensing data is critical to disaster response, especially in real-time monitoring and edge deployment. However, existing deep-learning (DL) models often face ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results