2021
DOI: 10.1109/tits.2021.3135197
|View full text |Cite
|
Sign up to set email alerts
|

DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 49 publications
0
2
0
Order By: Relevance
“…Exploration of U2IoT requires security with the concept of the Object Life Cycle (OLC). The smart home scenario explores authentic phases and registration through the combination of a mutual authentication protocol (MAP) and OLC-based PUF [63]. Compared with this approach, a secured command execution protocol along with an authentication scheme and efficient registration is further suggested.…”
Section: Background Of Puf Schemesmentioning
confidence: 99%
“…Exploration of U2IoT requires security with the concept of the Object Life Cycle (OLC). The smart home scenario explores authentic phases and registration through the combination of a mutual authentication protocol (MAP) and OLC-based PUF [63]. Compared with this approach, a secured command execution protocol along with an authentication scheme and efficient registration is further suggested.…”
Section: Background Of Puf Schemesmentioning
confidence: 99%
“…Using the feature extraction capability of neural networks and the temporal memory capability of LSTM, the long-term change pattern of load and the non-linear influence of various influencing factors on load are identified, and the load prediction performance of different historical time windows and different network architectures are verified based on actual load data. Zhuang et al (Zhuang et al, 2020) studied and analyzed various popular RNN architectures, and designs a cross-time scale sub-modular recurrent neural network architecture by combining the Zoneout technique, focusing on the random update strategy of the hidden layer modules, which effectively solves the RNN gradient disappearance problem and substantially reduces the network parameters to be trained (Fang et al, 2022;Wang et al, 2020;Shen et al, 2022;Duan et al, 2022;He et al, 2021).…”
mentioning
confidence: 99%