Immersive Virtual Reality Attacks and the Human Joystick (Englisch)
- Neue Suche nach: Casey, Peter
- Weitere Informationen zu Casey, Peter:
-
https://orcid.org/0000-0002-5747-1175
- Neue Suche nach: Baggili, Ibrahim
- Weitere Informationen zu Baggili, Ibrahim:
-
https://orcid.org/0000-0002-9574-9537
- Neue Suche nach: Yarramreddy, Ananya
- Neue Suche nach: Casey, Peter
- Weitere Informationen zu Casey, Peter:
-
https://orcid.org/0000-0002-5747-1175
- Neue Suche nach: Baggili, Ibrahim
- Weitere Informationen zu Baggili, Ibrahim:
-
https://orcid.org/0000-0002-9574-9537
- Neue Suche nach: Yarramreddy, Ananya
In:
IEEE Transactions on Dependable and Secure Computing
;
18
, 2
;
550-562
;
2021
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Immersive Virtual Reality Attacks and the Human Joystick
-
Beteiligte:
-
Erschienen in:IEEE Transactions on Dependable and Secure Computing ; 18, 2 ; 550-562
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.03.2021
-
Format / Umfang:1382061 byte
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis – Band 18, Ausgabe 2
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 505
-
BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting AttacksAl-Naami, Khaled / El-Ghamry, Amir / Islam, Md Shihabul / Khan, Latifur / Thuraisingham, Bhavani / Hamlen, Kevin W. / Alrahmawy, Mohammed / Rashad, Magdi Z. et al. | 2021
- 518
-
A Fake Online Repository Generation Engine for Cyber DeceptionChakraborty, Tanmoy / Jajodia, Sushil / Katz, Jonathan / Picariello, Antonio / Sperli, Giancarlo / Subrahmanian, V. S. et al. | 2021
- 534
-
Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication SchemesAlaca, Furkan / Abdou, AbdelRahman / van Oorschot, Paul C. et al. | 2021
- 550
-
Immersive Virtual Reality Attacks and the Human JoystickCasey, Peter / Baggili, Ibrahim / Yarramreddy, Ananya et al. | 2021
- 563
-
Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business ModelWu, Tong / Yang, Guomin / Mu, Yi / Guo, Fuchun / Deng, Robert H. et al. | 2021
- 576
-
Real-Time Error Detection in Nonlinear Control Systems Using Machine Learning Assisted State-Space EncodingBanerjee, Suvadeep / Samynathan, Balavinayagam / Abraham, Jacob A. / Chatterjee, Abhijit et al. | 2021
- 593
-
Secure Computing Enclaves Using FPGAsElrabaa, M. E. S. / Al-Asli, M. / Abu-Amara, M. et al. | 2021
- 605
-
Resource-Aware Detection and Defense System against Multi-Type Attacks in the Cloud: Repeated Bayesian Stackelberg GameWahab, Omar Abdel / Bentahar, Jamal / Otrok, Hadi / Mourad, Azzam et al. | 2021
- 623
-
Recovery Algorithms for Paxos-Based State Machine ReplicationKonczak, Jan / Wojciechowski, Pawel T. / Santos, Nuno / Zurkowski, Tomasz / Schiper, Andre et al. | 2021
- 641
-
An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model BlockchainMa, Shunli / Deng, Yi / He, Debiao / Zhang, Jiang / Xie, Xiang et al. | 2021
- 652
-
Looking Back! Using Early Versions of Android Apps as Attack VectorsZhang, Yue / Weng, Jian / Weng, Jiasi / Hou, Lin / Yang, Anjia / Li, Ming / Xiang, Yang / Deng, Robert H. et al. | 2021
- 667
-
Tool of Spies: Leaking your IP by Altering the 3D Printer CompilerChhetri, Sujit Rokka / Barua, Anomadarshi / Faezi, Sina / Regazzoni, Francesco / Canedo, Arquimedes / Al Faruque, Mohammad Abdullah et al. | 2021
- 679
-
Traceable Monero: Anonymous Cryptocurrency with Enhanced AccountabilityLi, Yannan / Yang, Guomin / Susilo, Willy / Yu, Yong / Au, Man Ho / Liu, Dongxi et al. | 2021
- 692
-
Lossless Data Hiding Based on Homomorphic CryptosystemZheng, Shuli / Wang, Yuzhao / Hu, Donghui et al. | 2021
- 706
-
An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure DeduplicationXu, Runhua / Joshi, James / Krishnamurthy, Prashant et al. | 2021
- 722
-
PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc NetworksZhang, Jing / Cui, Jie / Zhong, Hong / Chen, Zhili / Liu, Lu et al. | 2021
- 736
-
CuRTAIL: ChaRacterizing and Thwarting AdversarIal Deep LearningJavaheripi, Mojan / Samragh, Mohammad / Rouhani, Bita Darvish / Javidi, Tara / Koushanfar, Farinaz et al. | 2021
- 753
-
Secure Opportunistic Contextual Logging for Wearable Healthcare Sensing DevicesSiddiqi, Muhammad / Ali, Syed Taha / Sivaraman, Vijay et al. | 2021
- 765
-
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the CloudQi, Saiyu / Zheng, Yuanqing et al. | 2021
- 780
-
Differentially Private Publication of Vertically Partitioned DataTang, Peng / Cheng, Xiang / Su, Sen / Chen, Rui / Shao, Huaxi et al. | 2021
- 796
-
MADneSs: A Multi-Layer Anomaly Detection Framework for Complex Dynamic SystemsZoppi, Tommaso / Ceccarelli, Andrea / Bondavalli, Andrea et al. | 2021
- 810
-
PSpec-SQL: Enabling Fine-Grained Control for Distributed Data AnalyticsLuo, Chen / He, Fei / Peng, Fei / Yan, Dong / Zhang, Dan / Zhou, Xin et al. | 2021
- 825
-
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical SystemsCheng, Long / Tian, Ke / Yao, Danfeng Daphne / Sha, Lui / Beyah, Raheem A. et al. | 2021
- 843
-
STYX: A Hierarchical Key Management System for Elastic Content Delivery Networks on Public CloudsHu, Xiaokang / Li, Jian / Wei, Changzheng / Li, Weigang / Zeng, Xin / Yu, Ping / Guan, Haibing et al. | 2021
- 858
-
Robust and Universal Seamless Handover Authentication in 5G HetNetsZhang, Yinghui / Deng, Robert H. / Bertino, Elisa / Zheng, Dong et al. | 2021
- 875
-
Extracting Randomness from the Trend of IPI for Cryptographic Operations in Implantable Medical DevicesChizari, Hassan / Lupu, Emil et al. | 2021
- 889
-
Privacy-Aware Personal Data Storage (P-PDS): Learning how to Protect User Privacy from External ApplicationsSingh, Bikash Chandra / Carminati, Barbara / Ferrari, Elena et al. | 2021
- 904
-
Sensitive Label Privacy Preservation with Anatomization for Data PublishingYao, Lin / Chen, Zhenyu / Wang, Xin / Liu, Dong / Wu, Guowei et al. | 2021
- 918
-
Automatic Integer Error Repair by Proper-Type InferenceCheng, Xi / Zhou, Min / Song, Xiaoyu / Gu, Ming / Sun, Jiaguang et al. | 2021
- 936
-
Protecting Multi-Level Memories From Jamming Using Q-ary Expurgated Robust CodesNeumeier, Yaara / Keren, Osnat et al. | 2021
- 949
-
How Much I Can Rely on You: Measuring Trustworthiness of a Twitter UserDas, Rajkumar / Karmakar, Gour / Kamruzzaman, Joarder et al. | 2021
- 967
-
Mobile Crowdsourcing Task Allocation with Differential-and-Distortion Geo-ObfuscationWang, Leye / Yang, Dingqi / Han, Xiao / Zhang, Daqing / Ma, Xiaojuan et al. | 2021
- 982
-
Locally Differentially Private Heavy Hitter IdentificationWang, Tianhao / Li, Ninghui / Jha, Somesh et al. | 2021
- 994
-
Trust Assessment in Online Social NetworksLiu, Guangchi / Yang, Qing / Wang, Honggang / Liu, Alex X. et al. | 2021