Cargando…
Datasets of RT spoofing attacks on MIL-STD-1553 communication traffic
The datasets in this article are produced to evaluate the ability of MIL-STD-1553 intrusion detection systems to detect attacks that emulate normal non-periodical messages, at differing attack occurrence rates. And different data representations. We present three streams of simulated MIL-STD-1553 tr...
Autores principales: | Yahalom, Ran, Barishev, David, Steren, Alon, Nameri, Yonatan, Roytman, Maxim, Porgador, Angel, Elovici, Yuval |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Elsevier
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6660615/ https://www.ncbi.nlm.nih.gov/pubmed/31372474 http://dx.doi.org/10.1016/j.dib.2019.103863 |
Ejemplares similares
-
MIL-STD-1553-B and the Next Generation Conference
Publicado: (1989) -
Towards the Detection of GPS Spoofing Attacks against Drones by Analyzing Camera’s Video Stream
por: Davidovich, Barak, et al.
Publicado: (2022) -
Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal
por: Gluck, Tomer, et al.
Publicado: (2020) -
Description of the MIL1553-G64 communications package: Version 6
por: Brummer, P J
Publicado: (1986) -
A klystron-modulator interlock and fault acquisition system using G-64, VME AND MIL-1553-B standards: using G-64, VME AND MIL-1553-B standards
por: Campbell, A, et al.
Publicado: (1994)