Learn More
Supervisory Control and Data Acquisition(SCADA) systems are deeply ingrained in the fabric of critical infrastructure sectors. These computerized real-time process control systems, over geographically dispersed continuous distribution operations, are increasingly subject to serious damage and disruption by cyber means due to their standardization and(More)
— Due to standardization and connectivity to the Internet, Supervisory Control and Data Acquisition (SCADA) systems now face the threat of cyber attacks. SCADA systems were designed without cyber security in mind and hence the problem of how to modify conventional Information Technology (IT) intrusion detection techniques to suit the needs of SCADA is a big(More)
— Remote estimation problems are critical to many novel applications enabled by large-scale dense wireless sensor network. Individual sensors simultaneously sense, process and transmit measured information over a lossy wireless network to a central base station, which processes the data and produces an optimal estimate of the state. In this paper, we(More)
— On August 30, 2005, we successfully demonstrated a large-scale, real-time, surveillance and control application on a wireless sensor network. The task was to track multiple human targets walking through a 5041 square meter sensor field and dispatch simulated pursuers to capture them. We employed a multi-target tracking algorithm that was a combination of(More)
On the assumption that a model is correctly learned and built, the typical usage of ARIMA in anomaly detection compares data points with those predicated through the model to determine whether anomalies occur. Yet the time variability by the coefficients in those dynamic regression models is possibly indicative of whether anomalies are in the data set on(More)
While wireless sensor network aided robots lend humans a hand in accessing to certain difficult and/or otherwise unreachable areas, the robots may face challenges in locomotion, object discovering, searching and tracking among many demanding tasks. The unreliable wireless communication and possible components failures of wireless sensor nodes coupling with(More)
Due to standardization and connectivity to other networks, networked control systems, a vital component of many nations' critical infrastructures, face potential disruption. Its possible manifestation can affect Kalman filter, the primary recursive estimation method used in control engineering field. Whereas to improve such estimation, data fusion may take(More)
  • Namrata G. Murumbekar, B. M. Patil, +12 authors K. Yamaguchai
  • 2015
There are different watermark embedding methods invented for digital media which contains lot of watermarking algorithms for text, image, audio, and video. In this paper focus is on audio watermarking part of digital media. Here we are describing a technique for embedding digital watermarks into digital audio signals. On audio wave signal apply(More)
In today's class, we cover the topic of how to deal evasion problem faced by a Network Intrusion Detection System (NIDS) due to the ambiguity of the monitored network traffic, with emphasis on normalizer [4]. Given that attackers may exploit this ambiguity to avoid detection and cause misleading alarms, our ultimate goal is to remove potential ambiguities(More)