Learn More
—Supervisory Control and Data Acquisition (SCADA) systems are deeply ingrained in the fabric of critical infrastructure sectors. These computerized real-time process control systems, over geographically dispersed continuous distribution operations, are increasingly subject to serious damage and disruption by cyber means due to their standardization and(More)
— Due to standardization and connectivity to the Internet, Supervisory Control and Data Acquisition (SCADA) systems now face the threat of cyber attacks. SCADA systems were designed without cyber security in mind and hence the problem of how to modify conventional Information Technology (IT) intrusion detection techniques to suit the needs of SCADA is a big(More)
— On August 30, 2005, we successfully demonstrated a large-scale, real-time, surveillance and control application on a wireless sensor network. The task was to track multiple human targets walking through a 5041 square meter sensor field and dispatch simulated pursuers to capture them. We employed a multi-target tracking algorithm that was a combination of(More)
— Remote estimation problems are critical to many novel applications enabled by large-scale dense wireless sensor network. Individual sensors simultaneously sense, process and transmit measured information over a lossy wireless network to a central base station, which processes the data and produces an optimal estimate of the state. In this paper, we(More)
There are different watermark embedding methods invented for digital media which contains lot of watermarking algorithms for text, image, audio, and video. In this paper focus is on audio watermarking part of digital media. Here we are describing a technique for embedding digital watermarks into digital audio signals. On audio wave signal apply(More)
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to(More)