4.6 Article

Modeling and Defense of Social Virtual Reality Attacks Inducing Cybersickness

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Multi-Cloud Performance and Security Driven Federated Workflow Management

Matthew Dickinson et al.

Summary: This paper presents a joint performance and security-driven federated resource allocation scheme for data-intensive scientific applications, addressing the optimization of resource allocation through defined security specifications and alignment techniques, resulting in a near optimal allocation algorithm.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)

Article Computer Science, Hardware & Architecture

Immersive Virtual Reality Attacks and the Human Joystick

Peter Casey et al.

Summary: This study presents a security analysis of consumer immersive Virtual Reality (VR) systems, creating new attacks and demonstrating the success of exploiting VR systems to control immersed users through a human participant deception study. Future research directions and ways to enhance the security of these systems are also discussed.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Theory & Methods

Security and Privacy Approaches in Mixed Reality: A Literature Survey

Jaybie A. De Guzman et al.

ACM COMPUTING SURVEYS (2020)

Article Computer Science, Information Systems

The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved

Wei Zhou et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

A symbolic model checking approach in formal verification of distributed systems

Alireza Souri et al.

HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES (2019)

Proceedings Paper Computer Science, Hardware & Architecture

Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications

Aniket Gulhane et al.

2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC) (2019)

Review Computer Science, Theory & Methods

IoT security: Review, blockchain solutions, and open challenges

Minhaj Ahmad Khan et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges

Rodrigo Roman et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Proceedings Paper Computer Science, Hardware & Architecture

Quantitative security and safety analysis with attack-fault trees

Rajesh Kumar et al.

2017 IEEE 18TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2017) (2017)

Proceedings Paper Computer Science, Interdisciplinary Applications

Efficient Probabilistic Model Checking of Smart Building Maintenance using Fault Maintenance Trees

Nathalie Cauchi et al.

BUILDSYS'17: PROCEEDINGS OF THE 4TH ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILT ENVIRONMENTS (2017)

Article Computer Science, Hardware & Architecture

Use of physiological signals to predict cybersickness

Mark S. Dennison et al.

DISPLAYS (2016)

Review Computer Science, Interdisciplinary Applications

Review on cybersickness in applications and visual displays

Lisa Rebenitsch et al.

VIRTUAL REALITY (2016)

Proceedings Paper Computer Science, Information Systems

On Attacker Models and Profiles for Cyber-Physical Systems

Marco Rocchetto et al.

COMPUTER SECURITY - ESORICS 2016, PT II (2016)

Article Computer Science, Software Engineering

UPPAAL SMC tutorial

Alexandre David et al.

INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER (2015)

Proceedings Paper Computer Science, Software Engineering

Fault Trees on a Diet - Automated Reduction by Graph Rewriting

Sebastian Junges et al.

DEPENDABLE SOFTWARE ENGINEERING: THEORIES, TOOLS, AND APPLICATIONS, SETTA 2015 (2015)

Article Computer Science, Information Systems

Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools

Enno Ruijters et al.

COMPUTER SCIENCE REVIEW (2015)

Article Computer Science, Theory & Methods

STOCHASTIC TIMED AUTOMATA

Nathalie Bertrand et al.

LOGICAL METHODS IN COMPUTER SCIENCE (2014)

Review Computer Science, Information Systems

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

Barbara Kordy et al.

COMPUTER SCIENCE REVIEW (2014)

Article Computer Science, Theory & Methods

Model checking for probabilistic timed automata

Gethin Norman et al.

FORMAL METHODS IN SYSTEM DESIGN (2013)

Article Computer Science, Theory & Methods

Approximation Metrics Based on Probabilistic Bisimulations for General State-Space Markov Processes: A Survey

Alessandro Abate

ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE (2013)