2022
DOI: 10.1007/s10845-021-01879-9
|View full text |Cite
|
Sign up to set email alerts
|

An LSTM-autoencoder based online side channel monitoring approach for cyber-physical attack detection in additive manufacturing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(8 citation statements)
references
References 61 publications
0
5
0
Order By: Relevance
“…The hash function, also known as the hash function, its functional feature is that it can output fixed length summary information after a series of changes and processing of an unlimited length message, and the resulting summary result is called a hash value [10,5]. The hash function has unidirectionality, meaning that its encryption process is easily implemented in a computer, while the decryption process is not feasible in a computer.…”
Section: Sm3 Password Hash Algorithmmentioning
confidence: 99%
“…The hash function, also known as the hash function, its functional feature is that it can output fixed length summary information after a series of changes and processing of an unlimited length message, and the resulting summary result is called a hash value [10,5]. The hash function has unidirectionality, meaning that its encryption process is easily implemented in a computer, while the decryption process is not feasible in a computer.…”
Section: Sm3 Password Hash Algorithmmentioning
confidence: 99%
“…In-situ monitoring is largely applied in AM for defect and anomaly detection. Sensors 118,190 and high-resolution cameras 189,192,195 are commonly used to detect defects in real-time. Data acquired from sensor signals and processed images are often combined with ML techniques for predicting defects in the early stages of printing process.…”
Section: In-situ Monitoringmentioning
confidence: 99%
“…As observed in this work, the method based on audio signal requires less expensive installation, but it is more sensitive to the background noise, thus making the method based on video stream preferable in long run. Cyberattack detection in additive manufacturing based on vibration signal was also explored [26], where the features extracted using LSTM (long short-term memory recurrent neural networks) based autoencoder were employed.…”
Section: Cybersecurity Challenges In Distributed Motion Controlmentioning
confidence: 99%