all InfoSec news
Continuous Operator Authentication for Teleoperated Systems Using Hidden Markov Models. (arXiv:2010.14006v3 [cs.CR] UPDATED)
Feb. 25, 2022, 2:20 a.m. | Junjie Yan, Kevin Huang, Kyle Lindgren, Tamara Bonaci, Howard Jay Chizeck
cs.CR updates on arXiv.org arxiv.org
In this paper, we present a novel approach for continuous operator
authentication in teleoperated robotic processes based on Hidden Markov Models
(HMM). While HMMs were originally developed and widely used in speech
recognition, they have shown great performance in human motion and activity
modeling. We make an analogy between human language and teleoperated robotic
processes (i.e. words are analogous to a teleoperator's gestures, sentences are
analogous to the entire teleoperated task or process) and implement HMMs to
model the teleoperated …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Systems Security Officer (ISSO) (Remote within HR Virginia area)
@ OneZero Solutions | Portsmouth, VA, USA
Security Analyst
@ UNDP | Tripoli (LBY), Libya
Senior Incident Response Consultant
@ Google | United Kingdom
Product Manager II, Threat Intelligence, Google Cloud
@ Google | Austin, TX, USA; Reston, VA, USA
Cloud Security Analyst
@ Cloud Peritus | Bengaluru, India