Bhuyan, M. H., Bhattacharyya, D. K., and Kalita, J. K.
(2014). Network anomaly detection: methods, sys-
tems and tools. Ieee communications surveys & tuto-
rials, 16(1):303–336.
Bispham, M. K., Agrafiotis, I., and Goldsmith, M. (2018a).
Nonsense attacks on google assistant. arXiv preprint
arXiv:1808.01947.
Bispham, M. K., Agrafiotis, I., and Goldsmith, M. (2018b).
A taxonomy of attacks via the speech interface. pend-
ing publication in The Third International Conference
on Cyber-Technologies and Cyber-Systems (CYBER
2018).
Boyd, J. R. (1996). The essence of winning and losing.
Unpublished lecture notes, 12(23):123–125.
Brehmer, B. (2005). The dynamic ooda loop: Amalgamat-
ing boyd’s ooda loop and the dynamic decision loop.
Budanitsky, A. and Hirst, G. (2001). Semantic distance in
wordnet: An experimental, application-oriented eval-
uation of five measures. In Workshop on WordNet and
other lexical resources, volume 2, pages 2–2.
Carlini, N., Mishra, P., Vaidya, T., Zhang, Y., Sherr, M.,
Shields, C., Wagner, D., and Zhou, W. (2016). Hid-
den voice commands. In 25th USENIX Security Sym-
posium (USENIX Security 16), Austin, TX.
Ciesielski, A., Yeh, B., Gordge, K., Basescu, M., and Tun-
stel, E. (2017). Vocal human-robot interaction in-
spired by battle management language. In Systems,
Man, and Cybernetics (SMC), 2017 IEEE Interna-
tional Conference on, pages 3379–3384. IEEE.
Dhanjani, N. (2015). Abusing the Internet of Things: Black-
outs, Freakouts, and Stakeouts. O’Reilly Media, Inc.
Diao, W., Liu, X., Zhou, Z., and Zhang, K. (2014). Your
voice assistant is mine: How to abuse speakers to steal
information and control your phone. In Proceedings
of the 4th ACM Workshop on Security and Privacy in
Smartphones & Mobile Devices, pages 63–74. ACM.
Giraldo, J., Sarkar, E., Cardenas, A. A., Maniatakos, M.,
and Kantarcioglu, M. (2017). Security and privacy in
cyber-physical systems: A survey of surveys. IEEE
Design & Test, 34(4):7–17.
Gomaa, W. H. and Fahmy, A. A. (2013). A survey of text
similarity approaches. International Journal of Com-
puter Applications, 68(13):13–18.
Gong, Y. and Poellabauer, C. (2018). An overview of
vulnerabilities of voice controlled systems. arXiv
preprint arXiv:1803.09156.
Hansen, J. H. and Hasan, T. (2015). Speaker recognition by
machines and humans: A tutorial review. IEEE Signal
processing magazine, 32(6):74–99.
Hasan, M. R., Jamil, M., Rahman, M., et al. (2004).
Speaker identification using mel frequency cepstral
coefficients. variations, 1(4).
Jackson, C. and Orebaugh, A. (2018). A study of security
and privacy issues associated with the amazon echo.
International Journal of Internet of Things and Cyber-
Assurance, 1(1):91–100.
Jia, R. and Liang, P. (2017). Adversarial examples for eval-
uating reading comprehension systems. arXiv preprint
arXiv:1707.07328.
Kaljurand, K. and Alum
¨
ae, T. (2012). Controlled natural
language in speech recognition based user interfaces.
In International Workshop on Controlled Natural Lan-
guage, pages 79–94. Springer.
Khan, O. Z. and Sarikaya, R. (2016). Making personal dig-
ital assistants aware of what they do not know. In IN-
TERSPEECH, pages 1161–1165.
Klein, G., Tolle, J., and Martini, P. (2011). From detec-
tion to reaction-a holistic approach to cyber defense.
In Defense Science Research Conference and Expo
(DSR), 2011, pages 1–4. IEEE.
Kong, X., Choi, J.-Y., and Shattuck-Hufnagel, S. (2017).
Evaluating automatic speech recognition systems in
comparison with human perception results using dis-
tinctive feature measures. In Acoustics, Speech and
Signal Processing (ICASSP), 2017 IEEE International
Conference on, pages 5810–5814. IEEE.
Kuhn, T. (2014). A survey and classification of con-
trolled natural languages. Computational Linguistics,
40(1):121–170.
Lison, P. and Meena, R. (2014). Spoken dialogue sys-
tems: the new frontier in human-computer interaction.
XRDS: Crossroads, The ACM Magazine for Students,
21(1):46–51.
Loukas, G., Gan, D., and Vuong, T. (2013). A taxonomy of
cyber attack and defence mechanisms for emergency
management networks. In Pervasive Computing and
Communications Workshops (PERCOM Workshops),
2013 IEEE International Conference on, pages 534–
539. IEEE.
McShane, M., Blissett, K., and Nirenburg, I. (2017). Treat-
ing unexpected input in incremental semantic analy-
sis. In Proceedings of The Fifth Annual Conference on
Advances in Cognitive Systems. Palo Alto, CA: Cog-
nitive Systems Foundation.
McTear, M., Callejas, Z., and Griol, D. (2016). The conver-
sational interface. Springer.
Patten, T., Call, C., Mitchell, D., Taylor, J., and Lasser, S.
(2016). Defining the malice space with natural lan-
guage processing techniques. In Cybersecurity Sym-
posium (CYBERSEC), 2016, pages 44–50. IEEE.
Petracca, G., Sun, Y., Jaeger, T., and Atamli, A. (2015).
Audroid: Preventing attacks on audio channels in mo-
bile devices. In Proceedings of the 31st Annual Com-
puter Security Applications Conference, pages 181–
190. ACM.
Pucher, M., T
¨
urk, A., Ajmera, J., and Fecher, N. (2007).
Phonetic distance measures for speech recognition vo-
cabulary and grammar optimization. In 3rd congress
of the Alps Adria Acoustics Association, pages 2–5.
Rieck, K. and Laskov, P. (2006). Detecting unknown net-
work attacks using language models. In International
Conference on Detection of Intrusions and Malware,
and Vulnerability Assessment, pages 74–90. Springer.
Roy, N., Shen, S., Hassanieh, H., and Choudhury, R. R.
(2018). Inaudible voice commands: The long-range
attack and defense. In 15th USENIX Symposium on
Networked Systems Design and Implementation NSDI
18), pages 547–560. USENIX Association.
ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy
526