Results 61 to 70 of about 69,090 (215)

Galileo and EGNOS as an asset for UTM safety and security [PDF]

open access: yes, 2019
GAUSS (Galileo-EGNOS as an Asset for UTM Safety and Security) is a H2020 project1 that aims at designing and developing high performance positioning systems for drones within the U-Space framework focusing on UAS (Unmanned Aircraft System) VLL (Very Low ...
Andrade-Cetto, Juan   +7 more
core  

Biased Stackelberg game‐based UAV relay anti‐jamming communications: Exploiting trajectory optimization and transmission mode selection

open access: yesIET Communications, 2022
Although unmanned aerial vehicle (UAV) relay can provide auxiliary communication due to its flexible mobility, it is vulnerable to jamming attacks. This paper considers the UAV relay anti‐jamming communication issue under the threat of a malicious jammer
Zhe Su   +4 more
doaj   +1 more source

Cyber-Security in Smart Grid: Survey and Challenges

open access: yes, 2018
Smart grid uses the power of information technology to intelligently deliver energy to customers by using a two-way communication, and wisely meet the environmental requirements by facilitating the integration of green technologies.
Ghazi, Hamid El   +3 more
core   +1 more source

Feature extraction algorithm of anti-jamming cyclic frequency of electronic communication signal

open access: yesJournal of Intelligent Systems, 2023
Anti-jamming cyclic frequency feature extraction is an important link in identifying communication interference signals, which is of great significance for eliminating electronic communication interference factors and improving the security of electronic
Yang Xuemei
doaj   +1 more source

Intelligent OFDM telecommunication system. Part 3. Anti-eavesdropping and anti-jamming properties of system, based on many-parameter wavelet and Golay transforms [PDF]

open access: yes, 2019
In this paper, we aim to investigate the superiority and practicability of many-parameter Fourier transforms (MPFT) from the physical layer security (PHY-LS) perspective.
Chasovskikh, V. P.   +4 more
core  

Mitigating Jamming Attacks Using Energy Harvesting

open access: yes, 2019
The use of energy harvesting as a counter-jamming measure is investigated on the premise that part of the harmful interference can be harvested to increase the transmit power.
Belmega, E. Veronica   +2 more
core   +1 more source

An Intelligent Anti-Jamming Scheme for Cognitive Radio Based on Deep Reinforcement Learning

open access: yesIEEE Access, 2020
Cognitive radio network is an intelligent wireless communication system which can adjust its transmission parameters according to the environment thanks to its learning ability.
Jianliang Xu   +3 more
doaj   +1 more source

Alibi framework for identifying reactive jamming nodes in wireless LAN [PDF]

open access: yes, 2010
Reactive jamming nodes are the nodes of the network that get compromised and become the source of jamming attacks. They assume to know any shared secrets and protocols used in the networks. Thus, they can jam very effectively and are very stealthy.
Nahrstedt, Klara   +2 more
core  

Home - About - Disclaimer - Privacy