Results 41 to 50 of about 4,570 (279)
Expanding research on corporate corruption, management and organizations [PDF]
In this special issue introduction, we briefly describe a variety of research paths researchers have followed to study the multifaceted phenomenon of corruption.
Hirsch, Paul +3 more
core +1 more source
Radar active deception jamming recognition based on Siamese squeeze wavelet attention network
Active deception jamming recognition has gained significant attention as a crucial aspect of modern electronic warfare, and a large quantity of jamming recognition methods based on either artificial or deep learning methods have been proposed to date. In
Zhenhua Wu +4 more
doaj +1 more source
Reconfigurable Intelligent Surface-Assisted Radar Deception Electronic Counter-Countermeasures
A reconfigurable intelligent surface (RIS) is a promising technology for wireless communication and radar detection, owing to its superior ability to realize smart radio environments. Inspired by previous studies on RISs, this study deals with the use of
Shanshan Zhao +3 more
doaj +1 more source
Game Theory Meets Network Security: A Tutorial at ACM CCS
The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and ...
Chen J. +8 more
core +1 more source
The Prowler IADS performance evaluation tool (PIPE) [PDF]
The Prowler IADS Performance Evaluator is a computer simulation model of an airstrike protected by electronic countermeasures platforms. It is designed for integration into mission planning systems and analysis tools used to determine the effectiveness ...
Bailey, Michael P. +2 more
core +1 more source
Existing methods for generating synthetic aperture radar (SAR) deception jamming signals have slow speed, low imaging quality, and insufficient intelligence in complex electromagnetic environments.
Yihan Xiao +4 more
doaj +1 more source
Fake-Acknowledgment Attack on ACK-based Sensor Power Schedule for Remote State Estimation [PDF]
We consider a class of malicious attacks against remote state estimation. A sensor with limited resources adopts an acknowledgement (ACK)-based online power schedule to improve the remote state estimation performance.
Dey, Subhrakanti +3 more
core +3 more sources
Self-triggered Coordination over a Shared Network under Denial-of-Service
The issue of security has become ever more prevalent in the analysis and design of cyber-physical systems. In this paper, we analyze a consensus network in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent communication among ...
De Persis, Claudio +2 more
core +1 more source
In this study, aiming at fulfilling the requirement of polarization acquisition and utilization, a method for active deception jamming recognition based on the time-varying polarization-conversion metasurface is investigated.
Yan CHEN +4 more
doaj +1 more source
Time-Domain Scattering Characteristics and Jamming Effectiveness in Corner Reflectors
The outboard corner reflectors are widely used as a countermeasure to radar tracking and detection. Therefore, it is essential to determine the composite time-domain scattering characteristics of the corner reflector and ship against the sea background ...
Ying Luo +3 more
doaj +1 more source

