Results 41 to 50 of about 268,722 (244)
One-bit splitting deceptive jamming against SAR
One-bit quantization is a promising technique due to its performance retention and complexity reduction in a deceptive jammer against synthetic aperture radar (SAR). In this paper, the 1-bit quantization technology is utilized to agilely generate split false targets in the SAR imagery once the radar signal is intercepted, which reduces the complexity ...
Bing Li+5 more
openaire +3 more sources
Understanding the potential of Self-Protection Jamming on board of miniature UAVs [PDF]
Unarmed Aerial Vehicle (UAV) systems are very challenging targets due to their small size and ability to fly in low altitudes and speed. Particularly, in radar systems UAVs can exhibit similar radar cross section and Doppler parameters to clutter returns
Clemente, Carmine+2 more
core +1 more source
Mixed jamming suppression algorithm for phased array radar
The most common type of mixed jamming is composed of blanket jamming and deception jamming. In order to effectively detect the target signal in this kind of mixed jamming, this study presents an algorithm based on side-lobe cancellation (SLC) and slope ...
Meng Zhang+4 more
doaj +1 more source
Based on the active interference suppression algorithm, this study combines the radar working mode and the interference type and realizes the effective detection of the flaw detection signal by successively processing the radar receiving signal and the ...
Wenping Wu
doaj +1 more source
Trojan Spoofing: A Threat to Critical Infrastructure [PDF]
This article explores the phenomenon of location spoofing – where the spoofer is able to ‘teleport’ systems in and out of defined locations, either for the purpose of infiltration into no-go zones or for the ‘teleportation’ out of real, defined zones in ...
Westbrook, Tegg
core +1 more source
Deceptive Jamming Detection for SAR Based on Cross-Track Interferometry [PDF]
Deceptive jamming against synthetic aperture radar (SAR) can create false targets or deceptive scenes in the image effectively. Based on the difference in interferometric phase between the target and deceptive jamming signals, a novel method for detecting deceptive jamming using cross-track interferometry is proposed, where the echoes with deceptive ...
Feng, Q., Xu, H., Wu, Z., Liu, W.
openaire +4 more sources
Pinocchio's Pupil: Using Eyetracking and Pupil Dilation to Understand Truth Telling and Deception in Sender-Receiver Games [PDF]
We report experiments on sender-receiver games with an incentive for senders to exaggerate. Subjects "overcommunicate" -- messages are more informative of the true state than they should be, in equilibrium.
Camerer, Colin F.+2 more
core +3 more sources
Evaluation of Deceptive Jamming Effect on SAR Based on Visual Consistency
In complicated electromagnetic environments, synthetic aperture radar (SAR) can be threatened by various kinds of malicious interference,of which deceptive jamming is the intentional and efficient one.
Zhouyang Tang+4 more
doaj +1 more source
CNA Tactics and Techniques: A Structure Proposal [PDF]
[EN] Destructive and control operations are today a major threat for cyber physical systems. These operations, known as Computer Network Attack (CNA), and usually linked to state-sponsored actors, are much less analyzed than Computer Network Exploitation
Marco-Gisbert, Héctor+2 more
core +1 more source
A Domain-Independent Holistic Approach to Deception Detection [PDF]
The deception in the text can be of different forms in different domains, including fake news, rumor tweets, and spam emails. Irrespective of the domain, the main intent of the deceptive text is to deceit the reader. Although domain-specific deception detection exists, domain-independent deception detection can provide a holistic picture, which can be ...
arxiv +1 more source