Results 41 to 50 of about 4,570 (279)

Expanding research on corporate corruption, management and organizations [PDF]

open access: yes, 2017
In this special issue introduction, we briefly describe a variety of research paths researchers have followed to study the multifaceted phenomenon of corruption.
Hirsch, Paul   +3 more
core   +1 more source

Radar active deception jamming recognition based on Siamese squeeze wavelet attention network

open access: yesIET Radar, Sonar & Navigation, 2023
Active deception jamming recognition has gained significant attention as a crucial aspect of modern electronic warfare, and a large quantity of jamming recognition methods based on either artificial or deep learning methods have been proposed to date. In
Zhenhua Wu   +4 more
doaj   +1 more source

Reconfigurable Intelligent Surface-Assisted Radar Deception Electronic Counter-Countermeasures

open access: yesRemote Sensing, 2023
A reconfigurable intelligent surface (RIS) is a promising technology for wireless communication and radar detection, owing to its superior ability to realize smart radio environments. Inspired by previous studies on RISs, this study deals with the use of
Shanshan Zhao   +3 more
doaj   +1 more source

Game Theory Meets Network Security: A Tutorial at ACM CCS

open access: yes, 2018
The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and ...
Chen J.   +8 more
core   +1 more source

The Prowler IADS performance evaluation tool (PIPE) [PDF]

open access: yes, 1994
The Prowler IADS Performance Evaluator is a computer simulation model of an airstrike protected by electronic countermeasures platforms. It is designed for integration into mission planning systems and analysis tools used to determine the effectiveness ...
Bailey, Michael P.   +2 more
core   +1 more source

Generation of a synthetic aperture radar deception jamming signal based on a deep echo inversion network

open access: yesIET Radar, Sonar & Navigation, 2023
Existing methods for generating synthetic aperture radar (SAR) deception jamming signals have slow speed, low imaging quality, and insufficient intelligence in complex electromagnetic environments.
Yihan Xiao   +4 more
doaj   +1 more source

Fake-Acknowledgment Attack on ACK-based Sensor Power Schedule for Remote State Estimation [PDF]

open access: yes, 2015
We consider a class of malicious attacks against remote state estimation. A sensor with limited resources adopts an acknowledgement (ACK)-based online power schedule to improve the remote state estimation performance.
Dey, Subhrakanti   +3 more
core   +3 more sources

Self-triggered Coordination over a Shared Network under Denial-of-Service

open access: yes, 2015
The issue of security has become ever more prevalent in the analysis and design of cyber-physical systems. In this paper, we analyze a consensus network in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent communication among ...
De Persis, Claudio   +2 more
core   +1 more source

Radar Active Deception Jamming Recognition Method Based on the Time-varying Polarization-conversion Metasurface

open access: yesLeida xuebao
In this study, aiming at fulfilling the requirement of polarization acquisition and utilization, a method for active deception jamming recognition based on the time-varying polarization-conversion metasurface is investigated.
Yan CHEN   +4 more
doaj   +1 more source

Time-Domain Scattering Characteristics and Jamming Effectiveness in Corner Reflectors

open access: yesIEEE Access, 2021
The outboard corner reflectors are widely used as a countermeasure to radar tracking and detection. Therefore, it is essential to determine the composite time-domain scattering characteristics of the corner reflector and ship against the sea background ...
Ying Luo   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy