Theory and Design of Blink Jamming
Establishing an error in the angle estimates of a monopulse radar is critical to creating miss distance during the terminal stage of missile engagements. However, the tools for creating angle deception are limited, with blink jamming offering significant
Kyle Davidson, Joey Bray
doaj +1 more source
Radar Main-Lobe Jamming Suppression Based on Adaptive Opposite Fireworks Algorithm
In the presence of the main lobe jamming, the performance of the modern radar system would degrade significantly. In this study, a blind source separation (BSS) method based on an Adaptive Opposite Fireworks Algorithm (AOFWA) is proposed to address the ...
Weilin Luo+3 more
doaj +1 more source
Multi-stage Jamming Attacks Detection using Deep Learning Combined with Kernelized Support Vector Machine in 5G Cloud Radio Access Networks [PDF]
In 5G networks, the Cloud Radio Access Network (C-RAN) is considered a promising future architecture in terms of minimizing energy consumption and allocating resources efficiently by providing real-time cloud infrastructures, cooperative radio, and centralized data processing.
arxiv
UNIDECOR: A Unified Deception Corpus for Cross-Corpus Deception Detection [PDF]
Verbal deception has been studied in psychology, forensics, and computational linguistics for a variety of reasons, like understanding behaviour patterns, identifying false testimonies, and detecting deception in online communication. Varying motivations across research fields lead to differences in the domain choices to study and in the ...
arxiv
Variable pulse width dexterous jamming based on chaotic sampling fusion [PDF]
Aiming at the problem of strong distribution regularity of false targets in traditional repetitive repeater deception jamming, this paper proposes a variable pulse width smart jamming method based on intermittent chaotic sampling from the perspective of ...
WANG Guoxuan, YE Zijie
doaj +1 more source
Adaptive Dual-Polarization Filtering Method for Countering Active Jamming
In order to counter active jamming, an adaptive polarization filtering method based on dual polarization radar is put forward. First, the signal flow principle of the dual polarization radar and its signal model are introduced.
Qiang Zhang+3 more
doaj +1 more source
OFDM-based JCAS under Attack: The Dual Threat of Spoofing and Jamming in WLAN Sensing [PDF]
This study reveals the vulnerabilities of Wireless Local Area Networks (WLAN) sensing, under the scope of joint communication and sensing (JCAS), focusing on target spoofing and deceptive jamming techniques. We use orthogonal frequency-division multiplexing (OFDM) to explore how adversaries can exploit WLAN's sensing capabilities to inject false ...
arxiv +1 more source
Cyber Deception for Computer and Network Security: Survey and Challenges [PDF]
Cyber deception has recently received increasing attentions as a promising mechanism for proactive cyber defense. Cyber deception strategies aim at injecting intentionally falsified information to sabotage the early stage of attack reconnaissance and planning in order to render the final attack action harmless or ineffective.
arxiv
Deception Jamming for Squint SAR Based on Multiple Receivers
A deception jamming method for synthetic aperture radar (SAR) based on multiple receivers is proposed. This method deals with the parameters of hostile SAR as a whole for deception jamming. By measuring the range differences between different receivers, higher accuracy can be achieved than detecting each of the parameters directly.
Bo Zhao, Zheng Bao, Feng Zhou
openaire +2 more sources
Research on Delay Error of UAV Swarm Repeater Deception Jamming against Networked Radar [PDF]
In modern warfare, the use of UAV swarm to deceive and interfere with the hostile networked radar has been widely used as an effective countermeasure. However, when facing a complex combat environment, the digital storage and forwarding equipment carried
Shi Chenguang, Wen Wen, Song Haiwei, Tian Da, Zhou Jianjiang
doaj +1 more source