Results 71 to 80 of about 264,857 (253)

"Borrowing Arrows with Thatched Boats": The Art of Defeating Reactive Jammers in IoT Networks [PDF]

open access: yesarXiv, 2019
In this article, we introduce a novel deception strategy which is inspired by the "Borrowing Arrows with Thatched Boats", one of the most famous military tactics in the history, in order to defeat reactive jamming attacks for low-power IoT networks. Our proposed strategy allows resource-constrained IoT devices to be able to defeat powerful reactive ...
arxiv  

Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation [PDF]

open access: yesarXiv, 2019
Deception is a technique to mislead human or computer systems by manipulating beliefs and information. For the applications of cyber deception, non-cooperative games become a natural choice of models to capture the adversarial interactions between the players and quantitatively characterizes the conflicting incentives and strategic responses.
arxiv  

Multipath effect analysis and pre-distortion processing for jamming on wideband ground radar through antenna sidelobe

open access: yesThe Journal of Engineering, 2019
The multipath transmission has a serious effect on jamming efficiency in a short distance ECM task for wideband ground radars. After the sidelobe gain model for a large antenna is introduced, the characteristics of multipath channel in time and frequency
Rong Shi, Jiantao Xu
doaj   +1 more source

Defensive deception against reactive jamming attacks in remote state estimation [PDF]

open access: green, 2019
Kemi Ding   +4 more
openalex   +1 more source

Research on Cross-eye Jamming Technique based on Phase Diversity Processing

open access: yesMATEC Web of Conferences, 2016
The cross-eye jamming technique is a common method for monopulse tracking radar, which can cause a displacement towards the wrong direction and result in an angle deception.
Yu Daobin, Wang Hongyan, Wu Yanhong
doaj   +1 more source

Advances in Anti-Deception Jamming Strategies for Radar Systems: A Survey [PDF]

open access: yesarXiv
Deception jamming has long been a significant threat to radar systems, interfering with search, acquisition, and tracking by introducing false information that diverts attention from the targets of interest. As deception strategies become more sophisticated, the vulnerability of radar systems to these attacks continues to escalate.
arxiv  

Deceptive Jamming Method with Micro-motion Property Against ISAR

open access: yesRadioengineering, 2017
Airborne target's micro-motion such as rotation or vibration causes phase modulation, termed as micro-Doppler effect, into radar signals. The feature of micro-motion is one of the most obvious features for radar recognition in mid-course phase. In traditional works, it is assumed that the micro-motion of the scatterer is the same as the ballistic ...
Tai, Ning   +4 more
openaire   +4 more sources

Analysis of Deception Jamming Effects on FM Radio based Passive Radar [PDF]

open access: gold, 2022
Kyu‐Ha Song   +5 more
openalex   +1 more source

A Broadband Information Metasurface-Assisted Target Jamming System for Synthetic Aperture Radar

open access: yesRemote Sensing
In recent years, jamming strategies for Synthetic Aperture Radar (SAR) pertaining to target detection and identification, such as the creation of false targets, electromagnetic (EM) deception, and signal spoofing, have been increasingly emphasized ...
Hua Li   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy