Results 81 to 90 of about 264,857 (253)

A Barrage Noise Jamming Method Based on Double Jammers Against Three Channel SAR GMTI

open access: yesIEEE Access, 2019
Many jamming methods have been proposed against displaced phase center antenna (DPCA) process, which is a type of three-channel synthetic aperture radar (SAR) ground moving target indication.
Xin Chang, Chunxi Dong
doaj   +1 more source

Modeling and Analysis of Leaky Deception using Signaling Games with Evidence [PDF]

open access: yesarXiv, 2018
Deception plays critical roles in economics and technology, especially in emerging interactions in cyberspace. Holistic models of deception are needed in order to analyze interactions and to design mechanisms that improve them. Game theory provides such models. In particular, existing work models deception using signaling games.
arxiv  

Waveform-Domain Complementary Signal Sets for Interrupted Sampling Repeater Jamming Suppression [PDF]

open access: yesarXiv
The interrupted-sampling repeater jamming (ISRJ) is coherent and has the characteristic of suppression and deception to degrade the radar detection capabilities. The study focuses on anti-ISRJ techniques in the waveform domain, primarily capitalizing on waveform design and and anti-jamming signal processing methods in the waveform domain.
arxiv  

Overview of Radar Jamming Waveform Design

open access: yesRemote Sensing
Radar jamming waveform design is a vital part of radar jamming. Over seven to eight decades of evolution, the field has transitioned from noise signal design to coherent jamming signal design, resulting in a multitude of complex jamming styles capable of
Yu Pan   +4 more
doaj   +1 more source

Smart forwarding deceptive jamming distribution optimal algorithm

open access: yesIET Radar, Sonar & Navigation
AbstractWith the frequent occurrence of drone black flying in large stadiums and airports, the requirement of precise electromagnetic interference to achieve unmanned aerial vehicle (UAV) displacement and forced landing in these protected area became urgent.
Chengkai Tang   +3 more
openaire   +2 more sources

Reactive Synthesis of Sensor Revealing Strategies in Hypergames on Graphs [PDF]

open access: yesarXiv
In many security applications of cyber-physical systems, a system designer must guarantee that critical missions are satisfied against attacks in the sensors and actuators of the CPS. Traditional security design of CPSs often assume that attackers have complete knowledge of the system.
arxiv  

Intelligent Reflecting Surface-Aided Radar Spoofing [PDF]

open access: yesarXiv
Electronic countermeasure (ECM) technology plays a critical role in modern electronic warfare, which can interfere with enemy radar detection systems by noise or deceptive signals. However, the conventional active jamming strategy incurs additional hardware and power costs and has the potential threat of exposing the target itself.
arxiv  

Home - About - Disclaimer - Privacy