Results 41 to 50 of about 2,778 (290)

Sensitive Ants for Denial Jamming Attack on Wireless Sensor Network

open access: yes, 2013
A new defence mechanism for different jamming attack on Wireless Sensor Network (WSN) based on ant system it is introduced. The artificial sensitive ants react on network attacks in particular based on their sensitivity level.
Pintea, Camelia-M., Pop, Petrica C.
core   +1 more source

Game Theory Meets Network Security: A Tutorial at ACM CCS

open access: yes, 2018
The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and ...
Chen J.   +8 more
core   +1 more source

Towards Stabilization of Distributed Systems under Denial-of-Service

open access: yes, 2017
In this paper, we consider networked distributed systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network.
De Persis, Claudio   +2 more
core   +2 more sources

A novel cheater and jammer detection scheme for IEEE 802.11-based wireless LANs [PDF]

open access: yes, 2015
The proliferation of IEEE 802.11 networks has made them an easy and attractive target for malicious devices/adversaries which intend to misuse the available network.
Afaqui, Muhammad Shahwaiz   +2 more
core   +2 more sources

Multi-Layer Cyber-Physical Security and Resilience for Smart Grid

open access: yes, 2018
The smart grid is a large-scale complex system that integrates communication technologies with the physical layer operation of the energy systems. Security and resilience mechanisms by design are important to provide guarantee operations for the system ...
CH Hauser   +19 more
core   +1 more source

Cyber security standards and issues in V2X communications for Internet of Vehicles [PDF]

open access: yes, 2018
Significant developments have taken place over the past few years in the area of vehicular communication systems in the ITS environment. It is vital that, in these environments, security is considered in design and implementation since compromised ...
Ivanov, Ivan V.   +3 more
core   +1 more source

Countering self‐protection smeared spectrum jamming against chirp radars

open access: yesIET Radar, Sonar & Navigation, 2021
Chirp radars are vulnerable to various types of deceptive jamming for example, smeared spectrum (SMSP) jamming that generates multiple false targets, which lead and lag the true target.
Samer Baher Safa Hanbali
doaj   +1 more source

“When China Meets China”: Sinéad Morrissey’s Figurations of the Orient, or the Function of Alterity in Julia Kristeva and Paul Ricoeur [PDF]

open access: yes, 2014
This article attempts to investigate the potential resonances between Paul Ricoeur’s and Julia Kristeva’s theories of otherness as applied to the study of poetry by the Northern-Irish poet Sinéad Morrissey.
Czemiel, Grzegorz
core   +2 more sources

‘People Need to Understand That They Are Stealing From Their Neighbours’: A Critical Media Analysis of the Representations and Resistance Throughout the Robodebt Scheme

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT The Robodebt scheme issued thousand‐dollar debts to an estimated half a million people who had received social security. The debts were largely inaccurate and illegal, with the aim of improving the federal government's budget. The 2023 Royal Commission into the Robodebt Scheme found that the stigmatising political and public language about ...
Ella Kruger, Phillipa Evans
wiley   +1 more source

An Anti-2D Deceptive Jamming Method for Bistatic SAR Based on Jammer Localization

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
Synthetic aperture radar (SAR) is an essential instrument for Earth observation but is vulnerable to intentional electromagnetic jamming during imaging. Two-dimensional (2-D) deceptive jamming can introduce highly realistic false targets into SAR images,
Jiale Zhang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy