Development status and challenges of anti-spoofing technology of GNSS/INS integrated navigation [PDF]
The threat of spoofing interference has posed a severe challenge to the security application of Global Navigation Satellite System (GNSS). It is particularly urgent and critical to carry out in-depth defense research on spoofing interference.
Baiyu Li +11 more
core +1 more source
ABSTRACT Objective This study examines whether political violence affects Americans’ commitment to democratic participation. It theorizes that political violence undermines citizens’ commitment to core democratic behaviors. However, neighborhood social cohesion mitigates the effect of political violence on reduced democratic participation.
James A. Piazza
wiley +1 more source
Defending the fleet : cybersecurity and autonomous ships [PDF]
Traditionally, ships navigated the oceans in relative isolation from the rest of the world. However, maritime navigation has become increasingly dependent on third parties due to new technologies such as satellite data transmission and shore-based ...
Stępień, Barbara
core +2 more sources
SMSP Mainlobe Jamming Suppression with FDA-MIMO Radar Based on FastICA Algorithm. [PDF]
Wan P, Liao G, Xu J, Fu X.
europepmc +1 more source
Signal Injection Test of Spoofing Attack to GNSS-Based Positioning in Railway Train Control [PDF]
With the continuous development of the railway transportation system, train operation control is becoming more and more significant as the core to guarantee the operational safety and efficiency. Train control based on Global Navigation Satellite System (
Cai, Bai-gen +3 more
core +2 more sources
Interrupted Sampling Repeater Jamming Suppression with Pulse Doppler Radar Using Linear Interpulse Frequency Coding [PDF]
Interrupted sampling repeater jamming (ISRJ) is an advanced coherent jamming, and the suppression of this jamming has become a critical problem for modern radar electronic countermeasure.
D. Zhou, Y. Ding, Y. Guo
core
Advancing Stepped-Waveform Radar Jamming Techniques for Robust False-Target Generation against LFM-CFAR Systems. [PDF]
Wang Y, Wang C, Shi Q, Huang J, Yuan N.
europepmc +1 more source
Two-Dimensional Barrage Jamming against SAR Using a Frequency Diverse Array Jammer. [PDF]
Zhang J +5 more
europepmc +1 more source
Jamming Intrusions in Extreme Bandwidth Communication: A Comprehensive Overview
As the evolution of wireless communication progresses towards 6G networks, extreme bandwidth communication (EBC) emerges as a key enabler to meet the ambitious key performance indicator set for this next-generation technology. 6G aims for peak data rates
Alouini, Mohamed-Slim +3 more
core
Intelligent Recognition of Chirp Radar Deceptive Jamming Based on Multi-Pulse Information Fusion. [PDF]
Lan X, Wan T, Jiang K, Xiong Y, Tang B.
europepmc +1 more source

