Recognizing Non-Collaborative Radio Station Communication Behaviors Using an Ameliorated LeNet
This work improves a LeNet model algorithm based on a signal’s bispectral features to recognize the communication behaviors of a non-collaborative short-wave radio station.
Zilong Wu, Hong Chen, Yingke Lei
doaj +1 more source
The Prowler IADS performance evaluation tool (PIPE) [PDF]
The Prowler IADS Performance Evaluator is a computer simulation model of an airstrike protected by electronic countermeasures platforms. It is designed for integration into mission planning systems and analysis tools used to determine the effectiveness ...
Bailey, Michael P. +2 more
core +1 more source
Improved features using convolution-augmented transformers for keyword spotting [PDF]
Transformer can effectively model long rang dependency, but suffer from uncapable to extract local feature patterns. While CNNs exploit local features effectively.
Wang Yi +4 more
doaj +1 more source
Communication behavior recognition using CNN-based signal analysis [PDF]
This article explores the technology of recognizing non-cooperative communication behavior, with a specific emphasis on analyzing communication station signals.
Hao Meng +5 more
doaj +2 more sources
Combatting electoral traces: the Dutch tempest discussion and beyond [PDF]
In the Dutch e-voting debate, the crucial issue leading to the abandonment of all electronic voting machines was compromising radiation, or tempest. Other countries, however, do not seem to be bothered by this risk.
A.M. Keller +8 more
core +5 more sources
Return-Map Cryptanalysis Revisited [PDF]
As a powerful cryptanalysis tool, the method of return-map attacks can be used to extract secret messages masked by chaos in secure communication schemes.
GONZALO ÁLVAREZ +8 more
core +4 more sources
Security risk assessment and protection in the chemical and process industry [PDF]
This article describes a security risk assessment and protection methodology that was developed for use in the chemical- and process industry in Belgium. The approach of the method follows a risk-based approach that follows desing principles for chemical
American Petroleum Institute +19 more
core +1 more source
Two-Dimensional Angle Estimation of Two-Parallel Nested Arrays Based on Sparse Bayesian Estimation
To increase the number of estimable signal sources, two-parallel nested arrays are proposed, which consist of two subarrays with sensors, and can estimate the two-dimensional (2-D) direction of arrival (DOA) of signal sources.
Lu Chen, Daping Bi, Jifei Pan
doaj +1 more source
An n-sided polygonal model to calculate the impact of cyber security events [PDF]
This paper presents a model to represent graphically the impact of cyber events (e.g., attacks, countermeasures) in a polygonal systems of n-sides. The approach considers information about all entities composing an information system (e.g., users, IP ...
F Cuppens +6 more
core +2 more sources
Risk Assessment of a Wind Turbine: A New FMECA-Based Tool With RPN Threshold Estimation [PDF]
A wind turbine is a complex system used to convert the kinetic energy of the wind into electrical energy. During the turbine design phase, a risk assessment is mandatory to reduce the machine downtime and the Operation & Maintenance cost and to ensure ...
Catelani, Marcantonio +3 more
core +3 more sources

