Results 91 to 100 of about 3,720 (193)

GNSS-WASP: GNSS Wide Area SPoofing

open access: yes
In this paper, we propose GNSS-WASP, a novel wide-area spoofing attack carried by a constellation of strategicallylocated synchronized transmitters. Unlike known attacks, which are constrained by the attacker’s ability to track victim receivers, GNSS-WASP manipulates the positions measured by all the receivers in a target area without knowing the ...
Tibaldo, Christopher   +3 more
openaire   +3 more sources

A New GNSS Spoofing Detection Method Using Two Antennas

open access: yesIEEE Access, 2020
The security of global navigation satellite system (GNSS) has attracted a lot of attention recently. The spoofing detection method using multi-antenna array is one of the most efficient spoofing detection methods due to its unique geometry space. However,
Jiajia Chen   +3 more
doaj   +1 more source

Space Weather and Financial Systems: Findings and Outlook. An event co-organised by the European Commission’s Joint Research Centre, the UK Civil Contingencies Secretariat and the NOAA Space Weather Prediction Centre 27 June, 2014, London, UK [PDF]

open access: yes, 2014
Space weather can affect both ground-based and space-borne infrastructures, potentially resulting in failures or service disruptions across the globe and causing damage to equipment and systems.
FELTON Chris   +4 more
core   +1 more source

Physical layer security in satellite communication: State‐of‐the‐art and open problems

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
This paper first classifies contemporary satellite communication networks into five domains and then analyse the use of PLS in each domain; these domains are hybrid satellite‐terrestrial networks, satellite‐based IoT, navigation satellite systems, FSO‐based satellites, and inter‐satellite communications.
Nora Abdelsalam   +2 more
wiley   +1 more source

A Framework for Robust Assimilation of Potentially Malign Third-Party Data, and its Statistical Meaning

open access: yes, 2019
This paper presents a model-based method for fusing data from multiple sensors with a hypothesis-test-based component for rejecting potentially faulty or otherwise malign data.
Horowitz, Roberto, Wright, Matthew A.
core   +1 more source

Enhanced Cybersecurity Framework for Unmanned Aerial Systems: A Comprehensive STRIDE‐Model Analysis and Emerging Defense Strategies

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Recent advancements in unmanned aerial vehicle (UAV) technology have facilitated its widespread adoption across a spectrum of sectors, such as commercial logistics, agricultural surveillance, industrial diagnostics, and military maneuvers. However, the widespread adoption has also engendered a burgeoning array of security concerns.
Hailong Xi   +8 more
wiley   +1 more source

Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks [PDF]

open access: yes, 2015
Modern power systems have begun integrating synchrophasor technologies into part of daily operations. Given the amount of solutions offered and the maturity rate of application development it is not a matter of "if" but a matter of "when" in regards to ...
Barella, Richard   +6 more
core   +2 more sources

Investigating the Impact of Global Positioning System Evidence

open access: yes, 2015
The continued amalgamation of Global Positioning Systems (GPS) into everyday activities stimulates the idea that these devices will increasingly contribute evidential importance in digital forensics cases.
Berman, Kiyoshi J   +2 more
core   +1 more source

Emulation of Realistic GNSS Scenarios Over 3D Wave Field Synthesis and Over‐The‐Air Testing

open access: yesIET Microwaves, Antennas &Propagation, Volume 19, Issue 1, January/December 2025.
This contribution takes the over‐the‐air testing method for wireless devices and combines it with the wave field synthesis technique to increase the efficiency, reliability and especially the realism of the tests. The main focus of this contribution is to use the aforementioned method to emulate realistic GNSS scenarios inside an anechoic chamber ...
Renato Zea Vintimilla   +5 more
wiley   +1 more source

A Resilience‐Driven Concept to Manage Drone Intrusions in U‐Space

open access: yesIET Radar, Sonar &Navigation, Volume 19, Issue 1, January/December 2025.
With the U‐space revolution, drones are not only going to reshape both the physical space and the cyberspace of the future urban environment but are also introducing new multi‐domain risks. This work proposes a concept for improving the U‐space resilience through a novel service, named DARS (drone attack resilience service), relying on an artificial ...
Domenico Pascarella   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy