Results 141 to 150 of about 7,918 (196)
GNSS interference and spoofing dataset. [PDF]
Wang X, Yang J, Huang M, Peng Z.
europepmc +1 more source
GNSS Interference Identification Driven by Eye Pattern Features: ICOA-CNN-ResNet-BiLSTM Optimized Deep Learning Architecture. [PDF]
Wu C, Ji Y, Sun X.
europepmc +1 more source
Spoof proof GPS timing: A detection and mitigation system for GPS time spoofing
openaire +1 more source
XAI GNSS-A Comprehensive Study on Signal Quality Assessment of GNSS Disruptions Using Explainable AI Technique. [PDF]
Elango A, Landry RJ.
europepmc +1 more source
A Survey on Satellite Communication System Security. [PDF]
Kang M, Park S, Lee Y.
europepmc +1 more source
Revisiting Wireless Cyberattacks on Vehicles. [PDF]
Gesteira-Miñarro R +2 more
europepmc +1 more source
Real-Time jamming detection using windowing and hybrid machine learning models for pre-saturation alerts. [PDF]
Sormayli J +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2020 19th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), 2020
We present a precise and robust GPS spoofing mitigation method, which is based on a position likelihood distribution. Compared to existing spoofing mitigation methods, this maximum likelihood method is less prone to selecting the wrong satellite signals when (spoofed) duplicates are received.
Manuel Eichelberger +2 more
openaire +1 more source
We present a precise and robust GPS spoofing mitigation method, which is based on a position likelihood distribution. Compared to existing spoofing mitigation methods, this maximum likelihood method is less prone to selecting the wrong satellite signals when (spoofed) duplicates are received.
Manuel Eichelberger +2 more
openaire +1 more source
On the Limitations of GPS Time-Spoofing Attacks
2020 43rd International Conference on Telecommunications and Signal Processing (TSP), 2020In recent years, there has been a number of incidents against the security of the location services. Jamming and spoofing attacks are intensively studied to find effective detection and mitigation techniques to provide secure signaling. However, the effects of the number of spoofing signals are not completely understood yet.
Mehmet Özgün Demir +2 more
openaire +2 more sources

