Results 51 to 60 of about 7,918 (196)

ConstDet: Control Semantics-Based Detection for GPS Spoofing Attacks on UAVs

open access: yesRemote Sensing, 2022
UAVs are widely used in agriculture, the military, and industry. However, it is easy to perform GPS spoofing attacks on UAVs, which can lead to catastrophic consequences.
Xiaomin Wei   +4 more
doaj   +1 more source

Risk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs

open access: yes, 2019
Recent developments have made autonomous vehicles (AVs) closer to hitting our roads. However, their security is still a major concern among drivers as well as manufacturers.
Behfarnia, Ali, Eslami, Ali
core   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, Volume 43, Issue 3, Page 2254-2341, May 2026.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Taxonomy of IMT Interference on Aeronautical Systems

open access: yesRadio Science, Volume 61, Issue 4, April 2026.
Abstract The rapid deployment of 5G and future 6G networks has raised concerns about interference with critical aeronautical systems, particularly radio altimeters and Wireless Avionics Intra‐Communications (WAIC). This paper offers a comprehensive taxonomy of the 5G/6G signal interference mechanisms, operational impacts, and mitigation strategies in ...
Valéria C. M. N. Leite, Alison Moraes
wiley   +1 more source

GPS Spoofing-Resilient Filtering Using Self-Contained Sensors and Chimera Signal Enhancement

open access: yesNavigation
To protect civilian Global Positioning System (GPS) users from spoofing, the Air Force Research Lab has developed the chips-message robust authentication (Chimera) signal enhancement for the GPS L1C signal.
Tara Mina   +3 more
doaj   +1 more source

IMPROVEMENT OF THE GPS SIGNAL RECEIVING RESISTANCE AGAINST ELECTROMAGNETIC INTERFERENCE, JAMMING, AND SPOOFING IS BASED ON THE USE OF THE ANTENNA ARRAY SYSTEM WITH DIGITAL BEAMFORMING AND NORAD TLE INFORMATION

open access: yesInformation and Telecommunication Sciences, 2022
Background. Currently, in radio navigation systems of the various purposes, the urgent issue is stability increase of the GPS signal reception under such a jamming and spoofing types of the interference influence.
Теодор Наритник   +4 more
doaj   +1 more source

GPS Spoofing and the Financial Sector [PDF]

open access: yes, 2011
All global financial exchanges, including the New York Stock Exchange (NYSE) and the Nasdaq, have gone digital. Large data centers hold the exchanges’ matching engines—the modern-day equivalent of the historic trading floor—in racks of interconnected ...
Humphreys, Todd
core   +1 more source

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, Volume 11, Issue 2, Page 349-366, April 2026.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

Enhanced Machine Learning Ensemble Approach for Securing Small Unmanned Aerial Vehicles From GPS Spoofing Attacks

open access: yesIEEE Access
Unmanned aerial vehicles (UAVs) substantially rely on the utilization of global positioning systems (GPS) to navigate. A simulator for commercial GPS applications with false GPS signals can lead to the deviation of a GPS-guided drone from its planned ...
Ala' Abdulmajid Eshmawi   +3 more
doaj   +1 more source

Understanding the Autonomous Electric Vehicle Cyber Threat Landscape: A Focus on Infrastructure, Threats and Ontology‐Based Modelling

open access: yesEnergy Internet, Volume 3, Issue 1, Page 39-51, April 2026.
ABSTRACT The development of autonomous electric vehicles (AEVs) represents the convergence of two simultaneous automotive revolutions: electric vehicles (EVs) and autonomous vehicles (AVs). AVs require sensors, decision‐making systems and actuation systems to achieve autonomous driving, whereas EVs require intelligent management and real‐time ...
Ohud Alsadi   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy