Results 91 to 100 of about 4,930 (199)
On the security of software-defined next-generation cellular networks [PDF]
In the recent years, mobile cellular networks are ndergoing fundamental changes and many established concepts are being revisited. Future 5G network architectures will be designed to employ a wide range of new and emerging technologies such as Software ...
Alzahrani, Bander +3 more
core
This research introduces an algorithm to identify GPS spoofing attacks in Autonomous Vehicles (AV). It uses data from onboard sensors such as speedometers and gyroscopes, which are integrated and analyzed using a Neural Network (NN).
Ahmad Mohammadi +6 more
doaj +1 more source
Attack-Resilient Supervisory Control of Discrete-Event Systems
In this work, we study the problem of supervisory control of discrete-event systems (DES) in the presence of attacks that tamper with inputs and outputs of the plant.
Bozkurt, Alper Kamil +2 more
core
Autonomous vehicles (AVs) rely on a heterogeneous sensor suite of RGB cameras, LiDAR, GPS/IMU, and emerging event-based dynamic vision sensors (DVS) to perceive and navigate complex environments.
Mustafa Sakhai +3 more
doaj +1 more source
Understanding the Vulnerabilities in Digital Components of an Integrated Bridge System (IBS)
The adoption of the global positioning system (GPS) within the marine industry has revolutionized the marine operations by condensing the navigation of a vessel into an integrated bridge system (IBS).
Malik Shahzad Kaleem Awan +1 more
doaj +1 more source
Joint detection and state estimation based on GPS spoofing attack in smart grids
Phasor Measurement Units (PMUs) are widely used in power system state estimation due to its high sampling rate and real-time estimation of power state in power systems.
Feng Hua +4 more
doaj +1 more source
GPS-IDS: An Anomaly-based GPS Spoofing Attack Detection Framework for Autonomous Vehicles
Autonomous Vehicles (AVs) heavily rely on sensors and communication networks like Global Positioning System (GPS) to navigate autonomously. Prior research has indicated that networks like GPS are vulnerable to cyber-attacks such as spoofing and jamming, thus posing serious risks like navigation errors and system failures.
Abrar, Murad Mehrab +8 more
openaire +2 more sources
Security factor identification of drone delivery system based on blockchain
Traditional drone delivery systems usually rely on centralized management. They face problems such as insufficient data security and privacy protection, as well as difficulty in information sharing.
Yang Zhang
doaj +1 more source
Phasor measurement unit (PMU) plays a crucial role in smart grids, enabling precise synchronized acquisition of electric power data. Due to the use of the global positioning system (GPS) for time synchronization, the PMU is vulnerable to GPS spoofing ...
Hui WU +5 more
doaj +1 more source
Toward Adaptive Intrusion Detection Systems for UAVs Using Cyber-Physical Image Analysis
The rapid proliferation of uncrewed aerial vehicles (UAVs) across modern applications has significantly heightened their susceptibility to cyber and physical security threats.
Hanane Amirat +3 more
doaj +1 more source

