Results 91 to 100 of about 4,930 (199)

On the security of software-defined next-generation cellular networks [PDF]

open access: yes, 2016
In the recent years, mobile cellular networks are ndergoing fundamental changes and many established concepts are being revisited. Future 5G network architectures will be designed to employ a wide range of new and emerging technologies such as Software ...
Alzahrani, Bander   +3 more
core  

Detection of Multiple Small Biased GPS Spoofing Attacks on Autonomous Vehicles Using Time Series Analysis

open access: yesIEEE Open Journal of Vehicular Technology
This research introduces an algorithm to identify GPS spoofing attacks in Autonomous Vehicles (AV). It uses data from onboard sensors such as speedometers and gyroscopes, which are integrated and analyzed using a Neural Network (NN).
Ahmad Mohammadi   +6 more
doaj   +1 more source

Attack-Resilient Supervisory Control of Discrete-Event Systems

open access: yes, 2020
In this work, we study the problem of supervisory control of discrete-event systems (DES) in the presence of attacks that tamper with inputs and outputs of the plant.
Bozkurt, Alper Kamil   +2 more
core  

Cyberattack Resilience of Autonomous Vehicle Sensor Systems: Evaluating RGB vs. Dynamic Vision Sensors in CARLA

open access: yesApplied Sciences
Autonomous vehicles (AVs) rely on a heterogeneous sensor suite of RGB cameras, LiDAR, GPS/IMU, and emerging event-based dynamic vision sensors (DVS) to perceive and navigate complex environments.
Mustafa Sakhai   +3 more
doaj   +1 more source

Understanding the Vulnerabilities in Digital Components of an Integrated Bridge System (IBS)

open access: yesJournal of Marine Science and Engineering, 2019
The adoption of the global positioning system (GPS) within the marine industry has revolutionized the marine operations by condensing the navigation of a vessel into an integrated bridge system (IBS).
Malik Shahzad Kaleem Awan   +1 more
doaj   +1 more source

Joint detection and state estimation based on GPS spoofing attack in smart grids

open access: yesInternational Journal of Electrical Power & Energy Systems
Phasor Measurement Units (PMUs) are widely used in power system state estimation due to its high sampling rate and real-time estimation of power state in power systems.
Feng Hua   +4 more
doaj   +1 more source

GPS-IDS: An Anomaly-based GPS Spoofing Attack Detection Framework for Autonomous Vehicles

open access: yesCoRR
Autonomous Vehicles (AVs) heavily rely on sensors and communication networks like Global Positioning System (GPS) to navigate autonomously. Prior research has indicated that networks like GPS are vulnerable to cyber-attacks such as spoofing and jamming, thus posing serious risks like navigation errors and system failures.
Abrar, Murad Mehrab   +8 more
openaire   +2 more sources

Security factor identification of drone delivery system based on blockchain

open access: yesAIP Advances
Traditional drone delivery systems usually rely on centralized management. They face problems such as insufficient data security and privacy protection, as well as difficulty in information sharing.
Yang Zhang
doaj   +1 more source

Defense Method for Smart Grid GPS Spoofing Attack Based on BiLSTM and Self-attention Mechanism Generative Adversarial Network

open access: yesZhongguo dianli
Phasor measurement unit (PMU) plays a crucial role in smart grids, enabling precise synchronized acquisition of electric power data. Due to the use of the global positioning system (GPS) for time synchronization, the PMU is vulnerable to GPS spoofing ...
Hui WU   +5 more
doaj   +1 more source

Toward Adaptive Intrusion Detection Systems for UAVs Using Cyber-Physical Image Analysis

open access: yesIEEE Access
The rapid proliferation of uncrewed aerial vehicles (UAVs) across modern applications has significantly heightened their susceptibility to cyber and physical security threats.
Hanane Amirat   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy