Results 101 to 110 of about 4,930 (199)
Unmanned Aerial Vehicles (UAVs) are increasingly being used in critical infrastructure, defense, and civilian applications, and face new cybersecurity threats.
Özlem Batur Dinler
doaj +1 more source
Drone communication networks – especially those relying on Drone-to-Drone (Dr2Dr) and Drone-to-Base Station (Dr2BS) links – are increasingly vulnerable to threats like DDoS, GPS spoofing, and jamming.
Ameen Banjar, Abdulrahman A. Alshdadi
doaj +1 more source
Advanced Control Strategies for Securing UAV Systems: A Cyber-Physical Approach
This paper explores the application of sliding mode control (SMC) as a robust security enhancement strategy for unmanned aerial vehicle (UAV) systems.
Mohammad Sadeq Ale Isaac +3 more
doaj +1 more source
Capital markets and e-fraud: policy note and concept paper for future study [PDF]
The technological dependency of securities exchanges on internet-based (IP) platforms has dramatically increased the industry's exposure to reputation, market, and operational risks.
Kellermann, Tom, McNevin, Valerie
core
Unmanned Aerial Vehicle (UAV) swarms operating in contested environments face a critical “semantic gap” between raw, high-velocity network traffic and high-level mission security constraints, compounded by the risk of privacy leakage during collaborative
Gang Yang +4 more
doaj +1 more source
Accurate and robust navigation is fundamental to Unmanned Aerial Vehicle (UAV) remote sensing operations. However, the susceptibility of UAV navigation sensors to diverse interference and malicious attacks can severely degrade positioning accuracy and ...
Chen Meng +4 more
doaj +1 more source
Accurate traceability of time is prerequisite to the proper functioning of many necessary aspects of our modern life including making financial transactions, managing automated technology and navigating the transport of goods and human beings. One of the
Hiroyuki K. M. Tanaka
doaj +1 more source
PMU-based Line Differential Protection under GPS Spoofing Attack [PDF]
Jiahao Xie +2 more
openaire +2 more sources
Multi-Layer AI Sensor System for Real-Time GPS Spoofing Detection and Encrypted UAS Control. [PDF]
Alsarhan A +7 more
europepmc +1 more source
Security of ADS-B and Remote ID Systems: Cyberattacks, Detection Techniques, and Countermeasures. [PDF]
Shi Q, Caleb TD, Shao S, Kaabouch N.
europepmc +1 more source

