Results 51 to 60 of about 4,930 (199)

Taxonomy of IMT Interference on Aeronautical Systems

open access: yesRadio Science, Volume 61, Issue 4, April 2026.
Abstract The rapid deployment of 5G and future 6G networks has raised concerns about interference with critical aeronautical systems, particularly radio altimeters and Wireless Avionics Intra‐Communications (WAIC). This paper offers a comprehensive taxonomy of the 5G/6G signal interference mechanisms, operational impacts, and mitigation strategies in ...
Valéria C. M. N. Leite, Alison Moraes
wiley   +1 more source

GPS spoofing effect on phase angle monitoring and control in a real-time digital simulator-based hardware-in-the-loop environment

open access: yesIET Cyber-Physical Systems, 2017
In recent years, cyber-physical system (CPS) applications have been extensively utilised in the electric power grid to enable wide-area protection, control, and monitoring of power systems.
Charalambos Konstantinou   +5 more
doaj   +1 more source

Online Pattern Recognition and Data Correction of PMU Data Under GPS Spoofing Attack

open access: yesJournal of Modern Power Systems and Clean Energy, 2020
Smart grids are increasingly dependent on data with the rapid development of communication and measurement. As one of the important data sources of smart grids, phasor measurement unit (PMU) is facing the high risk from attacks.
Ancheng Xue   +5 more
doaj   +1 more source

CARAMEL: results on a secure architecture for connected and autonomous vehicles detecting GPS spoofing attacks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
The main goal of the H2020-CARAMEL project is to address the cybersecurity gaps introduced by the new technological domains adopted by modern vehicles applying, among others, advanced Artificial Intelligence and Machine Learning techniques.
Christian Vitale   +14 more
doaj   +1 more source

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, Volume 11, Issue 2, Page 349-366, April 2026.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

GPS Spoofing and the Financial Sector [PDF]

open access: yes, 2011
All global financial exchanges, including the New York Stock Exchange (NYSE) and the Nasdaq, have gone digital. Large data centers hold the exchanges’ matching engines—the modern-day equivalent of the historic trading floor—in racks of interconnected ...
Humphreys, Todd
core   +1 more source

Understanding the Autonomous Electric Vehicle Cyber Threat Landscape: A Focus on Infrastructure, Threats and Ontology‐Based Modelling

open access: yesEnergy Internet, Volume 3, Issue 1, Page 39-51, April 2026.
ABSTRACT The development of autonomous electric vehicles (AEVs) represents the convergence of two simultaneous automotive revolutions: electric vehicles (EVs) and autonomous vehicles (AVs). AVs require sensors, decision‐making systems and actuation systems to achieve autonomous driving, whereas EVs require intelligent management and real‐time ...
Ohud Alsadi   +5 more
wiley   +1 more source

A STUDY ON GPS SPOOFING AND JAMMING COUNTERMEASURES TO ENHANCE RELIABILITY AND SECURITY FOR UAVS IN URBAN ENVIRONMENTS

open access: yesTạp chí Khoa học
Unmanned aerial vehicles (UAVs) rely heavily on the Global Positioning System (GPS) for navigation and control, making them vulnerable to attacks such as GPS spoofing and jamming, particularly in urban environments.
Hoang Van Thuc*, Doan Manh Cuong
doaj   +1 more source

Location Spoofing Detection for VANETs by a Single Base Station in Rician Fading Channels [PDF]

open access: yes, 2014
In this work we examine the performance of a Location Spoofing Detection System (LSDS) for vehicular networks in the realistic setting of Rician fading channels.
Malaney, Robert   +3 more
core   +1 more source

Data‐Based Detection of Antagonistic Agents in a Robot Swarm Solving a Dynamic Coverage Task

open access: yesInternational Journal of Mechanical System Dynamics, Volume 6, Issue 1, Page 22-32, March 2026.
ABSTRACT Robot swarms can be deployed as moving surveillance systems, for instance, as mobile anti‐poaching systems for monitoring wildlife and detecting poaching activities. Since poachers have an interest in evading detection, robots are at risk of being hijacked and manipulated to behave antagonistically, for example, to prevent the correct ...
Ingeborg Wenger   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy