Results 61 to 70 of about 4,930 (199)
Network connectivity plays an important role in the information exchange between different agents in the multi-level networks. In this paper, we establish a game-theoretic framework to capture the uncoordinated nature of the decision-making at different ...
Chen, Juntao, Zhu, Quanyan
core +1 more source
A Hybrid Encryption Framework for Secure and Real‐Time Vehicular Communications
ABSTRACT The rapid expansion of Vehicular Ad Hoc Networks (VANETs) has amplified concerns regarding data security, integrity, and privacy. This paper presents SECURIDE, a Secure Intelligent Data Exchange for Connected Vehicles that provides a comprehensive encryption–decryption framework for safeguarding multimedia data and communication channels in ...
Muhammad Usama, Muhammad Usman Hadi
wiley +1 more source
Authentication of Satellite Navigation Signals by Wiretap Coding and Artificial Noise
In order to combat the spoofing of global navigation satellite system (GNSS) signals we propose a novel approach for satellite signal authentication based on information-theoretic security.
Formaggio, Francesco, Tomasin, Stefano
core +1 more source
Enhancing Food Safety in the Cold Chain Through Internet of Things and Artificial Intelligence
ABSTRACT Effective cold chain management is crucial for ensuring food safety, but traditional monitoring approaches remain reactive and fragmented. Industry 4.0 technologies, such as the Internet of Things (IoT) and artificial intelligence (AI), offer transformative potential for real‐time tracking, automation, and predictive analytics.
Wagner Augusto Müller +2 more
wiley +1 more source
ABSTRACT Time and chronology form the invisible architecture upon which modern civilization depends, governing synchronization across markets, power grids, communication networks, transportation, and defense. Yet, this shared temporal framework, engineered through atomic clocks, satellites, and digital synchronization, faces growing vulnerabilities ...
Bilal M. Ayyub
wiley +1 more source
GPS spoofing attacks are a severe threat to unmanned aerial vehicles. These attacks manipulate the true state of the unmanned aerial vehicles, potentially misleading the system without raising alarms.
Tala Talaei Khoei +4 more
doaj +1 more source
Secure Trajectory Planning Against Undetectable Spoofing Attacks
This paper studies, for the first time, the trajectory planning problem in adversarial environments, where the objective is to design the trajectory of a robot to reach a desired final state despite the unknown and arbitrary action of an attacker.
Bianchin, Gianluca +2 more
core +1 more source
This article talks about blockEHR Healthcare providers can validate raw physiological data with the help of IoMT devices and edge computing role‐based access control (RBAC). ABSTRACT In centralized systems prone to data breaches and single points of failure, issues about security, privacy, scalability, and real‐time sharing of electronic health records
R. Rajakarthik +2 more
wiley +1 more source
Detection of UAV GPS Spoofing Attacks Using a Stacked Ensemble Method
Unmanned aerial vehicles (UAVs) are vulnerable to global positioning system (GPS) spoofing attacks, which can mislead their navigation systems and result in unpredictable catastrophic consequences.
Ting Ma, Xiaofeng Zhang, Zhexin Miao
doaj +1 more source
Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks [PDF]
Modern power systems have begun integrating synchrophasor technologies into part of daily operations. Given the amount of solutions offered and the maturity rate of application development it is not a matter of "if" but a matter of "when" in regards to ...
Barella, Richard +6 more
core +2 more sources

