Results 61 to 70 of about 4,930 (199)

Resilient and Decentralized Control of Multi-level Cooperative Mobile Networks to Maintain Connectivity under Adversarial Environment

open access: yes, 2016
Network connectivity plays an important role in the information exchange between different agents in the multi-level networks. In this paper, we establish a game-theoretic framework to capture the uncoordinated nature of the decision-making at different ...
Chen, Juntao, Zhu, Quanyan
core   +1 more source

A Hybrid Encryption Framework for Secure and Real‐Time Vehicular Communications

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT The rapid expansion of Vehicular Ad Hoc Networks (VANETs) has amplified concerns regarding data security, integrity, and privacy. This paper presents SECURIDE, a Secure Intelligent Data Exchange for Connected Vehicles that provides a comprehensive encryption–decryption framework for safeguarding multimedia data and communication channels in ...
Muhammad Usama, Muhammad Usman Hadi
wiley   +1 more source

Authentication of Satellite Navigation Signals by Wiretap Coding and Artificial Noise

open access: yes, 2018
In order to combat the spoofing of global navigation satellite system (GNSS) signals we propose a novel approach for satellite signal authentication based on information-theoretic security.
Formaggio, Francesco, Tomasin, Stefano
core   +1 more source

Enhancing Food Safety in the Cold Chain Through Internet of Things and Artificial Intelligence

open access: yesJournal of Food Science, Volume 91, Issue 2, February 2026.
ABSTRACT Effective cold chain management is crucial for ensuring food safety, but traditional monitoring approaches remain reactive and fragmented. Industry 4.0 technologies, such as the Internet of Things (IoT) and artificial intelligence (AI), offer transformative potential for real‐time tracking, automation, and predictive analytics.
Wagner Augusto Müller   +2 more
wiley   +1 more source

Risks of Time and Chronology as an Underpinning Infrastructure for Critical Systems: Emerging Chronorisks and Chronosecurity Needs

open access: yesJournal of Critical Infrastructure Policy, Volume 7, Issue 1, Spring/Summer 2026.
ABSTRACT Time and chronology form the invisible architecture upon which modern civilization depends, governing synchronization across markets, power grids, communication networks, transportation, and defense. Yet, this shared temporal framework, engineered through atomic clocks, satellites, and digital synchronization, faces growing vulnerabilities ...
Bilal M. Ayyub
wiley   +1 more source

Impact of Dataset and Model Parameters on Machine Learning Performance for the Detection of GPS Spoofing Attacks on Unmanned Aerial Vehicles

open access: yesApplied Sciences, 2022
GPS spoofing attacks are a severe threat to unmanned aerial vehicles. These attacks manipulate the true state of the unmanned aerial vehicles, potentially misleading the system without raising alarms.
Tala Talaei Khoei   +4 more
doaj   +1 more source

Secure Trajectory Planning Against Undetectable Spoofing Attacks

open access: yes, 2019
This paper studies, for the first time, the trajectory planning problem in adversarial environments, where the objective is to design the trajectory of a robot to reach a desired final state despite the unknown and arbitrary action of an attacker.
Bianchin, Gianluca   +2 more
core   +1 more source

Decentralized Privacy Preserving Data Sharing Model for Electronic Health Records (EHR) Using Blockchain Technology

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
This article talks about blockEHR Healthcare providers can validate raw physiological data with the help of IoMT devices and edge computing role‐based access control (RBAC). ABSTRACT In centralized systems prone to data breaches and single points of failure, issues about security, privacy, scalability, and real‐time sharing of electronic health records
R. Rajakarthik   +2 more
wiley   +1 more source

Detection of UAV GPS Spoofing Attacks Using a Stacked Ensemble Method

open access: yesDrones
Unmanned aerial vehicles (UAVs) are vulnerable to global positioning system (GPS) spoofing attacks, which can mislead their navigation systems and result in unpredictable catastrophic consequences.
Ting Ma, Xiaofeng Zhang, Zhexin Miao
doaj   +1 more source

Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks [PDF]

open access: yes, 2015
Modern power systems have begun integrating synchrophasor technologies into part of daily operations. Given the amount of solutions offered and the maturity rate of application development it is not a matter of "if" but a matter of "when" in regards to ...
Barella, Richard   +6 more
core   +2 more sources

Home - About - Disclaimer - Privacy