Results 61 to 70 of about 1,025 (182)
Additive manufacturing (AM) transforms space hardware by enabling lightweight, high‐performance, and on‐demand production. This review outlines AM processes—powder bed fusion (PBF), directed energy deposition (DED), binder jetting (BJ), sheet lamination (SL), and material extrusion (ME)—applied to propulsion, satellite structures, and thermal devices ...
Stelios K. Georgantzinos +8 more
wiley +1 more source
A Modular Dynamic Probabilistic Risk Assessment Framework for Electric Grid Cybersecurity
This paper presents a modular framework designed for dynamic probabilistic risk assessment of electric grid systems facing cybersecurity threats. The functionality and efficacy of the framework have been demonstrated using an IEEE 14‐bus system in a case study.
Xiaoxu Diao +6 more
wiley +1 more source
MITM- and DoS-Resistant PUF Authentication for Industrial WSNs via Sensor-Initiated Registration
Industrial Wireless Sensor Networks (IWSNs) play a critical role in Industry 4.0 environments, enabling real-time monitoring and control of industrial processes.
Ashraf Alyanbaawi
doaj +1 more source
Machine learning‐enhanced NIDS, integrating diverse data sources and rigorous feature selection, achieves near‐perfect detection of sophisticated evasive cyber threats—including APTs, DDoS, zero‐day exploits, and MitM attacks—surpassing industry benchmarks in accuracy, precision, recall, and F1$$ {\mathrm{F}}_1 $$‐score. ABSTRACT Advanced cyber threats
Khandakar Md Shafin +2 more
wiley +1 more source
A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection
The broadcast nature of wireless local area networks has made them prone to several types of wireless injection attacks, such as Man-in-the-Middle (MitM) at the physical layer, deauthentication, and rogue access point attacks. The implementation of novel
Ibrahim Ghafir +5 more
doaj +1 more source
A Mobile Ad-Hoc Network (MANET) is a convenient wireless infrastructure which presents many advantages in network settings. With Mobile Ad-Hoc Network, there are many challenges.
Robert A. Sowah +3 more
doaj +1 more source
Advanced security framework for low Earth orbit satellites in space information network
Recently, low Earth orbit (LEO) satellites have emerged as key players in space information network (SIN) due to their ability to provide global coverage.
Mohammed Abdrabou +7 more
doaj +1 more source
Security Enhancement of Wireless Sensor Networks Using Signal Intervals
Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN) have a security issue.
Jaegeun Moon, Im Y. Jung, Jaesoo Yoo
doaj +1 more source
Man In The Middle (Mitm) Attack Detection Tool Design
Man in the Middle (MITM) attack is aimed at seizing data between two nodes. The ARP Spoofing/Poisoning technique is a technique frequently used by attackers which allows MITM attacks to be carried out on local area networks (LANs). The attack exploits the vulnerabilities of ARP, which is a stateless protocol.
openaire +1 more source
AN INSECURE WILD WEB: A LARGE-SCALE STUDY OF EFFECTIVENESS OF WEB SECURITY MECHANISMS
This research work presents a large-scale study of the problems in real-world web applications and widely-used mobile browsers. Through a large-scale experiment, we find inconsistencies in Secure Socket Layer (SSL) warnings among popular mobile web ...
Kailas Patil
doaj +1 more source

