Results 91 to 100 of about 37,470 (199)
Spoofing attack recognition for GNSS-based train positioning using a BO-LightGBM method
Trustworthy positioning is critical in the operational control and management of trains. For a train positioning system (TPS) based on a global navigation satellite system (GNSS), a spoofing attack significantly threatens the trustworthiness of ...
Jiaqi Bi +3 more
doaj +1 more source
A Combined Antijamming and Antispoofing Algorithm for GPS Arrays
The Global Positioning System (GPS), with its accurate positioning and timing information, has become a commonly used navigation instrument for many applications. However, it is susceptible to intentional interference such as jamming and spoofing.
Qiong Yang +3 more
doaj +1 more source
This paper addresses the vulnerability of Global Navigation Satellite Systems (GNSS) to spoofing signal attacks by proposing a spoofing detection method based on multi-parameter features and an optimized random forest algorithm.
Li Junzhi +6 more
doaj +1 more source
Advances in automatic speaker verification (ASV) promote research into the formulation of spoofing detection systems for real-world applications. The performance of ASV systems can be degraded severely by multiple types of spoofing attacks, namely ...
Zhenyu Wang, John H. L. Hansen
doaj +1 more source
A Satellite Navigation Spoofing Interference Detection Method Based on LSTM
Facing the problem of satellite navigation spoofing interference detection, this paper proposes a feature parameter selection and data processing method applicable to the detection of spoofing interference by Long Short-term Memory (LSTM) neural network.
ZHAO Shen +4 more
doaj +2 more sources
GNSS Spoofing Detection via Self-Consistent Verification of Receiver's Clock State. [PDF]
Chen Y +10 more
europepmc +1 more source
Multi-Layer AI Sensor System for Real-Time GPS Spoofing Detection and Encrypted UAS Control. [PDF]
Alsarhan A +7 more
europepmc +1 more source
A hybrid deep learning and residual connection-based architecture for intrusion detection in autonomous vehicles. [PDF]
Kibriya H +5 more
europepmc +1 more source
The WeDDa framework for preventing smishing and vishing using protocol agnostic cryptographic trust. [PDF]
Salem MFM, Hamad EKI, El-Bendary MAM.
europepmc +1 more source
Tactical-Grade Wearables and Authentication Biometrics. [PDF]
Agiomavritis F, Karanasiou I.
europepmc +1 more source

