Results 41 to 50 of about 45,521 (247)

A GNSS Spoofing Detection and Direction-Finding Method Based on Low-Cost Commercial Board Components

open access: yesRemote Sensing, 2023
The Global Navigation Satellite System (GNSS) is vulnerable to deliberate spoofing signal attacks. Once the user wrongly locks on the spoofing signal, the wrong position, velocity, and time (PVT) information will be calculated, which will harm the user ...
Pengrui Mao   +9 more
doaj   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, EarlyView.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

Development of a Model for Spoofing Attacks in Internet of Things

open access: yesMathematics, 2022
Internet of Things (IoT) allows the integration of the physical world with network devices for proper privacy and security in a healthcare system. IoT in a healthcare system is vulnerable to spoofing attacks that can easily represent themselves as a ...
Faheem Khan   +6 more
doaj   +1 more source

Dodd-Frank and the Spoofing Prohibition in Commodities Markets [PDF]

open access: yes, 2017
The Dodd-Frank Act amended the Commodity Exchange Act and adopted an explicit prohibition regarding activity commonly known as spoofing in commodities markets.
Sar, Meric
core   +1 more source

The Case of Fleeting Orders and Flickering Quotes

open access: yesJournal of Futures Markets, EarlyView.
ABSTRACT The literature controversially discusses the ambiguous motives and driving forces behind quickly cancelled limit orders (fleeting orders), which are characteristic of high‐frequency markets. In particular, manipulative and dysfunctional characteristics are feared. We analyze top‐of‐book fleeting orders—so‐called flickering quotes—and show with
Markus Ulze   +2 more
wiley   +1 more source

Spoofing Detection and Mitigation in a Multi-correlator GPS Receiver Based on the Maximum Likelihood Principle

open access: yesSensors, 2018
As a structural interference, spoofing is difficult to detect by the target receiver while the advent of a repeater makes the implementation of spoofing much easier.
Yanbing Guo, Lingjuan Miao, Xi Zhang
doaj   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Anti-spoofing Methods for Automatic SpeakerVerification System

open access: yes, 2017
Growing interest in automatic speaker verification (ASV)systems has lead to significant quality improvement of spoofing attackson them. Many research works confirm that despite the low equal er-ror rate (EER) ASV systems are still vulnerable to spoofing ...
Lavrentyeva, Galina   +2 more
core   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Overview of satellite nav spoofing and anti-spoofing techniques

open access: yesFrontiers in Physics
In recent years, satellite navigation systems have witnessed widespread adoption across diverse fields, including military surveillance, precision agriculture, traffic monitoring, resource exploration, and disaster assessment. However, navigation signals
Cheng Lu   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy