Results 41 to 50 of about 37,470 (199)

GNSS Spoofing Detection Using Q Channel Energy

open access: yesRemote Sensing, 2023
Spoofing interference poses a significant challenge to the Global Navigation Satellite System (GNSS). To effectively combat intermediate spoofing signals, this paper presents an enhanced spoofing detection method based on abnormal energy of the ...
Jiaqi Wang   +5 more
doaj   +1 more source

Ion‐Gating Reservoir Computing for Preprocessing‐Free Speech Recognition from Throat Vibrations

open access: yesAdvanced Electronic Materials, EarlyView.
This work presents a throat‐mounted mechanoelectric sensor integrated with an ion‐gel/graphene reservoir device for on‐device speech recognition. The system converts raw biomechanical vibrations into rich nonlinear current dynamics, enabling efficient classification through a simple linear readout. The approach highlights a compact and tunable physical‐
Daiki Nishioka   +5 more
wiley   +1 more source

Spoofing Detection and Mitigation in a Multi-correlator GPS Receiver Based on the Maximum Likelihood Principle

open access: yesSensors, 2018
As a structural interference, spoofing is difficult to detect by the target receiver while the advent of a repeater makes the implementation of spoofing much easier.
Yanbing Guo, Lingjuan Miao, Xi Zhang
doaj   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Development of a Model for Spoofing Attacks in Internet of Things

open access: yesMathematics, 2022
Internet of Things (IoT) allows the integration of the physical world with network devices for proper privacy and security in a healthcare system. IoT in a healthcare system is vulnerable to spoofing attacks that can easily represent themselves as a ...
Faheem Khan   +6 more
doaj   +1 more source

Integrated LEO Constellation and In‐Cabin Distribution System for Continuous Aircraft 5G Connectivity

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT The integration of low Earth orbit (LEO) satellite constellations with commercial aircraft communication systems presents critical challenges in maintaining continuous connectivity during dynamic flight conditions. Current geostationary satellite systems suffer from high round‐trip latency (>$$ > $$ 500 ms) and inadequate coverage at high ...
Raúl Parada   +4 more
wiley   +1 more source

Dodd-Frank and the Spoofing Prohibition in Commodities Markets [PDF]

open access: yes, 2017
The Dodd-Frank Act amended the Commodity Exchange Act and adopted an explicit prohibition regarding activity commonly known as spoofing in commodities markets.
Sar, Meric
core   +1 more source

Tribo‐Electromagnetic Nanogenerator Based on Microstructured Polyvinyl Chloride Layer for Enhanced Hybrid Energy Harvesting and Intelligent Health Monitoring

open access: yesSmall, EarlyView.
A microstructured PVC‐based tribo‐electromagnetic nanogenerator (TEMNG) enables simultaneous harvesting of biomechanical and ambient electromagnetic energy. The hybrid device achieves high electrical outputs while supporting wearable sensing, gait monitoring, and self‐powered touch interfaces.
Ching‐Te Kuo   +4 more
wiley   +1 more source

Overview of satellite nav spoofing and anti-spoofing techniques

open access: yesFrontiers in Physics
In recent years, satellite navigation systems have witnessed widespread adoption across diverse fields, including military surveillance, precision agriculture, traffic monitoring, resource exploration, and disaster assessment. However, navigation signals
Cheng Lu   +8 more
doaj   +1 more source

GNSS Spoofing Detection Based on Coupled Visual/Inertial/GNSS Navigation System

open access: yesSensors, 2021
Spoofing attacks are one of the severest threats for global navigation satellite systems (GNSSs). This kind of attack can damage the navigation systems of unmanned air vehicles (UAVs) and other unmanned vehicles (UVs), which are highly dependent on GNSSs.
Nianzu Gu, Fei Xing, Zheng You
doaj   +1 more source

Home - About - Disclaimer - Privacy