Results 41 to 50 of about 37,470 (199)
GNSS Spoofing Detection Using Q Channel Energy
Spoofing interference poses a significant challenge to the Global Navigation Satellite System (GNSS). To effectively combat intermediate spoofing signals, this paper presents an enhanced spoofing detection method based on abnormal energy of the ...
Jiaqi Wang +5 more
doaj +1 more source
Ion‐Gating Reservoir Computing for Preprocessing‐Free Speech Recognition from Throat Vibrations
This work presents a throat‐mounted mechanoelectric sensor integrated with an ion‐gel/graphene reservoir device for on‐device speech recognition. The system converts raw biomechanical vibrations into rich nonlinear current dynamics, enabling efficient classification through a simple linear readout. The approach highlights a compact and tunable physical‐
Daiki Nishioka +5 more
wiley +1 more source
As a structural interference, spoofing is difficult to detect by the target receiver while the advent of a repeater makes the implementation of spoofing much easier.
Yanbing Guo, Lingjuan Miao, Xi Zhang
doaj +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
Development of a Model for Spoofing Attacks in Internet of Things
Internet of Things (IoT) allows the integration of the physical world with network devices for proper privacy and security in a healthcare system. IoT in a healthcare system is vulnerable to spoofing attacks that can easily represent themselves as a ...
Faheem Khan +6 more
doaj +1 more source
ABSTRACT The integration of low Earth orbit (LEO) satellite constellations with commercial aircraft communication systems presents critical challenges in maintaining continuous connectivity during dynamic flight conditions. Current geostationary satellite systems suffer from high round‐trip latency (>$$ > $$ 500 ms) and inadequate coverage at high ...
Raúl Parada +4 more
wiley +1 more source
Dodd-Frank and the Spoofing Prohibition in Commodities Markets [PDF]
The Dodd-Frank Act amended the Commodity Exchange Act and adopted an explicit prohibition regarding activity commonly known as spoofing in commodities markets.
Sar, Meric
core +1 more source
A microstructured PVC‐based tribo‐electromagnetic nanogenerator (TEMNG) enables simultaneous harvesting of biomechanical and ambient electromagnetic energy. The hybrid device achieves high electrical outputs while supporting wearable sensing, gait monitoring, and self‐powered touch interfaces.
Ching‐Te Kuo +4 more
wiley +1 more source
Overview of satellite nav spoofing and anti-spoofing techniques
In recent years, satellite navigation systems have witnessed widespread adoption across diverse fields, including military surveillance, precision agriculture, traffic monitoring, resource exploration, and disaster assessment. However, navigation signals
Cheng Lu +8 more
doaj +1 more source
GNSS Spoofing Detection Based on Coupled Visual/Inertial/GNSS Navigation System
Spoofing attacks are one of the severest threats for global navigation satellite systems (GNSSs). This kind of attack can damage the navigation systems of unmanned air vehicles (UAVs) and other unmanned vehicles (UVs), which are highly dependent on GNSSs.
Nianzu Gu, Fei Xing, Zheng You
doaj +1 more source

