Results 71 to 80 of about 45,521 (247)
GNSS induced spoofing simulation based on path planning
Global navigation satellite Systems (GNSS) are highly susceptible to various interferences because of their inherent vulnerability. In these interferences, induced spoofing is very difficult to be detected because it can gradually drag off the tracking ...
Wenyi Wang, Jinming Wang
doaj +1 more source
Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks [PDF]
Modern power systems have begun integrating synchrophasor technologies into part of daily operations. Given the amount of solutions offered and the maturity rate of application development it is not a matter of "if" but a matter of "when" in regards to ...
Barella, Richard +6 more
core +2 more sources
Detecting ADS-B Spoofing Attacks using Deep Neural Networks
The Automatic Dependent Surveillance-Broadcast (ADS-B) system is a key component of the Next Generation Air Transportation System (NextGen) that manages the increasingly congested airspace.
Bernieri, Giuseppe +5 more
core +1 more source
ABSTRACT Time and chronology form the invisible architecture upon which modern civilization depends, governing synchronization across markets, power grids, communication networks, transportation, and defense. Yet, this shared temporal framework, engineered through atomic clocks, satellites, and digital synchronization, faces growing vulnerabilities ...
Bilal M. Ayyub
wiley +1 more source
Impact Assessment of GNSS Spoofing Attacks on INS/GNSS Integrated Navigation System
In the face of emerging Global Navigation Satellite System (GNSS) spoofing attacks, there is a need to give a comprehensive analysis on how the inertial navigation system (INS)/GNSS integrated navigation system responds to different kinds of spoofing ...
Yang Liu +3 more
doaj +1 more source
Active digital spoof plasmonics [PDF]
Abstract Digital coding and digital modulation are the foundation of modern information science. The combination of digital technology with metamaterials provides a powerful scheme for spatial and temporal controls of electromagnetic waves. Such a technique, however, has thus far been limited to the control of free-space light.
Zhang, Hao Chi +6 more
openaire +2 more sources
Energy‐Controllable Manipulation on Surface Waves and Propagating Waves by Bifunctional Metasurfaces
This work presents a bifunctional metasurface for the simultaneous control of propagating and surface waves under the excitation of a circularly polarized wave with a particular helicity. It merges resonance and geometric phases to route wavefronts through distinct channels, validated via microwave experiments.
Shiqing Li +10 more
wiley +1 more source
Galileo and EGNOS as an asset for UTM safety and security [PDF]
GAUSS (Galileo-EGNOS as an Asset for UTM Safety and Security) is a H2020 project1 that aims at designing and developing high performance positioning systems for drones within the U-Space framework focusing on UAS (Unmanned Aircraft System) VLL (Very Low ...
Andrade-Cetto, Juan +7 more
core
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley +1 more source
Random-Training-Assisted Pilot Spoofing Detection and Security Enhancement
The pilot spoofing attack is considered as an active eavesdropping activity launched by an adversary during the reverse channel training phase. By transmitting the same pilot signal as the legitimate user, the pilot spoofing attack is able to degrade the
Xiaowen Tian, Ming Li, Qian Liu
doaj +1 more source

