Results 71 to 80 of about 45,521 (247)

GNSS induced spoofing simulation based on path planning

open access: yesIET Radar, Sonar & Navigation, 2022
Global navigation satellite Systems (GNSS) are highly susceptible to various interferences because of their inherent vulnerability. In these interferences, induced spoofing is very difficult to be detected because it can gradually drag off the tracking ...
Wenyi Wang, Jinming Wang
doaj   +1 more source

Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks [PDF]

open access: yes, 2015
Modern power systems have begun integrating synchrophasor technologies into part of daily operations. Given the amount of solutions offered and the maturity rate of application development it is not a matter of "if" but a matter of "when" in regards to ...
Barella, Richard   +6 more
core   +2 more sources

Detecting ADS-B Spoofing Attacks using Deep Neural Networks

open access: yes, 2019
The Automatic Dependent Surveillance-Broadcast (ADS-B) system is a key component of the Next Generation Air Transportation System (NextGen) that manages the increasingly congested airspace.
Bernieri, Giuseppe   +5 more
core   +1 more source

Risks of Time and Chronology as an Underpinning Infrastructure for Critical Systems: Emerging Chronorisks and Chronosecurity Needs

open access: yesJournal of Critical Infrastructure Policy, Volume 7, Issue 1, Spring/Summer 2026.
ABSTRACT Time and chronology form the invisible architecture upon which modern civilization depends, governing synchronization across markets, power grids, communication networks, transportation, and defense. Yet, this shared temporal framework, engineered through atomic clocks, satellites, and digital synchronization, faces growing vulnerabilities ...
Bilal M. Ayyub
wiley   +1 more source

Impact Assessment of GNSS Spoofing Attacks on INS/GNSS Integrated Navigation System

open access: yesSensors, 2018
In the face of emerging Global Navigation Satellite System (GNSS) spoofing attacks, there is a need to give a comprehensive analysis on how the inertial navigation system (INS)/GNSS integrated navigation system responds to different kinds of spoofing ...
Yang Liu   +3 more
doaj   +1 more source

Active digital spoof plasmonics [PDF]

open access: yesNational Science Review, 2019
Abstract Digital coding and digital modulation are the foundation of modern information science. The combination of digital technology with metamaterials provides a powerful scheme for spatial and temporal controls of electromagnetic waves. Such a technique, however, has thus far been limited to the control of free-space light.
Zhang, Hao Chi   +6 more
openaire   +2 more sources

Energy‐Controllable Manipulation on Surface Waves and Propagating Waves by Bifunctional Metasurfaces

open access: yesNanophotonics, Volume 15, Issue 1, 13 January 2026.
This work presents a bifunctional metasurface for the simultaneous control of propagating and surface waves under the excitation of a circularly polarized wave with a particular helicity. It merges resonance and geometric phases to route wavefronts through distinct channels, validated via microwave experiments.
Shiqing Li   +10 more
wiley   +1 more source

Galileo and EGNOS as an asset for UTM safety and security [PDF]

open access: yes, 2019
GAUSS (Galileo-EGNOS as an Asset for UTM Safety and Security) is a H2020 project1 that aims at designing and developing high performance positioning systems for drones within the U-Space framework focusing on UAS (Unmanned Aircraft System) VLL (Very Low ...
Andrade-Cetto, Juan   +7 more
core  

A Survey of SIR‐Based Differential Epidemic Models for Control and Security Against Malware Propagation in Computer Networks

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley   +1 more source

Random-Training-Assisted Pilot Spoofing Detection and Security Enhancement

open access: yesIEEE Access, 2017
The pilot spoofing attack is considered as an active eavesdropping activity launched by an adversary during the reverse channel training phase. By transmitting the same pilot signal as the legitimate user, the pilot spoofing attack is able to degrade the
Xiaowen Tian, Ming Li, Qian Liu
doaj   +1 more source

Home - About - Disclaimer - Privacy