Results 31 to 40 of about 22,758 (191)

Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks [PDF]

open access: yes, 2015
Modern power systems have begun integrating synchrophasor technologies into part of daily operations. Given the amount of solutions offered and the maturity rate of application development it is not a matter of "if" but a matter of "when" in regards to ...
Barella, Richard   +6 more
core   +2 more sources

Pilot Spoofing Attack by Multiple Eavesdroppers

open access: yesIEEE Transactions on Wireless Communications, 2018
Accepted by IEEE Transaction on Wireless ...
Ke-Wen Huang   +3 more
openaire   +2 more sources

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, Volume 13, Issue 7, 3 February 2026.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Spatial spectrum approach for pilot spoofing attack detection in MIMO systems [PDF]

open access: diamond, 2021
Lina Ning   +4 more
openalex   +1 more source

Risks of Time and Chronology as an Underpinning Infrastructure for Critical Systems: Emerging Chronorisks and Chronosecurity Needs

open access: yesJournal of Critical Infrastructure Policy, Volume 7, Issue 1, Spring/Summer 2026.
ABSTRACT Time and chronology form the invisible architecture upon which modern civilization depends, governing synchronization across markets, power grids, communication networks, transportation, and defense. Yet, this shared temporal framework, engineered through atomic clocks, satellites, and digital synchronization, faces growing vulnerabilities ...
Bilal M. Ayyub
wiley   +1 more source

ADoPT: LiDAR Spoofing Attack Detection Based on Point-Level Temporal Consistency [PDF]

open access: green, 2023
Minkyoung Cho   +3 more
openalex   +1 more source

A Survey of SIR‐Based Differential Epidemic Models for Control and Security Against Malware Propagation in Computer Networks

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley   +1 more source

Spoofing Attack Augmentation: Can Differently-Trained Attack Models Improve Generalisation?

open access: yesICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
A reliable deepfake detector or spoofing countermeasure (CM) should be robust in the face of unpredictable spoofing attacks. To encourage the learning of more generaliseable artefacts, rather than those specific only to known attacks, CMs are usually exposed to a broad variety of different attacks during training.
Ge, Wanying   +4 more
openaire   +3 more sources

Robustness Analysis of Distributed CNN Model Training in Expression Recognition

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Facial expression recognition is vital in pattern recognition and affective computing. With the advancement of deep learning, its performance has improved, yet challenges remain in nonlaboratory environments due to occlusion, poor lighting, and varying head poses.
Jun Li, Jun Wan
wiley   +1 more source

Galileo and EGNOS as an asset for UTM safety and security [PDF]

open access: yes, 2019
GAUSS (Galileo-EGNOS as an Asset for UTM Safety and Security) is a H2020 project1 that aims at designing and developing high performance positioning systems for drones within the U-Space framework focusing on UAS (Unmanned Aircraft System) VLL (Very Low ...
Andrade-Cetto, Juan   +7 more
core  

Home - About - Disclaimer - Privacy