Results 51 to 60 of about 22,758 (191)

Developing a Secure Cyberphysical System for Altitude Chambers

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
Altitude chambers are used to train crews of the military and civil aviation by creating a high‐altitude environment in which the vital signs of the people in the chamber are monitored to assess their health and identify symptoms that indicate there may be a physical condition that needs to be managed. Human observers monitor the process and react when
Jennifer Aguirre   +4 more
wiley   +1 more source

Metaheuristic Optimization Algorithm for Vulnerability Detection in Web of Things Environment

open access: yesJournal of Engineering, Volume 2026, Issue 1, 2026.
The integration of the Web of Things with cloud computing platforms has significantly improved data sharing, analytics, and automation across smart environments. However, this interconnection also exposes devices and cloud infrastructures to severe security threats, including Trojans, ransomware, worms, and advanced malware.
Romil Rawat   +2 more
wiley   +1 more source

Liveness‐Verified Dynamic Time Warping‐Based Authentication and Hybrid Adaptive Neuro‐Fuzzy Inference System Identification for Single‐Channel Diaphragmatic Breathing Surface Electromyography Biometrics

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 12, December 2025.
The first biometric framework to harness dynamic time warping (DTW) for single‐channel diaphragmatic surface electromyography authentication via post‐hoc alignment is presented. By optimally warping deep–normal–deep breath cycles, DTW achieves perfect genuine–impostor separation (equal error rates = 0%), while a parallel adaptive neuro‐fuzzy inference ...
Beyza Eraslan   +2 more
wiley   +1 more source

Wide‐area damping control in renewable integrated power systems: A review on recent achievements and new challenges

open access: yesEnergy Conversion and Economics, Volume 6, Issue 6, Page 341-358, December 2025.
Abstract Low‐frequency oscillations (LFOs) remain a major obstacle to maintaining stable dynamic performance in power systems with high levels of renewable energy integration. In particular, inter‐area LFOs have emerged as a critical concern in large, interconnected grids.
Linglin Meng   +10 more
wiley   +1 more source

Backdoor Poisoning Attack Against Face Spoofing Attack Detection Methods

open access: yes2025 Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)
Face recognition systems are robust against environmental changes and noise, and thus may be vulnerable to illegal authentication attempts using user face photos, such as spoofing attacks. To prevent such spoofing attacks, it is crucial to discriminate whether the input image is a live user image or a spoofed image prior to the face recognition process.
Iwamatsu, Shota   +2 more
openaire   +2 more sources

Enhancing Trust in eAssessment - the TeSLA System Solution

open access: yes, 2019
Trust in eAssessment is an important factor for improving the quality of online-education. A comprehensive model for trust based authentication for eAssessment is being developed and tested within the score of the EU H2020 project TeSLA.
Bhattacharjee, Sushil   +4 more
core  

Voice Spoofing Countermeasure for Voice Replay Attacks using Deep Learning [PDF]

open access: green, 2022
Jincheng Zhou   +5 more
openalex   +1 more source

MobilBye: Attacking ADAS with Camera Spoofing

open access: yes, 2019
Advanced driver assistance systems (ADASs) were developed to reduce the number of car accidents by issuing driver alert or controlling the vehicle. In this paper, we tested the robustness of Mobileye, a popular external ADAS. We injected spoofed traffic signs into Mobileye to assess the influence of environmental changes (e.g., changes in color, shape,
Nassi, Dudi   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy