Results 51 to 60 of about 22,160 (195)

An Integrated Framework for Sensing Radio Frequency Spectrum Attacks on Medical Delivery Drones

open access: yes, 2020
Drone susceptibility to jamming or spoofing attacks of GPS, RF, Wi-Fi, and operator signals presents a danger to future medical delivery systems. A detection framework capable of sensing attacks on drones could provide the capability for active responses.
Kulp, Philip H., Mei, Nagi
core   +1 more source

How far did we get in face spoofing detection?

open access: yes, 2018
The growing use of control access systems based on face recognition shed light over the need for even more accurate systems to detect face spoofing attacks.
Oliveira, Luciano   +3 more
core   +2 more sources

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Authentication of Satellite Navigation Signals by Wiretap Coding and Artificial Noise

open access: yes, 2018
In order to combat the spoofing of global navigation satellite system (GNSS) signals we propose a novel approach for satellite signal authentication based on information-theoretic security.
Formaggio, Francesco, Tomasin, Stefano
core   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Image and video analysis using graph neural network for Internet of Medical Things and computer vision applications

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma   +4 more
wiley   +1 more source

Security of GPS/INS based On-road Location Tracking Systems

open access: yes, 2018
Location information is critical to a wide-variety of navigation and tracking applications. Today, GPS is the de-facto outdoor localization system but has been shown to be vulnerable to signal spoofing attacks.
Narain, Sashank   +2 more
core   +1 more source

MobilBye: Attacking ADAS with Camera Spoofing

open access: yesCoRR, 2019
Advanced driver assistance systems (ADASs) were developed to reduce the number of car accidents by issuing driver alert or controlling the vehicle. In this paper, we tested the robustness of Mobileye, a popular external ADAS. We injected spoofed traffic signs into Mobileye to assess the influence of environmental changes (e.g., changes in color, shape,
Dudi Nassi   +3 more
openaire   +2 more sources

From the Ground to the Stars: The Vertical Politics of the EU Drone Wall and Airspace Defence

open access: yesJCMS: Journal of Common Market Studies, EarlyView.
Abstract This research note analyses the European Commission's Defence Readiness Roadmap 2030 as a manifestation of a new spatial and technological logic of European defence: the vertical territorialisation of security. Moving beyond traditional perimeter‐based understandings of territorial defence, the Roadmap constructs a multi‐layered continuum ...
Justinas Lingevicius   +2 more
wiley   +1 more source

Risk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs

open access: yes, 2019
Recent developments have made autonomous vehicles (AVs) closer to hitting our roads. However, their security is still a major concern among drivers as well as manufacturers.
Behfarnia, Ali, Eslami, Ali
core   +1 more source

Home - About - Disclaimer - Privacy