Results 81 to 90 of about 22,160 (195)

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

Access Control in Healthcare IoT: A Comprehensive Survey

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir   +3 more
wiley   +1 more source

Taxonomy of IMT Interference on Aeronautical Systems

open access: yesRadio Science, Volume 61, Issue 4, April 2026.
Abstract The rapid deployment of 5G and future 6G networks has raised concerns about interference with critical aeronautical systems, particularly radio altimeters and Wireless Avionics Intra‐Communications (WAIC). This paper offers a comprehensive taxonomy of the 5G/6G signal interference mechanisms, operational impacts, and mitigation strategies in ...
Valéria C. M. N. Leite, Alison Moraes
wiley   +1 more source

Perfect secrecy systems immune to spoofing attacks [PDF]

open access: yesInternational Journal of Information Security, 2012
We present novel perfect secrecy systems that provide immunity to spoofing attacks under equiprobable source probability distributions. On the theoretical side, relying on an existence result for $t$-designs by Teirlinck, our construction method constructively generates systems that can reach an arbitrary high level of security.
openaire   +2 more sources

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, Volume 11, Issue 2, Page 349-366, April 2026.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

Understanding the Autonomous Electric Vehicle Cyber Threat Landscape: A Focus on Infrastructure, Threats and Ontology‐Based Modelling

open access: yesEnergy Internet, Volume 3, Issue 1, Page 39-51, April 2026.
ABSTRACT The development of autonomous electric vehicles (AEVs) represents the convergence of two simultaneous automotive revolutions: electric vehicles (EVs) and autonomous vehicles (AVs). AVs require sensors, decision‐making systems and actuation systems to achieve autonomous driving, whereas EVs require intelligent management and real‐time ...
Ohud Alsadi   +5 more
wiley   +1 more source

Improve the Security of GNSS Receivers Through Spoofing Mitigation

open access: yesIEEE Access, 2017
Spoofing attacks are one of the most dangerous threats for the application of the global navigation satellite system (GNSS), especially for autonomous driving and unmanned aerial vehicles.
Shuai Han   +3 more
doaj   +1 more source

MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 5, March 2026.
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch   +3 more
wiley   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, Volume 14, Issue 3, Page 1431-1455, March 2026.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

Quantum-secured LiDAR with Gaussian modulated coherent states

open access: yesScientific Reports
LiDAR systems that rely on classical signals are susceptible to intercept-and-recent spoofing attacks, where a target attempts to avoid detection. To address this vulnerability, we propose a quantum-secured LiDAR protocol that utilizes Gaussian modulated
Dong Wang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy