Results 61 to 70 of about 23,142 (187)
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
Development status and challenges of anti-spoofing technology of GNSS/INS integrated navigation
The threat of spoofing interference has posed a severe challenge to the security application of Global Navigation Satellite System (GNSS). It is particularly urgent and critical to carry out in-depth defense research on spoofing interference.
Lei Wang +11 more
doaj +1 more source
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma +4 more
wiley +1 more source
Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks [PDF]
Modern power systems have begun integrating synchrophasor technologies into part of daily operations. Given the amount of solutions offered and the maturity rate of application development it is not a matter of "if" but a matter of "when" in regards to ...
Barella, Richard +6 more
core +2 more sources
A Study on Replay Attack and Anti-Spoofing for Automatic Speaker Verification
For practical automatic speaker verification (ASV) systems, replay attack poses a true risk. By replaying a pre-recorded speech signal of the genuine speaker, ASV systems tend to be easily fooled.
Chen, Yixiang +3 more
core +1 more source
From the Ground to the Stars: The Vertical Politics of the EU Drone Wall and Airspace Defence
Abstract This research note analyses the European Commission's Defence Readiness Roadmap 2030 as a manifestation of a new spatial and technological logic of European defence: the vertical territorialisation of security. Moving beyond traditional perimeter‐based understandings of territorial defence, the Roadmap constructs a multi‐layered continuum ...
Justinas Lingevicius +2 more
wiley +1 more source
Advanced GNSS Spoofing Detection: Aggregated Correlation Residue Likelihood Analysis
Compared to conventional spoofing, emerging spoofing attacks pose a heightened threat to security applications within the global navigation satellite system (GNSS) due to their subtly designed signal structures.
Ning Ji +3 more
doaj +1 more source
DETECTION OF SPOOFING ATTACKS ON SPEAKER VERIFICATION SYSTEMS IN TELEPHONE CHANNEL [PDF]
Subject of Research. The present paper is devoted to the attacks detection problem on voice biometric systems (spoofing-attacks) in telephone channel. Nowadays, spoofing detection is under the high interest in the field of voice speaker authentication ...
G.M. Lavrentyeva
doaj +1 more source
Reliable Detection of Location Spoofing and Variation Attacks
Location spoofing is a critical attack in mobile communications. While several previous studies investigated the detection of location spoofing attacks, they are limited in their performance and lack the consideration of emerging attack variations.
Chiho Kim +5 more
doaj +1 more source
Risk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs
Recent developments have made autonomous vehicles (AVs) closer to hitting our roads. However, their security is still a major concern among drivers as well as manufacturers.
Behfarnia, Ali, Eslami, Ali
core +1 more source

