GNSS spoofing in conflict zones disrupts wildlife tracking and hampers research and conservation efforts. [PDF]
Jiguet F +14 more
europepmc +1 more source
Dataset of SCADA traffic captures from a medical waste incinerator with injected cyberattacks. [PDF]
Al-Duwairi B +3 more
europepmc +1 more source
Automatic dependent surveillance-broadcast (ADS-B) anomalous messages and attack type detection: deep learning-based architecture. [PDF]
Ahmed W +3 more
europepmc +1 more source
Audio Deepfake Detection via a Fuzzy Dual-Path Time-Frequency Attention Network. [PDF]
Li J +6 more
europepmc +1 more source
Face Anti-Spoofing Based on Adaptive Channel Enhancement and Intra-Class Constraint. [PDF]
Li Y, Sun W, Li Z, Guo X.
europepmc +1 more source
DeepSpoofNet: a framework for securing UAVs against GPS spoofing attacks. [PDF]
Badar AUR +6 more
europepmc +1 more source
Intelligent algorithmic framework for detection and mitigation of BeiDou spoofing attacks in vehicular ad hoc networks (VANETs). [PDF]
Tariq U.
europepmc +1 more source
Detecting and Mitigating Attacks on GPS Devices. [PDF]
Burbank J, Greene T, Kaabouch N.
europepmc +1 more source
AI-enabled cybersecurity framework for future 5G wireless infrastructures. [PDF]
Alam A, Umer A, Ullah I, Alsayat A.
europepmc +1 more source
A Simulation Study on the Theoretical Potential of Quantum-Enhanced Federated Security Operations. [PDF]
Campbell R.
europepmc +1 more source

