Results 61 to 70 of about 7,963 (189)

Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García   +4 more
wiley   +1 more source

Interference and Spoofing Detection for GNSS Maritime Applications using Direction of Arrival and Conformal Antenna Array [PDF]

open access: yesION GNSS+, The International Technical Meeting of the Satellite Division of The Institute of Navigation, 2018
An international maritime measurement campaign was done to detect and record radio frequency interferences in the Satellite Navigation frequency bands. The system, installed on a large container ship, consists of a conformal seven elements antenna array, an ad-hoc data recorder system and a multi-antenna navigation receiver prototype.
Perez Marcos, Emilio   +6 more
openaire   +2 more sources

Performance Bounds for Finite Moving Average Change Detection: Application to Global Navigation Satellite Systems

open access: yes, 2017
Due to the widespread deployment of Global Navigation Satellite Systems (GNSSs) for critical road or urban applications, one of the major challenges to be solved is the provision of integrity to terrestrial environments, so that GNSS may be safety used ...
Egea-Roca, Daniel   +3 more
core   +1 more source

Large Language Models for Explainable Medical Text Summarization: A Systematic Literature Review

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The graphical abstract highlights the three key aspects addressed in this review: the technical background of medical text summarization methods relevant to clinical decision support; the LLM background in providing context for its diagnosis and clinical significance; and clinical decision support with summarization and explainability in patient care ...
Aleka Melese Ayalew   +3 more
wiley   +1 more source

Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias

open access: yesSensors, 2023
The aim of this paper was to propose a method to characterize the ability of a GNSS user to detect a spoofing attack from the behavior of the clock bias.
Victor Truong   +3 more
doaj   +1 more source

LTE Spectrum Sharing Research Testbed: Integrated Hardware, Software, Network and Data

open access: yes, 2017
This paper presents Virginia Tech's wireless testbed supporting research on long-term evolution (LTE) signaling and radio frequency (RF) spectrum coexistence. LTE is continuously refined and new features released.
Marojevic, Vuk   +2 more
core   +2 more sources

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, Volume 43, Issue 3, Page 2254-2341, May 2026.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

GNSS Spoofing Detection and Mitigation in Multireceiver Configuration via Tracklets and Spoofer Localization

open access: yesIEEE Access, 2022
Global navigation satellite systems (GNSS) sensors estimate its position, velocity, and time (PVT) using pseudorange measurements. When there is no interference, the pseudoranges are due to authentic satellites, and the bearings is distinguishable ...
Bethi Pardhasaradhi   +4 more
doaj   +1 more source

Satellite Navigation for the Age of Autonomy

open access: yes, 2020
Global Navigation Satellite Systems (GNSS) brought navigation to the masses. Coupled with smartphones, the blue dot in the palm of our hands has forever changed the way we interact with the world.
Chan, Bryan   +8 more
core   +1 more source

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy