Results 71 to 80 of about 7,963 (189)

Two-Step Trajectory Spoofing Algorithm for Loosely Coupled GNSS/IMU and NIS Sequence Detection

open access: yesIEEE Access, 2019
Satellite navigation spoofing has become a central issue of jamming technology research because of its serious threat and ability to conceal itself. Increasingly, targets are equipped with more robust GNSS/IMU systems and normalized innovation squared ...
Yangjun Gao, Zhiwei Lv, Lundong Zhang
doaj   +1 more source

Access Control in Healthcare IoT: A Comprehensive Survey

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir   +3 more
wiley   +1 more source

A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing

open access: yesSensors, 2019
This article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites ...
Jaroslaw Magiera
doaj   +1 more source

A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

open access: yes, 2016
This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security.
Hanzo, Lajos   +3 more
core   +1 more source

The Case of Fleeting Orders and Flickering Quotes

open access: yesJournal of Futures Markets, Volume 46, Issue 4, Page 629-652, April 2026.
ABSTRACT The literature controversially discusses the ambiguous motives and driving forces behind quickly cancelled limit orders (fleeting orders), which are characteristic of high‐frequency markets. In particular, manipulative and dysfunctional characteristics are feared. We analyze top‐of‐book fleeting orders—so‐called flickering quotes—and show with
Markus Ulze   +2 more
wiley   +1 more source

Taxonomy of IMT Interference on Aeronautical Systems

open access: yesRadio Science, Volume 61, Issue 4, April 2026.
Abstract The rapid deployment of 5G and future 6G networks has raised concerns about interference with critical aeronautical systems, particularly radio altimeters and Wireless Avionics Intra‐Communications (WAIC). This paper offers a comprehensive taxonomy of the 5G/6G signal interference mechanisms, operational impacts, and mitigation strategies in ...
Valéria C. M. N. Leite, Alison Moraes
wiley   +1 more source

A Combined Antijamming and Antispoofing Algorithm for GPS Arrays

open access: yesInternational Journal of Antennas and Propagation, 2019
The Global Positioning System (GPS), with its accurate positioning and timing information, has become a commonly used navigation instrument for many applications. However, it is susceptible to intentional interference such as jamming and spoofing.
Qiong Yang   +3 more
doaj   +1 more source

A Tool for Furthering GNSS Security Research: The Oak Ridge Spoofing and Interference Test Battery (OAKBAT)

open access: yesION GNSS+, The International Technical Meeting of the Satellite Division of The Institute of Navigation, 2020
A new global navigation satellite system (GNSS) dataset of digitized RF signals named the Oak Ridge Spoofing and Interference Test Battery (OAKBAT) has been created. OAKBAT contains digitized spoofing signals that serve as both a supporting “sibling,” and an advancement to the widely used Texas Spoofing Test Battery (TEXBAT) dataset [1].
Austin Albright   +3 more
openaire   +2 more sources

Development of a Real-Time Software-Defined Radio GPS Receiver Exploiting a LabVIEW-based Instrumentation Environment

open access: yes, 2018
The ubiquitousness of location based services (LBS) has proven effective for many applications such as commercial, military, and emergency responders. Software-defined radio (SDR) has emerged as an adequate framework for development and testing of global
Akopian, David   +2 more
core   +1 more source

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, Volume 11, Issue 2, Page 349-366, April 2026.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

Home - About - Disclaimer - Privacy