Results 81 to 90 of about 7,963 (189)

Spoofing Mitigation of GPS Receiver using Least Mean Squares-Based Adaptive Filter

open access: yesIranian Journal of Electrical and Electronic Engineering, 2015
The Global Positioning System (GPS) signals are very weak signal over wireless channels, so they are vulnerable to in-band interferences. Therefore, even a low-power interference can easily spoof GPS receivers.
M. R. Mosavi, Z. Shokhmzan
doaj  

MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 5, March 2026.
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch   +3 more
wiley   +1 more source

A Hybrid Encryption Framework for Secure and Real‐Time Vehicular Communications

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT The rapid expansion of Vehicular Ad Hoc Networks (VANETs) has amplified concerns regarding data security, integrity, and privacy. This paper presents SECURIDE, a Secure Intelligent Data Exchange for Connected Vehicles that provides a comprehensive encryption–decryption framework for safeguarding multimedia data and communication channels in ...
Muhammad Usama, Muhammad Usman Hadi
wiley   +1 more source

Materials and System Design for Self‐Decision Bioelectronic Systems

open access: yesAdvanced Materials, Volume 38, Issue 9, 12 February 2026.
This review highlights how self‐decision bioelectronic systems integrate sensing, computation, and therapy into autonomous, closed‐loop platforms that continuously monitor and treat diseases, marking a major step toward intelligent, self‐regulating healthcare technologies.
Qiankun Zeng   +9 more
wiley   +1 more source

Research on Multi-Peak Detection of Small Delay Spoofing Signal

open access: yesIEEE Access, 2020
With the widespread application of GNSS systems in various fields, the problem of spoofing detection has drawn much attention from the satellite navigation community.
Junzhi Li   +5 more
doaj   +1 more source

Security analysis of JXME-Proxyless version [PDF]

open access: yes, 2010
JXME es la especificación de JXTA para dispositivos móviles con J2ME. Hay dos versiones diferentes de la aplicación JXME disponibles, cada una específica para un determinado conjunto de dispositivos, de acuerdo con sus capacidades.
Arnedo Moreno, Joan   +2 more
core  

Investigating the Impact of Global Positioning System Evidence

open access: yes, 2015
The continued amalgamation of Global Positioning Systems (GPS) into everyday activities stimulates the idea that these devices will increasingly contribute evidential importance in digital forensics cases.
Berman, Kiyoshi J   +2 more
core   +1 more source

Terahertz Waveform‐Selective Antenna Using a Patch Structure Loaded with Nonlinear Circuits

open access: yesAdvanced Photonics Research, Volume 7, Issue 2, February 2026.
A waveform‐selective antenna that integrates the functions of waveform selectivity, electromagnetic shielding, and EM wave radiation has been proposed. By integrating different nonlinear circuits and selecting appropriate component values, the antenna can achieve high reflection of either a pulse wave or a continuous wave, while allowing the other ...
Zeting Li, Kai‐Da Xu, Pin Wen
wiley   +1 more source

GNSS Spoofing Detection Using Static or Rotating Single-Antenna of a Static or Moving Victim

open access: yesIEEE Access, 2018
GNSS spoofing works as follows: the GNSS signal generator transmits a signal simulation of several satellites at the GNSS frequency. If the level of the simulated signal exceeds the signal strength of real satellites, the GNSS receiver will “ ...
Larisa A. Dobryakova   +2 more
doaj   +1 more source

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, Volume 13, Issue 7, 3 February 2026.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy