Results 51 to 60 of about 8,112 (198)
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications
Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments.
Calyam, Prasad +7 more
core +1 more source
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
Detection and Mitigation of GNSS Spoofing Attacks in Maritime Environments Using a Genetic Algorithm
Due to the high reliance of daily activities on the Global Navigation Satellite System (GNSS), its security is one of the major concerns for research and industry. Most navigation and mobile-driven location-based services use GNSS to render services. Due
Saravjeet Singh +6 more
doaj +1 more source
Galileo and EGNOS as an asset for UTM safety and security [PDF]
GAUSS (Galileo-EGNOS as an Asset for UTM Safety and Security) is a H2020 project1 that aims at designing and developing high performance positioning systems for drones within the U-Space framework focusing on UAS (Unmanned Aircraft System) VLL (Very Low ...
Andrade-Cetto, Juan +7 more
core
Detecting ADS-B Spoofing Attacks using Deep Neural Networks
The Automatic Dependent Surveillance-Broadcast (ADS-B) system is a key component of the Next Generation Air Transportation System (NextGen) that manages the increasingly congested airspace.
Bernieri, Giuseppe +5 more
core +1 more source
Direction-of-Arrival Assisted Sequential Spoofing Detection and Mitigation [PDF]
The paper presents several novel techniques for detection of spoofing/meaconing signals using the direction-of-arrival (DOA) measurements available in a multi-antenna navigation receiver. The detection is based on comparison and statistically testing of the measured DOAs against the expected DOAs. The expected DOAs are
Meurer, Michael +3 more
openaire +2 more sources
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma +4 more
wiley +1 more source
A Two-Stage Interference Suppression Scheme Based on Antenna Array for GNSS Jamming and Spoofing
Jamming and spoofing are the two main types of intentional interference for global navigation satellite system (GNSS) receivers. Due to the entirely different signal characteristics they have, a few techniques can deal with them simultaneously.
Jiaqi Zhang +3 more
doaj +1 more source
Apart from delay to flight arrivals, occurrence of ghost aircraft from ADS-B message injection attack will also cause delay to the departure operations.
Mohd Ruzeiny Kamaruzzaman +3 more
doaj +1 more source
Preventing DDoS using Bloom Filter: A Survey
Distributed Denial-of-Service (DDoS) is a menace for service provider and prominent issue in network security. Defeating or defending the DDoS is a prime challenge. DDoS make a service unavailable for a certain time.
Borgohain, Samir Kumar +2 more
core +1 more source

