Results 61 to 70 of about 8,112 (198)

From the Ground to the Stars: The Vertical Politics of the EU Drone Wall and Airspace Defence

open access: yesJCMS: Journal of Common Market Studies, EarlyView.
Abstract This research note analyses the European Commission's Defence Readiness Roadmap 2030 as a manifestation of a new spatial and technological logic of European defence: the vertical territorialisation of security. Moving beyond traditional perimeter‐based understandings of territorial defence, the Roadmap constructs a multi‐layered continuum ...
Justinas Lingevicius   +2 more
wiley   +1 more source

Spoofing Mitigation Using Multiple GNSS-Receivers

open access: yes, 2019
Global Navigation Satellite Systems (GNSS) are used in a multitude of civilian as well as security related applications. GNSS-receivers are vulnerable to different types of spoofing attacks where the receiver is ``tricked'' to provide false position and time estimates.
openaire   +2 more sources

Mitigation of Spoofing Attacks on IOT Home Networks

open access: yesInternational Journal of Engineering and Advanced Technology, 2019
internet of things is now everywhere and even if people are aware of it or not, it is part of our everyday life. For something that is so much in pace with our life, iot collects a lot of information about our day today life, which in case of a data leak or hijacking could lead to catastrophic effects in the society.
Ms. Archana K C, Dr. Harini N
openaire   +1 more source

Building centaur responders: is emergency management ready for artificial intelligence?

open access: yesDisasters, Volume 50, Issue 3, July 2026.
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Christopher Whyte   +1 more
wiley   +1 more source

Securing On-Body IoT Devices By Exploiting Creeping Wave Propagation

open access: yes, 2018
On-body devices are an intrinsic part of the Internet-of-Things (IoT) vision to provide human-centric services. These on-body IoT devices are largely embedded devices that lack a sophisticated user interface to facilitate traditional Pre-Shared Key based
Jiang, Tao   +3 more
core   +1 more source

GNSS Spoofing Modeling and Consistency-Check-Based Spoofing Mitigation with Android Raw Data

open access: yesElectronics
Spoofing events are increasingly affecting the performance of devices and operations relying on Global Navigation Satellite Systems (GNSSs). Developing powerful and robust GNSS spoofing detection and mitigation algorithms is an important endeavor in the GNSS community nowadays; some of the challenges in this field are limited access to spoofing ...
Enrique Takiguchi Medina   +1 more
openaire   +2 more sources

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Quantum Geo-Encryption

open access: yes, 2016
In this work we introduce the concept of quantum geo-encryption - a protocol that invokes direct quantum encryption of messages coupled to quantum location monitoring of the intended receiver.
Malaney, Robert
core   +1 more source

Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García   +4 more
wiley   +1 more source

Survey on Intentional Interference Techniques of GNSS Signals and Radio Links between Unmanned Aerial Vehicle and Ground Control Station [PDF]

open access: yesTransNav
With the rapid development of unmanned aerial vehicle (UAV) technology, UAVs are gaining increasing importance in civilian, industrial, and military applications.
Jan Dulowicz   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy