Results 81 to 90 of about 8,112 (198)
We identify ruthenium as a refractory plasmonic material exhibiting dual ENZ optical topological transitions and dual plasmonic resonances spanning from visible to infrared region with high imaginary permittivity. We establish a nanoparticle‐on‐cavity (NPoC) resonance mode and realize a NPoC selective solar absorber using cost‐effective additive ...
Zhequn Huang +4 more
wiley +1 more source
Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan +2 more
wiley +1 more source
Detection of Access Point Spoofing in the Wi-Fi Fingerprinting Based Positioning
Indoor positioning based on Wi-Fi signals has gained a lot of attention lately. There are many advantages related to the use of Wi-Fi signals for positioning, including the availability of Wi-Fi access points in indoor environments and the integration of
Juraj Machaj +3 more
doaj +1 more source
Access Control in Healthcare IoT: A Comprehensive Survey
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir +3 more
wiley +1 more source
The Case of Fleeting Orders and Flickering Quotes
ABSTRACT The literature controversially discusses the ambiguous motives and driving forces behind quickly cancelled limit orders (fleeting orders), which are characteristic of high‐frequency markets. In particular, manipulative and dysfunctional characteristics are feared. We analyze top‐of‐book fleeting orders—so‐called flickering quotes—and show with
Markus Ulze +2 more
wiley +1 more source
Accurate GNSS timing is fundamental to Power Time Synchronization Systems (PTSS). However, conventional substation infrastructures remain vulnerable to sophisticated spoofing attacks.
Wenxin Jin +7 more
doaj +1 more source
Ack Spoofing Attack in IEEE 802.11 Infrastructure WLANs: Strategies, Detection and Mitigation
This paper investigates a vulnerability in IEEE 802.11 wireless local area networks, focusing on a MAC sublayer attack known as acknowledgement (Ack) spoofing.
Ayat Al‐Wraikat +2 more
doaj +1 more source
Master of puppets: analyzing and attacking a botnet for fun and profit [PDF]
A botnet is a network of compromised machines (bots), under the control of an attacker. Many of these machines are infected without their owners’ knowledge, and botnets are the driving force behind several misuses and criminal activities on the ...
Saito, Genki, Stringhini, Gianluca
core
A Deep Learning Based Code Loop Discriminator for GPS Spoofing Mitigation [PDF]
A vital part of people's daily life is the position, navigation, and time service provided by the Global Positioning System (GPS), which is always accessible globally. Consequently, the security of the GPS receivers is crucial.
S. Tohidi, M. R. Mosavi
doaj
GNSS Spoofing Discovery by Using a Type-Based Detector
With the increase in the number of devices relying on Global Navigation Satellite Sustems (GNSS) and the wide use of such technology for critical applications, such as in aviation and autonomous vehicles, security is a main concern.
Runzhou Fan, Harry Leib
doaj +1 more source

