Results 81 to 90 of about 8,112 (198)

Ruthenium Nanoparticle‐On‐Cavity Refractory Thermoplasmonics for Broadband and Spectral‐Selective Solar Photothermal Conversion

open access: yesAdvanced Photonics Research, Volume 7, Issue 4, April 2026.
We identify ruthenium as a refractory plasmonic material exhibiting dual ENZ optical topological transitions and dual plasmonic resonances spanning from visible to infrared region with high imaginary permittivity. We establish a nanoparticle‐on‐cavity (NPoC) resonance mode and realize a NPoC selective solar absorber using cost‐effective additive ...
Zhequn Huang   +4 more
wiley   +1 more source

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

Detection of Access Point Spoofing in the Wi-Fi Fingerprinting Based Positioning

open access: yesSensors
Indoor positioning based on Wi-Fi signals has gained a lot of attention lately. There are many advantages related to the use of Wi-Fi signals for positioning, including the availability of Wi-Fi access points in indoor environments and the integration of
Juraj Machaj   +3 more
doaj   +1 more source

Access Control in Healthcare IoT: A Comprehensive Survey

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir   +3 more
wiley   +1 more source

The Case of Fleeting Orders and Flickering Quotes

open access: yesJournal of Futures Markets, Volume 46, Issue 4, Page 629-652, April 2026.
ABSTRACT The literature controversially discusses the ambiguous motives and driving forces behind quickly cancelled limit orders (fleeting orders), which are characteristic of high‐frequency markets. In particular, manipulative and dysfunctional characteristics are feared. We analyze top‐of‐book fleeting orders—so‐called flickering quotes—and show with
Markus Ulze   +2 more
wiley   +1 more source

An Array Antenna-Based Attitude Determination Method for GNSS Spoofing Mitigation in Power System Timing Applications

open access: yesApplied Sciences
Accurate GNSS timing is fundamental to Power Time Synchronization Systems (PTSS). However, conventional substation infrastructures remain vulnerable to sophisticated spoofing attacks.
Wenxin Jin   +7 more
doaj   +1 more source

Ack Spoofing Attack in IEEE 802.11 Infrastructure WLANs: Strategies, Detection and Mitigation

open access: yesIET Networks
This paper investigates a vulnerability in IEEE 802.11 wireless local area networks, focusing on a MAC sublayer attack known as acknowledgement (Ack) spoofing.
Ayat Al‐Wraikat   +2 more
doaj   +1 more source

Master of puppets: analyzing and attacking a botnet for fun and profit [PDF]

open access: yes, 2015
A botnet is a network of compromised machines (bots), under the control of an attacker. Many of these machines are infected without their owners’ knowledge, and botnets are the driving force behind several misuses and criminal activities on the ...
Saito, Genki, Stringhini, Gianluca
core  

A Deep Learning Based Code Loop Discriminator for GPS Spoofing Mitigation [PDF]

open access: yesIranian Journal of Electrical and Electronic Engineering
A vital part of people's daily life is the position, navigation, and time service provided by the Global Positioning System (GPS), which is always accessible globally. Consequently, the security of the GPS receivers is crucial.
S. Tohidi, M. R. Mosavi
doaj  

GNSS Spoofing Discovery by Using a Type-Based Detector

open access: yesIEEE Access
With the increase in the number of devices relying on Global Navigation Satellite Sustems (GNSS) and the wide use of such technology for critical applications, such as in aviation and autonomous vehicles, security is a main concern.
Runzhou Fan, Harry Leib
doaj   +1 more source

Home - About - Disclaimer - Privacy