Search
Search Results
-
GNSS jamming detection using attention-based mutual information feature selection
Global navigation satellite systems (GNSS) are extensively utilized for military and civilian applications. Unfortunately, because of the signal...
-
Jamming Transmitter
In addition to space alignment, time overlap, frequency coverage, and polarization matching, sufficient jamming power is also required for effective... -
Anti-interrupted-sampling repeater jamming method based on frequency agility waveform and sparse recovery
Interrupted-sampling repeater jamming (ISRJ) is a type of intra-pulse coherent jamming that poses a significant threat to radar detection and...
-
A Blockchain-Based Attack Detection Mechanism in Healthcare Cyber Physical Systems Against Jamming Attacks
Healthcare Cyber Physical Systems (CPS) are vulnerable to cyber risks due to their dependency on wireless communication. Due to its centralized... -
Evaluation of Radar Jamming Effect
Evaluation of radar jamming effect is to evaluate the effect of jamming system on specific radar system under specific conditions, and its purpose is... -
Principle of Radar Active Jamming Technology
Radar active jamming is to disrupt or block the target detection and tracking of enemy radar by generating radio signals from electronic equipment.... -
Intelligent bandit learning for jamming strategy generation
Current jamming strategy generation in communication relies on prior information or has a slow learning rate. To overcome these drawbacks, an...
-
Cognitive Radio Jamming Attack Detection Using an Autoencoder for CRIoT Network
IoT network-connected devices are increasing day by day. It is impossible to allocate a spectrum for all IoT devices. This spectrum scarcity can be...
-
Receiver and Processor of Jamming System
In order to degrade the detection quality of radar, radar jamming needs to know the change of radar and therefore produce the precise jamming signal... -
System Controller of Jamming System
System controller is the brain and nervous system of a jamming system. Its duty is to make the compositions of the jamming system properly work... -
Summary of Radar Jamming
It has been over 70 years since radar jamming emerged as a countermeasure to the radar used for military purposes. -
Anti-jamming transmission in softwarization UAV network: a federated deep reinforcement learning approach
This paper presents the concept and studies of federated deep reinforcement learning (DRL) based anti-jamming communication in softwarization UAV...
-
Measurement and evaluation method of radar anti-jamming effectiveness based on principal component analysis and machine learning
With the development of modern electronic countermeasure technology, the fight between radar jamming and anti-jamming has become increasingly fierce....
-
Intelligent Detection System for Spoofing and Jamming Attacks in UAVs
Unmanned aerial vehicles (UAVs) have recently gained popularity due to their extensive uses in parcel delivery, wildlife conservation, agriculture,... -
Physical Layer Parameters for Jamming Attack Detection in VANETs: A Long Short Term Memory Approach
Nowadays, the reliance on intelligent traffic management is increasing. Vehicular ad hoc networks (VANETs), which belong to mobile ad hoc networks... -
Location Jamming of Radar Waves Using Software-Defined Radio
Nowadays, radar plays a key role in the world of warfare. The detection of critical military assets of the enemy is a must nowadays in modern warfare... -
Adaptive Neuro-Fuzzy Technique for Jamming Detection in VANETs
VANET is gaining popularity in recent generation. As increase in the advancement in technology due to the emerging of industry 4.0, VANET is also... -
Deep learning model-based detection of jamming attacks in low-power and lossy wireless networks
Communication in the wireless sensor networks could be disturbed by the jammer and this jamming attacks could be identified as a distinctive type of...
-
A Cooperative Jamming Scheme Based on Node Authentication for Underwater Acoustic Sensor Networks
Cooperative jamming (CJ) is one of the important methods to solve security problems of underwater acoustic sensor networks (UASNs). In this paper, we...
-
Taxonomy of UAVs GPS Spoofing and Jamming Attack Detection Methods
The fast evolution of the Unmanned Aerial Vehicle (UAV) has added a great deal of ease to our lives. Specific characteristics of UAV networks, such...