A review of counter-UAS technologies for cooperative defensive teams of drones
In recent years, the drone market has had a significant expansion, with applications in
various fields (surveillance, rescue operations, intelligent logistics, environmental …
various fields (surveillance, rescue operations, intelligent logistics, environmental …
Smart jamming attacks in 5G new radio: A review
The fifth generation of wireless cellular networks (5G) is expected to be the infrastructure for
emergency services, natural disasters rescue, public safety, and military communications …
emergency services, natural disasters rescue, public safety, and military communications …
Jamming of UAV remote control systems using software defined radio
Unmanned aerial vehicles (UAVs) have become widely available and their potential
unlawful usage introduces new security risks. It has therefore become highly desirable to …
unlawful usage introduces new security risks. It has therefore become highly desirable to …
[PDF][PDF] Detection and Classification of Radio Frequency Jamming Attacks using Machine learning.
Wireless networks are an important aspect of communication technologies that avoid the
cost and burden of cable installation. They play a vital role in our everyday lives. However …
cost and burden of cable installation. They play a vital role in our everyday lives. However …
DoS attacks on remote state estimation with asymmetric information
In this paper, we consider remote state estimation in an adversarial environment. A sensor
forwards local state estimates to a remote estimator over a vulnerable network, which may …
forwards local state estimates to a remote estimator over a vulnerable network, which may …
Sensing jamming strategy from limited observations: An imitation learning perspective
This paper studies the problem of sensing mainlobe jamming strategy through interaction
samples between a frequency agile radar and a transmit/receive time-sharing jammer. We …
samples between a frequency agile radar and a transmit/receive time-sharing jammer. We …
Optimal power allocation and scheduling under jamming attacks
In this paper, we consider a jammed wireless scenario where a network operator aims to
schedule users to maximize network performance while guaranteeing a minimum …
schedule users to maximize network performance while guaranteeing a minimum …
AntiSense: Standard-compliant CSI obfuscation against unauthorized Wi-Fi sensing
Abstract Channel State Information (CSI)-based localization with 802.11 has been proven
feasible in multiple scenarios and is becoming a serious threat to people's privacy in …
feasible in multiple scenarios and is becoming a serious threat to people's privacy in …
Iot phantom-delay attacks: Demystifying and exploiting iot timeout behaviors
This paper unveils a set of new attacks against Internet of Things (IoT) automation systems.
We first propose two novel IoT attack primitives: Event Message Delay and Command …
We first propose two novel IoT attack primitives: Event Message Delay and Command …
Antifragile communications
This paper introduces the concept of antifragile communications, which we define as the
capability for a communications system to improve in performance due to a system stressor …
capability for a communications system to improve in performance due to a system stressor …