Protecting autonomous UAVs from GPS spoofing and jamming: A comparative analysis of detection and mitigation techniques

P Joeaneke, O Obioha Val, OO Olaniyi… - … Olumide Samuel and …, 2024 - papers.ssrn.com
This study investigates the vulnerabilities of unmanned aerial vehicles (UAVs) to GPS
spoofing and jamming, addressing three key research questions:(1) What are the common …

[PDF][PDF] Leveraging advanced machine learning algorithms for enhanced cyberattack detection on US business networks

MR Islam, M Nasiruddin, M Karmakar… - Journal of Business …, 2024 - researchgate.net
Cyberattacks' rising volume and sophistication have made conventional security measures,
such as firewalls, signature-based intrusion detection systems, and antivirus software …

Revolutionizing online education: Advanced facial expression recognition for real-time student progress tracking via deep learning model

M Aly - Multimedia Tools and Applications, 2024 - Springer
This paper presents a groundbreaking online educational platform that utilizes facial
expression recognition technology to track the progress of students within the classroom …

Harnessing Machine Learning Intelligence Against Cyber Threats: Navigating Legal and Ethical Challenges in Global Cyber Investigations

B Singh, C Kaunert, R Gautam - … Entrepreneurial Mindsets With AI, 2024 - igi-global.com
The spread of cyberthreats in the digital age presents serious concerns to national security,
the stability of the economy, and personal privacy. Traditional security methods are unable …

Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model

M Subhi, OF Rashid… - Mesopotamian …, 2024 - journals.mesopotamian.press
Cybersecurity refers to the actions that are used by people and companies to protect
themselves and their information from cyber threats. Different security methods have been …

Weakly-supervised thyroid ultrasound segmentation: Leveraging multi-scale consistency, contextual features, and bounding box supervision for accurate target …

M Aly - Computers in Biology and Medicine, 2025 - Elsevier
Weakly-supervised learning (WSL) methods have gained significant attention in medical
image segmentation, but they often face challenges in accurately delineating boundaries …

[HTML][HTML] Performance optimization for hybrid TS/PS SWIPT UAV in cooperative NOMA IoT networks

VH Dang, H Tran, DD Tran, S Chatzinotas… - Alexandria Engineering …, 2024 - Elsevier
This study examines a cooperative non-orthogonal multiple access (NOMA) network utilizing
an energy-constrained unmanned aerial vehicle (UAV) relay (UAVR) to expand coverage …

Enhanced SVM and RNN Classifier for Cyberattacks Detection in Underwater Wireless Sensor Networks.

AI Altameemi, SJ Mohammed… - … Journal of Safety & …, 2024 - search.ebscohost.com
Researchers have been paying greater attention to Underwater Wireless Sensor Networks
(UWSN) lately because of their advancements in ocean surveillance, application …

AutoGMM-RWKV: A Detecting Scheme Based on Attention Mechanisms Against Selective Forwarding Attacks in Wireless Sensor Networks

S **e, Y Li, Y Ma, Y Wu - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Integrating Wireless Sensor Networks (WSNs) technologies into Internet of Things amplifies
their monitoring capabilities by enabling real-time data collection and analysis across …

[HTML][HTML] Enhancing Clustering Efficiency in Heterogeneous Wireless Sensor Network Protocols Using the K-Nearest Neighbours Algorithm

A Juwaied, L Jackowska-Strumillo, A Sierszeń - Sensors, 2025 - mdpi.com
Wireless Sensor Networks are formed by tiny, self-contained, battery-powered computers
with radio links that can sense their surroundings for events of interest and store and …