Essays about: "spoofing"
Showing result 11 - 15 of 49 essays containing the word spoofing.
-
11. Cybersecurity of Maritime Communication Systems : Spoofing attacks against AIS and DSC
University essay from Linköpings universitet/Databas och informationsteknikAbstract : For a long time, ships have relied on navigators that could figure out their course andlocation based on seeing objects around them. However, this approach is limited to thenavigators’ ability, and with the increasing number of ships, this job becomes harder andharder. READ MORE
-
12. A Positioning System for Landing a UAV on a UGV in a GNSS-Denied Scenario
University essay from Linköpings universitet/Institutionen för systemteknikAbstract : A system of an unmanned aerial vehicle (UAV) collaborating with an unmanned ground vehicle (UGV) for use in for example surveillance, reconnaissance, transport and target acquisition is studied. The project investigates the problem of estimating the relative position, velocity and orientation between the UAV and the UGV required to autonomously land the UAV on the UGV during movement. READ MORE
-
13. Anomalous Behavior Detection in Aircraft based Automatic Dependent Surveillance–Broadcast (ADS-B) system using Deep Graph Convolution and Generative model (GA-GAN)
University essay from Linköpings universitet/Databas och informationsteknikAbstract : The Automatic Dependent Surveillance-Broadcast (ADS-B) is a key component of the Next Generation Air Transportation System (Next Gen) that manages the increasingly congested airspace and operation. From Jan 2020, the U.S. Federal Aviation Administration (FAA) mandated the use of (ADS-B) as a key component of Next Gen project. READ MORE
-
14. IoT Penetration Testing : Examining the cyber security of connected vehicles
University essay from KTH/DatavetenskapAbstract : The connected car is rapidly becoming the norm in the automotive industry. With connected devices playing such a big part in today’s society our view of what constitutes a car is beginning to change. READ MORE
-
15. Authentication Techniques Based on Physical Layer Attributes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE