Modeling the effects of crew size and crew fatigue on the control of tactical unmanned aerial vehicles (TUAVs)

B Walters, J French, MJ Barnes - 2000 Winter Simulation …, 2000 - ieeexplore.ieee.org
The field element of the US Army Research Lab (ARL) at Fort Huachuca, Arizona is
concerned with the manning required to operate the close-range Tactical Unmanned Aerial …

Evaluation of mobile network security

Z Simate - 2013 Pan African International Conference on …, 2013 - ieeexplore.ieee.org
Mobile Transactions are on the increase in third world countries enabling access to banking
services and payment solution. With this rapid increase, most of the underlying platforms are …

Designing a combined personal communicator and data entry terminal for disaster relief & remote operations

P Gardner-Stephen, A Wallace, L Moss… - 2019 IEEE Global …, 2019 - ieeexplore.ieee.org
The commoditization of powerful, portable and affordable mobile communications devices
has transformed disaster response and remote data collection. Where in the past field …

Secure automotive telematics system (SATS)

I Jattala, S Durrani, J Farooqi, G Junjua… - Eighth International …, 2013 - ieeexplore.ieee.org
The demand for automotive telematics systems is growing every year. Telematics systems
are used for a variety of applications such as vehicle tracking, navigation, driving habits …

[PDF][PDF] Challenges and Risks for a Secure Communication between a Smartcard and a Service Provider through Cellular Network

K Ok, V Coskun, RC Cevikbas - International Journal of …, 2014 - researchgate.net
Subscriber Identity Module (SIM) cards, became a place where various value added
services are proposed. SIM cards, in addition to authenticating users to the cellular network …

[PDF][PDF] Enhancing a City via GIS: Issues and Challenges

I Cieślak, M Jankowska, M Kiedrowicz, AM Kowalczyk… - 2015 - academia.edu
A Geographic Information System (GIS) is a tool which enables the creation, management,
visualization and analysis of geographical data. As such, it is a natural choice for monitoring …

GSM to UMTS Network Handover Vulnerability Testing Using Software-Defined Radio

C McAbee, M Tummala… - 2015 48th Hawaii …, 2015 - ieeexplore.ieee.org
This paper examines a possible vulnerability with the potential for a malicious entity to
prevent a mobile device from handing over from a global system for mobile communications …

[PDF][PDF] A study of voice traffic blocking in a model cellular network

OM Maguitte, MS Sunhaloo, B Oodit… - International Journal of …, 2011 - academia.edu
In this paper, we present results obtained from a statistical analysis of a model cellular
network which is similar to the one used in Mauritius. We have tested system samples with …

Secure cryptographic operations on sim card for mobile financial services

K Ok, S Senturk, S Aktas… - International Journal of …, 2016 - publications.waset.org
Mobile technology is very popular nowadays and it provides a digital world where users can
experience many value-added services. Service Providers are also eager to offer diverse …

[PDF][PDF] A STATISTICAL ANALYSIS AND ASSESSMENT OF THE IMSI-CATCHING THREAT AGAINST MOBILE SECURITY STANDARDS

CA Johnson - 2020 - apps.dtic.mil
International mobile subscriber identity (IMSI) catching is a man-in-the-middle attack that
utilizes rogue base stations to intercept the IMSIs of mobile users. Attackers can use …