X Huang, C Wang, S Zhang - Energy, 2024 - Elsevier
This study focuses on ensuring the stable operation of the power grid by accurately forecasting the theoretical power generation capacity of wind turbine units, especially in …
In recent years, unmanned aerial vehicle (UAV)-to-ground wireless channels have become focused areas. Thus a better understanding of UAV-to-ground wireless channel …
S Sciancalepore, F Kusters… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The current state of the art on jamming detection relies on link-layer metrics. A few examples are the bit-error rate (BER), the packet delivery ratio, the throughput, and the signal-to-noise …
Traditional jamming detection techniques, adopted in static networks, require the receiver (under jamming) to infer the presence of the jammer by measuring the effects of the jamming …
Wireless enabling technologies in critical infrastructures are increasing the efficiency of communications. Most of these technologies are vulnerable to jamming attacks. Jamming …
A Brighente, M Conti, M Schotsman… - arXiv preprint arXiv …, 2024 - arxiv.org
The Remote ID (RID) regulation recently introduced by several aviation authorities worldwide (including the US and EU) forces commercial drones to regularly (max. every …
Wireless communication systems are vulnerable to intentional jamming that can result in significant disruptions to critical infrastructure, military communications, and civilian …