[HTML][HTML] Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022 - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

[HTML][HTML] Security in low powered wide area networks: Opportunities for software defined network-supported solutions

G Pathak, J Gutierrez, SU Rehman - Electronics, 2020 - mdpi.com
The Internet of things (IoT) has revolutionized the use of connectivity and has given birth to
new transmission technologies to satisfy the requirements of diverse IoT applications. Low …

Utilising VAPT Technologies (Vulnerability Assessment & Penetration Testing) as a Method for Actively Preventing Cyberattacks

VV Vegesna - International Journal of Management, Technology …, 2023 - papers.ssrn.com
Complexity of systems are increasing day by day. This leads to more and more
vulnerabilities in Systems. Attackers use these vulnerabilities to exploit the victim's system. It …

Adaptive jammer localization in wireless networks

T Wang, X Wei, J Fan, T Liang - Computer Networks, 2018 - Elsevier
The shared nature of wireless communication, the open access to wireless medium, the
tightly coupled design principle of wireless network protocol and the scarcity of radio …

Jammer Localization in the Internet of Vehicles: Scenarios, Experiments, and Evaluation

A Hussain, N Abughanam, S Sciancalepore… - Proceedings of the 12th …, 2022 - dl.acm.org
The Internet of Vehicles (IoV) paradigm aims to improve road safety and provide a
comfortable driving experience for Internet-connected vehicles, by transmitting early warning …

Identification and localization of the jammer in wireless sensor networks

J Fan, T Liang, T Wang, J Liu - The Computer Journal, 2019 - academic.oup.com
Wireless sensor network can be easily attacked by jammers for its shared character and
open access to the wireless channel. Jamming attack could produce a significant threat to …

A novel location pinpointed anti-jammer with knowledged estimated localizer for secured data transmission in mobile wireless sensor network

S Muthu Mariappan, S Selvakumar - Wireless Personal Communications, 2021 - Springer
Nowadays mobile/cellular phones are considered as the most common and the key medium
for establishing communication amid the sensor nodes in Wireless Sensor Network (WSN) …

A novel prediction model for mobility tracing of users with hybrid metaheuristic concept

A Ajinu, CP Maheswaran - Wireless Networks, 2022 - Springer
In the modern world, it is necessary to monitor a user's mobility in everyday life to provide
advanced mobile services. Mostly, the location-based services (LBS) depend on both the …

AIGSA-based multi-jammer localization in wireless networks

X Wei, T Wang - Applied Soft Computing, 2021 - Elsevier
Jamming attacks, which exploit the shared and openness nature of the wireless mediums,
are one of the major threats to wireless networks since they may significantly degrade the …

[HTML][HTML] Jammer localization in multihop wireless networks based on gravitational search

T Wang, X Wei, J Fan, T Liang - Security and Communication …, 2018 - hindawi.com
Multihop Wireless Networks (MHWNs) can be easily attacked by the jammer for their shared
nature and open access to the wireless medium. The jamming attack may prevent the …