To see the other types of publications on this topic, follow the link: Unauthorized interference.

Journal articles on the topic 'Unauthorized interference'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Unauthorized interference.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Streltsov, Lev. "Unauthorized Interference with Computers and Networks in Ukraine." Zeitschrift für die gesamte Strafrechtswissenschaft 130, no. 2 (2018): 605–41. http://dx.doi.org/10.1515/zstw-2018-0024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Serhiienko, S. P., V. G. Krizhanovski, D. V. Chernov, and L. V. Zahoruiko. "Effective modes of operation of radio-bombing devices for covert information gathering in the field of noise interference." Radiotekhnika, no. 205 (July 2, 2021): 169–74. http://dx.doi.org/10.30837/rt.2021.2.205.18.

Full text
Abstract:
The information security of modern society is in constant counteraction and constant improvement of technical means used for unauthorized information pickup, and technical means that prevent it. The paper analyzes examples of methods of applying noise interference to counteract the unauthorized pickup. The possibility of unauthorized pickup by passive radio devices using noise interferences is shown and analyzed using noise interferences, which are used to suppress the eavesdropping devices. The transfer of picked up information is possible both by radio wave and low-frequency channels using m
APA, Harvard, Vancouver, ISO, and other styles
3

Oleynikov, A. N., V. A. Pulavsky, and I. N. Chigirev. "Improving the efficiency of methods and means for suppressing unauthorized speech recording." Radiotekhnika, no. 209 (June 24, 2022): 156–61. http://dx.doi.org/10.30837/rt.2022.2.209.15.

Full text
Abstract:
The article analyzes the effectiveness of suppressing an unauthorized recording using acoustic, electromagnetic and ultrasonic countermeasures. It is shown that acoustic, electromagnetic and ultrasonic counteraction without a priori knowledge of the type of voice recorder does not provide guaranteed suppression of unauthorized speech recording. To increase the suppression efficiency, it is proposed to adapt the acoustic method, taking into account the characteristics of the propagation of acoustic vibrations in the air, the psychophysical perception of sounds by the human ear, and the use of a
APA, Harvard, Vancouver, ISO, and other styles
4

Hu, Yingdong, Shibing Zhang, Jue Wang, Ye Li, and Lili Guo. "Wireless Surveillance With Interference Exploitation in Unauthorized Underlaid D2D Networks." IEEE Access 8 (2020): 123151–64. http://dx.doi.org/10.1109/access.2020.3007448.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Prajapati, Mrs Kalpana V. "Thief Detection and Prevention: Home security using IoT (Internet of Things)." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 271–75. http://dx.doi.org/10.22214/ijraset.2021.38750.

Full text
Abstract:
Abstract: Nowadays the crime has raged to a new height and providing security frames is the most important part of life. When it comes to word security first thing that comes in the mind is house. Providing security to the house gets much easier with IOT sensors. This project’s aim is to provide security to house without any human interference. This system also focuses on not only detection of some unauthorized access, but also prevents the house from unauthorized access using sensors. In the past technology the system just used to detect the unauthorized access in the house or bank etc., but
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Peng, Shihao Yan, Helge Janicke, et al. "A Survey on Unauthorized UAV Threats to Smart Farming." Drones 9, no. 4 (2025): 251. https://doi.org/10.3390/drones9040251.

Full text
Abstract:
The integration of Internet of Things (IoT) and unmanned aerial vehicles (UAVs) in smart farming has revolutionized agricultural practices by enhancing monitoring, automation, and decision-making to improve agricultural productivity and sustainability. However, the widespread use of these technologies has also introduced new security challenges, particularly the risk of interference from unauthorized UAVs. This survey provides an analysis of the threats posed by unauthorized UAVs to smart farms, highlighting potential vulnerabilities such as data interception, communication jamming, and physic
APA, Harvard, Vancouver, ISO, and other styles
7

DŹWIAREK, Marek. "IT Protection of Safety-Related Machine Control Systems in Industry 4.0." Problems of Mechatronics Armament Aviation Safety Engineering 13, no. 4 (2022): 137–46. http://dx.doi.org/10.5604/01.3001.0016.1465.

Full text
Abstract:
The overall objective of the research was to develop the consideration of threats of unauthorized interference in information systems in the risk assessment process carried out by designers of machine control systems. For this purpose, an analysis of typical structures related to the security of control systems was carried out in terms of the possibility and consequences of the loss of security functions as a result of unwanted interference. Recommendations for proceeding "step by step" in the subsequent stages of the risk analysis were determined.
APA, Harvard, Vancouver, ISO, and other styles
8

Kuryltsiv, Roman, and Nadiia Kryshenyk. "Administration of the land cadastre system under conditions of martial law in Ukraine." Acta Scientiarum Polonorum Administratio Locorum 21, no. 4 (2022): 539–48. http://dx.doi.org/10.31648/aspal.8140.

Full text
Abstract:
Motives: Since the Russian invasion of Ukraine, the issue of land legal relations has become of particular concern. The urgent task is to introduce the mechanism protecting the information of the State Land Cadastre from unauthorized interference by third parties, to ensure the rights of the state, physical and legal entities to enter data about objects to the cadastral system and to use this information. Aim: The research aims to identify ways to improve the mechanism of legal regulation of the State Land Cadastre under martial law that will ensure the restructuration and functioning of the a
APA, Harvard, Vancouver, ISO, and other styles
9

Bakhtiiarov, Denys, Oleksandr Lavrynenko, Nataliia Lishchynovska, Ivan Basiuk, and Tetiana Prykhodko. "METHODS FOR ASSESSMENT AND FORECASTING OF ELECTROMAGNETIC RADIATION LEVELS IN URBAN ENVIRONMENTS." Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 11, no. 1 (2021): 24–27. http://dx.doi.org/10.35784/iapgos.2430.

Full text
Abstract:
Methods for synthesis a structural diagram of the processes for detecting and locating technical information leakage channels are analysed. Software for defining a controlled room zone was also presented. A proprietary approach to search the electromagnetic environment under radio interference has been developed to detect devices for unauthorized control of acoustic information using microphones and transmission of this information using a radio channel.
APA, Harvard, Vancouver, ISO, and other styles
10

Soni, Sujal, Mayank Paliwal, Rishabh Dangi, and Dharmendra Trivedi. "SIGNAL SEEKER: Safeguarding wireless communication with lora tech." International Journal of Technical Research & Science 9, Spl (2024): 27–35. http://dx.doi.org/10.30780/specialissue-iset-2024/045.

Full text
Abstract:
Wireless communication has become essential to daily living in the connected world of today. There is increasing worry about the unlawful use of radio signals and frequencies for activities like unauthorized broadcasting, and interference as a result of the proliferation of devices and networks. Here, the signal seeker, the heart of our project enters the picture to transform signal security. It uses LoRa (Long Range) technology to identify and block unauthorized communications. As a powerful tool for security application, it makes dependable communication over long distances possible, regardl
APA, Harvard, Vancouver, ISO, and other styles
11

Oleynikov, A. N., V. A. Pulavskyi, and O. H. Bilotserkivets. "Ways to improve the efficiency of methods and means of counteracting unauthorized speech recording and their comparative analysis." Radiotekhnika, no. 212 (March 28, 2023): 85–89. http://dx.doi.org/10.30837/rt.2023.1.212.07.

Full text
Abstract:
The features of using ultrasonic, electromagnetic and acoustic methods to counteract unauthorized recording of speech on sound recording devices are considered. The advantages and unused possibilities of the methods are noted. Ways to increase the effectiveness of the ultrasonic method of counteraction consist in using the two-frequency ultrasonic method, in positioning the device for emitting ultrasonic vibrations no more than two meters from the target, in using high-intensity ultrasonic vibrations, in using the ultrasonic method together with the acoustic method, and others. Ways to increas
APA, Harvard, Vancouver, ISO, and other styles
12

Gogulakrishnan Thiyagarajan. "Securing Credit Inquiries: The Role of Real-Time User Approval in Preventing SSN Identity Theft." Journal of Information Systems Engineering and Management 10, no. 35s (2025): 336–56. https://doi.org/10.52783/jisem.v10i35s.6011.

Full text
Abstract:
Unauthorized credit inquiries are also a central entry point for identity theft, with Social Security Numbers (SSNs) being widely utilized in fraudulent cases. Traditional credit inquiry systems do not usually possess strict user authentication, making them vulnerable to unauthorized access. This paper proposes a real-time user authorization system to enhance security by enforcing explicit user approval before processing any credit inquiry. The system employs real-time verification and approval techniques. This ensures that the authorized user only approves or rejects a credit check request. I
APA, Harvard, Vancouver, ISO, and other styles
13

Rakstiņš, Vitālijs, Karina Palkova, Lidija Juļa, and Nataliia Filipenko. "Improving cybersecurity measures in academic institutions to reduce the risk of foreign influence." SOCRATES. Rīgas Stradiņa universitātes Juridiskās fakultātes elektroniskais juridisko zinātnisko rakstu žurnāls / SOCRATES. Rīga Stradiņš University Faculty of Law Electronic Scientific Journal of Law 2, no. 29 (2024): 75–79. http://dx.doi.org/10.25143/socr.29.2024.2.75-79.

Full text
Abstract:
Academic as well as scientific institutions are essential for advancing knowledge and innovation, but they are increasingly susceptible to foreign interference, which can compromise research integrity, academic freedom and national security. Increased remote work and study, large data volumes and disruptive technologies like Artifitial intelligence I have created new avenues for cyber threats. This article aims to explore the cyber risks associated with foreign influence on academic institutions specifically and suggest effective mitigation strategies. Foreign interference can lead to unauthor
APA, Harvard, Vancouver, ISO, and other styles
14

Boyce, Geoffrey Alan, Samuel N. Chambers, and Sarah Launius. "Bodily Inertia and the Weaponization of the Sonoran Desert in US Boundary Enforcement: A GIS Modeling of Migration Routes through Arizona’s Altar Valley." Journal on Migration and Human Security 7, no. 1 (2019): 23–35. http://dx.doi.org/10.1177/2331502419825610.

Full text
Abstract:
Executive Summary This article conducts geographic information system (GIS) modeling of unauthorized migration routes in the Sonoran Desert in southern Arizona and finds an increase in the ruggedness of terrain crossed by pedestrian travelers throughout time. The modeling of ruggedness incorporates multiple variables that include slope, vegetation, “jaggedness,” and ground temperature, and provides an alternative to Euclidian distance as a way of measuring and conceptualizing borderlands space. The data that informs our analysis is derived from comprehensive activity logs maintained by the hum
APA, Harvard, Vancouver, ISO, and other styles
15

Xue, Libin, and Chunjie Cao. "Joint Channel and Power Assignment for Underwater Cognitive Acoustic Networks on Marine Mammal-Friendly." Applied Sciences 13, no. 23 (2023): 12950. http://dx.doi.org/10.3390/app132312950.

Full text
Abstract:
When marine animals and underwater acoustic sensor networks (UASNs) share spectrum resources, problems such as serious harm caused to marine animals by underwater acoustic systems and scarcity of underwater spectrum resources are encountered. To address these issues, a mammal-friendly underwater acoustic sensor network channel power allocation algorithm is proposed. Firstly, marine animals are treated as authorized users and sensor nodes as unauthorized users. Considering the interference level of sensor nodes on authorized users, this approach improves network service quality and achieves a m
APA, Harvard, Vancouver, ISO, and other styles
16

Aakanksha, Kashish Jain, Neha Giri, and Anamika Gupta. "Assessing Vulnerabilities in Voice Assistants: Comparative Analysis of Google Assistant, Siri, and Alexa." Advances in Knowledge-Based Systems, Data Science, and Cybersecurity 02, no. 01 (2025): 197–214. https://doi.org/10.54364/cybersecurityjournal.2025.1110.

Full text
Abstract:
Voice assistants (VAs), such as Google Assistant, SIRI, and Alexa, have changed the way people use technology by making information and services easily available. VAs provides assistance with web searches, smart home control, and scheduling tasks. VAs make daily tasks more convenient. Although there are many concerns regarding security, privacy, and general performance of the VAs as their use has increased over the period. The majority of research concentrates on their usability and functioning; little is known about their security vulnerabilities, which include threats to data privacy, backgr
APA, Harvard, Vancouver, ISO, and other styles
17

Svyd, I. V., M. G. Tkach, and I. I. Obod. "Comparative analysis of interference protection of "Friend-Foe" radar identification systems." Radiotekhnika, no. 211 (December 30, 2022): 101–13. http://dx.doi.org/10.30837/rt.2022.4.211.08.

Full text
Abstract:
The paper examines the existing systems of radar identification based on the "friend-foe" feature from the point of view of immunity evaluation. Currently, there are two systems of the radar identification based on the characteristic of "friend-foe", namely, the "Password" and MkXIIA. They are the radar identification systems based on the "home-foreign" feature. The former of the specified systems operates in a frequency range that differs from the frequency range of secondary radar systems, while the second one operates in the frequency range of secondary radar. These systems are ones of the
APA, Harvard, Vancouver, ISO, and other styles
18

Lukova-Chuiko, Nataliya, and Tеtyana Lapteva. "Improvement of the method of detection and location of illegal access points to the wireless network of information activity objects." Information systems and technologies security, no. 1 (6) (2023): 21–27. http://dx.doi.org/10.17721/ists.2023.1.21-27.

Full text
Abstract:
Extensive use of mobile devices has led to increased Internet connections and the deployment of new wireless LANs. According to the latest Cisco research, by 2023, 66% of the world's population will be Internet users worldwide. More than 28 billion devices will be connected to the global network. In the last two decades, we have witnessed the birth and development of a technology that has significantly changed our work and life - IEEE 802.11, also known as Wi-Fi. Wi-Fi is a favorite way to connect to the Internet because of its ease of use and flexibility. To connect to a wireless network, you
APA, Harvard, Vancouver, ISO, and other styles
19

Korchynskyi, Volodymyr, Valerii Hordiichuk, Vitalii Kildishev, Oleksandr Riabukha, Sergii Staikutsa, and Khaled Alfaiomi. "Method of information protection based on the integration of probabilistic encryption and noise immune coding." Radioelectronic and Computer Systems, no. 4 (December 6, 2023): 184–95. http://dx.doi.org/10.32620/reks.2023.4.13.

Full text
Abstract:
The subject matter of this article is the processes of increasing information security in communication systems to solve applied problems that are critical in the transmission of confidential data. The goal is to develop a multi-stage method for protecting information from unauthorized access, based on probabilistic encryption integration, error-correcting code, and error decorrelation. The tasks to be solved are as follows: to develop a probabilistic encryption algorithm that considers the entropy of the characters’ appearance in a message; to implement iterative coding with variable paramete
APA, Harvard, Vancouver, ISO, and other styles
20

Xiong, Ke, Yu Zhang, Dandan Li, Chih-Yung Chang, and Zhangdui Zhong. "Multiantenna Relay Beamforming Design for QoS Discrimination in Two-Way Relay Networks." Scientific World Journal 2013 (2013): 1–8. http://dx.doi.org/10.1155/2013/306423.

Full text
Abstract:
This paper investigates the relay beamforming design for quality of service (QoS) discrimination in two-way relay networks. The purpose is to keep legitimate two-way relay users exchange their information via a helping multiantenna relay with QoS guarantee while avoiding the exchanged information overhearing by unauthorized receiver. To this end, we propose a physical layer method, where the relay beamforming is jointly designed with artificial noise (AN) which is used to interfere in the unauthorized user’s reception. We formulate the joint beamforming and AN (BFA) design into an optimization
APA, Harvard, Vancouver, ISO, and other styles
21

Jumaa, Saja, Dr Qusay Abboodi Ali, and Dr Mshari A. Alshmmri. "Review : Methods of Cryptography." Al-Salam Journal for Engineering and Technology 1, no. 2 (2022): 30–34. http://dx.doi.org/10.55145/ajest.2022.01.02.006.

Full text
Abstract:
In order to safeguard the information and data that must be protected from any interference or incursion, security is one of the most significant and prominent concepts at the moment. There are several techniques to ensure security and the protection of our data, but cryptography is the most crucial. Because of the importance of the documents and information that institutions must deal with or transport over the Internet, where unauthorized users or hackers can read and manipulate them, these documents must be encrypted using cipher methods and techniques.
APA, Harvard, Vancouver, ISO, and other styles
22

Shvetsov, A. V. "ANTI-RAM PROTECTION OF METRO TERRITORY." World of Transport and Transportation 14, no. 2 (2016): 162–66. http://dx.doi.org/10.30932/1992-3252-2016-14-2-17.

Full text
Abstract:
[For the English abstract and full text of the article please see the attached PDF-File (English version follows Russian version)].ABSTRACT The analysis has shown that present technical means of external protection of metro stations against acts of unlawful interference with the use of vehicles do not respond fully to existing threats. A device for blocking unauthorized access to the territory adjacent to the station is offered. Anti-ram defensive pillar of original design can withstand a blow in case of attempt of a breach of a car with cargo of 20 tons at a speed of 40 km / h. It is an addit
APA, Harvard, Vancouver, ISO, and other styles
23

Svyd, I. V., I. I. Obod, O. S. Maltsev, et al. "Method for increasing noise immunity of radar "friend or foe" identification systems under the action of intentional correlated interference." Radiotekhnika, no. 205 (July 2, 2021): 154–60. http://dx.doi.org/10.30837/rt.2021.2.205.16.

Full text
Abstract:
The paper analyzes the principles of construction and structure of "friend or foe" identification systems. It is revealed, that the party, interested in the existing system, has the ability of unauthorized use of this information resource for long-range determination of air objects coordinates, on the one hand, and distortion of information of this information resource, on the other hand, which leads to unpredictable consequences. It is shown, that the most vulnerable place in the "friend or foe" identification systems is the aircraft transponder, which significantly affects noise stability an
APA, Harvard, Vancouver, ISO, and other styles
24

Koispaeva, Oxana Garifullaevna, Sergey Vladimirovich Golovko, and Maksim Almansurovich Nadeev. "Technological video survaillance as protective tool of smart electricity meters from unauthorized access." Vestnik of Astrakhan State Technical University 2020, no. 2 (2020): 7–13. http://dx.doi.org/10.24143/1812-9498-2020-2-7-13.

Full text
Abstract:
The article touches upon the problems of interference in the electricity metering system and different types of electricity loss underestimation. It has been stated that in modern conditions the only effective way to identify and prevent violations is to install a remote electricity meter at the borderline of balance and operational responsibilities. РиМ 384.02 smart electricity meter is considered as an example. A picture of the device is presented and its main positive characteristics are listed. It has been proposed to introduce the twenty-four-hour video surveillance and video recording sy
APA, Harvard, Vancouver, ISO, and other styles
25

He, Shoushuai, Lei Zhu, Changhua Yao, Weijun Zeng, and Zhen Qin. "A Novel Approach Based on Generative Adversarial Network for Interference Detection in Wireless Communications." Wireless Communications and Mobile Computing 2022 (September 21, 2022): 1–9. http://dx.doi.org/10.1155/2022/7050573.

Full text
Abstract:
With the rapid growth of wireless devices, the communication environment gets complex. The detection of interference or unauthorized signals can improve spectrum efficiency, which is a key technology for limited spectrum resources. Traditional detection methods analyze the parameter characteristics of the received signal. But it is difficult to detect interference with the same time and frequency as the original signal by those feature engineering. As a classical problem in deep learning, anomaly detection is usually solved by supervised learning. But a more challenging situation is to detect
APA, Harvard, Vancouver, ISO, and other styles
26

Lemieszewski, Łukasz, Dina Hannebauer, and Grzegorz Remiszewski. "Vulnerability of Wi-Fi wireless network to signal interference." Journal of Engineering 360 1, no. 1/24 (2024): 58–65. https://doi.org/10.5604/01.3001.0054.8861.

Full text
Abstract:
Wi-Fi networks are often susceptible to signal interference that can disrupt services, intercept sensitive data, and allow unauthorized access. Exploiting this vulnerability, attackers can launch Intentional Electromagnetic Interference (IEMI) attacks or protocol-based attacks. IEMI attacks include, but are not limited to, jamming, which involves the introduction of interference signals in the frequency band used by a given Wi-Fi network, thus disrupting its proper operation. The article presents research on different types of IEMI attacks, aimed at illustrating this type of threat to video tr
APA, Harvard, Vancouver, ISO, and other styles
27

Tkach, M. G. "Estimation of the relative throughput of aircraft transponders of secondary airspace surveillance radar systems." Radiotekhnika, no. 207 (December 24, 2021): 123–31. http://dx.doi.org/10.30837/rt.2021.4.207.13.

Full text
Abstract:
Secondary radar systems for monitoring airspace play a significant role in the information support of airspace control systems and air traffic control. These systems provide radar surveillance of airborne objects equipped with aircraft transponders and provide two-way communication via data request and response channels between ground radar stations and airborne objects.
 The paper assesses the relative throughput of aircraft transponders of secondary radar systems for monitoring airspace under the influence of correlated and uncorrelated interference in the request channel. The assessmen
APA, Harvard, Vancouver, ISO, and other styles
28

Kholopova, E. N. "Comprehensive characterization of biological terrorism." Legal Science in China and Russia, no. 4 (September 16, 2021): 180–84. http://dx.doi.org/10.17803/2587-9723.2021.4.180-184.

Full text
Abstract:
. The article considers the complex characterization of biological terrorism as a special dangerous phenomenon, a threat to the national security of states, a crime of an international nature, a destructive mechanism that affects the change and reformatting of public relations. The complex characteristic integrates knowledge from many branches of science, includes the following elements: criminal law, criminology, criminology, and others, which are interrelated and determine measures to ensure the national security of states in the event of possible unauthorized use of biological agents. The s
APA, Harvard, Vancouver, ISO, and other styles
29

Sukharev, A. D., and D. B. Piskunov. "Study of radio channel stealth in networks with MU-MIMO technology." Issues of radio electronics 49, no. 5 (2020): 58–63. http://dx.doi.org/10.21778/2218-5453-2020-5-58-63.

Full text
Abstract:
In the course of research activities in the field of new technologies of information interaction of on-board equipment of objects of rocket-space and aviation equipment, as well as study of protection of information against leakage through technical channels, there was a hypothesis, about stealth of radio channel formed by means of new and promising developing technologies. The article discusses the use of radio wave interference control technologies (on adaptive formation of the sum of the signal phases) for beam formation. The features of the MU-MIMO and OFDMA technologies, which allows seve
APA, Harvard, Vancouver, ISO, and other styles
30

Milczarek, Ewa. "CONCEPTUALIZATION OF ATTENTIONAL PRIVACY." Studia Iuridica 101 (2023): 228–36. http://dx.doi.org/10.31338/2544-3135.si.2024-101.16.

Full text
Abstract:
In the twenty-first century, human attention has become the object of interest of entrepreneurs, making it an object of supply. The development of technology related to attracting the attention of recipients is becoming more and more aggravating and increasingly important in the implementation of decision-making processes. Attention, which has so far been of interest to the economy of attention, becomes the subject of a legal analysis of the protection of an individual against unauthorized interference. The subject of the article is to define what the privacy of attention is and why its concep
APA, Harvard, Vancouver, ISO, and other styles
31

Oleh, Velychko, Gaman Valentyn, Gordiyenko Tetyana, and Hrabovskyi Oleh. "TESTING OF MEASUREMENT INSTRUMENT SOFTWARE WITH THE PURPOSE OF CONFORMITY ASSESSMENT." Eastern-European Journal of Enterprise Technologies 1, no. 9 (97) (2019): 16–26. https://doi.org/10.15587/1729-4061.2019.154352.

Full text
Abstract:
The analysis of the regulatory framework for testing measuring instruments (MI) software at the national level to determine its suitability for carrying out conformity assessment was conducted. Comparison of the general requirements of national normative documents and documents of international and regional organizations of legal metrology OIML and WELMEC was conducted. In particular, regarding the suitability of software for application and protection against unauthorized interference. It is found that the current national standard contains only general requirements for software protection an
APA, Harvard, Vancouver, ISO, and other styles
32

Yang, Shengying, Huibin Qin, Xiaolin Liang, and Thomas Gulliver. "An Improved Unauthorized Unmanned Aerial Vehicle Detection Algorithm Using Radiofrequency-Based Statistical Fingerprint Analysis." Sensors 19, no. 2 (2019): 274. http://dx.doi.org/10.3390/s19020274.

Full text
Abstract:
Unmanned aerial vehicles (UAVs) are now readily available worldwide and users can easily fly them remotely using smart controllers. This has created the problem of keeping unauthorized UAVs away from private or sensitive areas where they can be a personal or public threat. This paper proposes an improved radio frequency (RF)-based method to detect UAVs. The clutter (interference) is eliminated using a background filtering method. Then singular value decomposition (SVD) and average filtering are used to reduce the noise and improve the signal to noise ratio (SNR). Spectrum accumulation (SA) and
APA, Harvard, Vancouver, ISO, and other styles
33

Velychko, О. M., V. V. Gaman, O. V. HrabovskiiHrabovskii, and T. B. Gordiyenko. "FEATURES OF TESTING OF THE BUILT-IN SOFTWARE OF MEASURING INSTRUMENTS." Key title: Zbìrnik naukovih pracʹ Odesʹkoï deržavnoï akademìï tehnìčnogo regulûvannâ ta âkostì -, no. 1(16) (2020): 36–41. http://dx.doi.org/10.32684/2412-5288-2020-1-16-36-41.

Full text
Abstract:
Protection against unauthorized modification or its components, measurement data and protection against external unintentional and accidental interference are particularly important for measuring instruments (MIs) software. The possibilities of ensuring the security of built-in MI software, as well as MI as a whole, are considered. The analysis of the main features of built-in MI software on the basis of documents, guidelines and recommendations of international and regional organizations in the field of legal metrology are shown. The characteristics of MI software in accordance with internati
APA, Harvard, Vancouver, ISO, and other styles
34

Kurniasyah, Ikmal, and Lusia Rakhmawati. "Smart Door Lock Innovation Using Integration of Bluetooth Low Energy and MQTT IoT Protocol." INAJEEE Indonesian Journal of Electrical and Eletronics Engineering 8, no. 1 (2024): 41–46. https://doi.org/10.26740/inajeee.v8n1.p41-46.

Full text
Abstract:
This research develops a smart door lock system using ESP32 with Bluetooth Low Energy (BLE) and MQTT IoT protocol integration to ensure secure and efficient access control. The system supports RFID, fingerprint, and keypad authentication, with BLE utilized for device detection and proximity validation. Testing results show optimal performance, with MQTT QoS 0 achieving the highest throughput (5,052 kbps) and lowest delay (175 ms), while QoS 2 offers superior stability and minimal jitter (19 ms). RSSI analysis confirms the impact of distance and interference on BLE signal quality. The system re
APA, Harvard, Vancouver, ISO, and other styles
35

Opirskyy, Ivan, and Petro Petriv. "EFFECTIVENESS OF BLOCKCHAIN LOGGING AND SSO IN CYBER SECURITY MECHANISMS." Cybersecurity: Education, Science, Technique 4, no. 24 (2024): 50–68. http://dx.doi.org/10.28925/2663-4023.2024.24.5068.

Full text
Abstract:
With the rise of cyber threats in the era of digital transformation, protecting information systems becomes crucial for ensuring data reliability and security. This is especially true for authentication and logging systems, which are key elements in identifying and countering unauthorized access. The use of identical credentials and traditional authentication methods opens up wide opportunities for cybercriminals. This article explores the use of blockchain technology as a means to combat cyber threats through the implementation of immutable, decentralized logging and authentication systems. B
APA, Harvard, Vancouver, ISO, and other styles
36

Balatska, V. S., V. O. Poberezhnyk, A. V. Stefankiv, and Yu A. Shevchuk. "DEVELOPMENT OF A METHOD FOR ENSURING THE RELIABILITY AND SECURITY OF PERSONAL DATA IN BLOCKCHAIN SYSTEMS OF STATE REGISTERS." Computer systems and network 7, no. 1 (2025): 1–14. https://doi.org/10.23939/csn2025.01.001.

Full text
Abstract:
The article considers the problem of ensuring the reliability and security of personal data processed in state registers by using blockchain technologies. The growing requirements for transparency and stability of state data management systems pose new challenges to protecting information from unauthorized changes, interference, and forgery. A method based on implementing a decentralized blockchain architecture is proposed to ensure data integrity, traceability, and transparency during processing and storage. The basis of the developed method is the use of a distributed registry, which ensures
APA, Harvard, Vancouver, ISO, and other styles
37

Xu, Ming, Hongping Li, Haihua Chen, and Xiaobin Yin. "Quantitative Measurement of Radio Frequency Interference for SMOS Mission." Remote Sensing 14, no. 7 (2022): 1669. http://dx.doi.org/10.3390/rs14071669.

Full text
Abstract:
The Earth Exploration Satellite Service (EESS) for passive sensing has a primary frequency allocation in the 1400–1427 MHz band. All emissions unauthorized in this band are called RFI (Radio Frequency Interference). The SMOS (Soil Moisture and Ocean Salinity) mission is greatly perturbed by RFI impeding ocean salinity retrieval, especially in coastal areas such as the SCS (South China Sea), where the observed data has been discarded massively. At present, there is no way to eliminate the RFI impact on the retrieved salinity, other than by detecting and shutting down the emissions from the sour
APA, Harvard, Vancouver, ISO, and other styles
38

Yang, Zhen, Titi Liu, and Guobin Chen. "Power Control for Full-Duplex Device-to-Device Underlaid Cellular Networks: A Stackelberg Game Approach." Complexity 2020 (November 10, 2020): 1–12. http://dx.doi.org/10.1155/2020/1786349.

Full text
Abstract:
In spectrum sharing cognitive radio networks, unauthorized users (secondary users) are allowed to use the spectrum of authorized users (primary users) to improve spectrum utilization. Due to limited spectrum resources, how to formulate a reasonable spectrum allocation scheme is very important. As a mathematical analysis tool, game theory can solve the problem of resource allocation well. In recent years, it has been applied to the research of resource allocation in spectrum sharing networks by some literatures. In a cellular network consisting of multiple cellular users and full-duplex end-to-
APA, Harvard, Vancouver, ISO, and other styles
39

Kohut, Yurii. "Measures for protection of the information systems of Ukraine’s critical infrastructures against cyberattacks." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 38, no. 38 (2020): 57–65. http://dx.doi.org/10.5604/01.3001.0014.5939.

Full text
Abstract:
The article deals with protective measures against cyberattacks of information systems of the critical infrastructures and highlights some features of the cyberattacks against the information resources of national authorities. The main objective of the article is to define the characteristics of cyberattacks and the elements of a plan to counter cyberattacks of the critical information facilities. It has been found that a professionally organized cyberattack consists of several phases related to targeting, intelligence, access to the system, direct execution of the attack, and destruction of e
APA, Harvard, Vancouver, ISO, and other styles
40

Milind Yadav, Mr Aditya, Mr Aditya Prakash Shelke, and Ms Priyadarshini Badjujar. "Fake Product Detection Using Block-Chain." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44006.

Full text
Abstract:
The counterfeiting of products is a growing issue in the retail industry, leading to financial losses and consumer trust concerns. Various authentication methods, such as RFID and AI-based solutions, have been explored but have limitations, including high computational requirements and vulnerability to duplication. To address this, blockchain technology is introduced for secure product verification. Our system stores supply chain data at each stage using QR codes, ensuring authenticity. Blockchain’s decentralized nature guarantees data security, preventing tampering or third-party interference
APA, Harvard, Vancouver, ISO, and other styles
41

Vodopianov, Serhii, Oksana Martynova, and Arkadii Krainosvit. "Development of a method of analysis of energy and information characteristics of wireless networks of critical application under conditions of limitations on the signal/(interference plus noise) ratio." Technology audit and production reserves 2, no. 1(70) (2023): 30–34. http://dx.doi.org/10.15587/2706-5448.2023.278280.

Full text
Abstract:
The object of the research, the results of which are presented in the article, is the process of analyzing the energy and information characteristics of wireless networks of critical application. The presented article examines the problems of information and telecommunication systems of air transport as hard real-time systems. Thanks to the development of methods for analyzing the bandwidth of heterogeneous networks that function under the conditions of external interference, caused, among other things, by the random nature of multiple access, the asymptotic characteristics of networks and the
APA, Harvard, Vancouver, ISO, and other styles
42

Elizabeth Atieno Otieno. "Security, privacy and performance concerns in ultra dense networks." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 1796–837. http://dx.doi.org/10.30574/wjarr.2024.23.2.2517.

Full text
Abstract:
Ultra Dense Networks (UDNs) have emerged as a pivotal technology in meeting the exponential growth in data demand and providing seamless connectivity in 5G and beyond networks. However, the high density of small cells in UDNs introduces significant challenges related to security, privacy, and performance. This survey paper presents a comprehensive review of the current state-of-the-art in addressing these concerns. It begins by exploring the unique security vulnerabilities inherent to UDNs, including the increased risk of eavesdropping, denial of service attacks, and unauthorized access due to
APA, Harvard, Vancouver, ISO, and other styles
43

Elizabeth, Atieno Otieno. "Security, privacy and performance concerns in ultra dense networks." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 1796–837. https://doi.org/10.5281/zenodo.14865387.

Full text
Abstract:
Ultra Dense Networks (UDNs) have emerged as a pivotal technology in meeting the exponential growth in data demand and providing seamless connectivity in 5G and beyond networks. However, the high density of small cells in UDNs introduces significant challenges related to security, privacy, and performance. This survey paper presents a comprehensive review of the current state-of-the-art in addressing these concerns. It begins by exploring the unique security vulnerabilities inherent to UDNs, including the increased risk of eavesdropping, denial of service attacks, and unauthorized access due to
APA, Harvard, Vancouver, ISO, and other styles
44

Matsola, A., and І. Chernychenko. "Features of search tactics during the investigation of obstruction of the legitimate professional activities of journalists." Analytical and Comparative Jurisprudence, no. 1 (May 29, 2023): 530–34. http://dx.doi.org/10.24144/2788-6018.2023.01.92.

Full text
Abstract:
The scientific article, based on the analysis of the opinions of forensic scientists, the provisions of the current criminal procedural legislation and the practice of its application. It substantiates the practical significance of highlighting the peculiarities of the search tactics during the investigation of interference the legitimate professional activity of journalists. The main task of the search is the extraction of individual traces and other objects that have significance in criminal proceedings. Depending on the object of the search, the following variants are distinguished:house se
APA, Harvard, Vancouver, ISO, and other styles
45

Park, Tae-Jin, Ki-il Kim, and Sangook Moon. "Securing Infrared Communication in Nuclear Power Plants: Advanced Encryption for Infrared Sensor Networks." Sensors 24, no. 7 (2024): 2054. http://dx.doi.org/10.3390/s24072054.

Full text
Abstract:
This study enhances infrared communication security in nuclear power plants’ secondary systems, addressing the risk of mechanical and cyber failures. A novel random address generator, employing an innovative S-box, was developed to secure IoT sensor data transmissions to gateway nodes, mitigating eavesdropping, interference, and replay attacks. We introduced a structured IR communication protocol, generating unique, encrypted addresses to prevent unauthorized access. Key-dependent S-boxes, based on a compound chaotic map system, significantly improved encryption, increasing data transmission r
APA, Harvard, Vancouver, ISO, and other styles
46

TajDini, Mahyar, and Volodymyr Sokolov. "Internet of Things Security Problems." Modern Information Protection, no. 1 (March 10, 2017): 120–27. https://doi.org/10.5281/zenodo.2528814.

Full text
Abstract:
The rapid development of “smart” devices leads to explosive growth of unprotected or partially protected home networks. These networks are easy prey for unauthorized access, the collection of personal information (including from surveillance cameras), interference in the operation of individual devices and the entire system as a whole. In addition, existing solutions for managing a smart house offer work in the cloud, which in turn reduces the availability of the system and simultaneously increases the risk of the unscrupulous use of personal information by the
APA, Harvard, Vancouver, ISO, and other styles
47

Basarab, O. T., and O. K. Basarab. "CRIMINAL AND LEGAL ANALYSIS OF UNAUTHORIZED INTERFERENCE IN INFORMATION (AUTOMATED), ELECTRONIC COMMUNICATION, INFORMATION AND COMMUNICATION SYSTEMS AND ELECTRONIC COMMUNICATION NETWORKS." Juridical scientific and electronic journal, no. 2 (2024): 319–22. http://dx.doi.org/10.32782/2524-0374/2024-2/77.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Zolotorevich, L. A., and V. A. Ilyinkov. "Monitoring the reliability of integrated circuits protection against Trojans: encoding and decoding of combinational structures." Informatics 18, no. 3 (2021): 7–17. http://dx.doi.org/10.37661/1816-0301-2021-18-3-7-17.

Full text
Abstract:
Integrated circuits, systems on a chip are the key links in various industrial systems and state defense systems. The emergence of counterfeit integrated circuits, problems of piracy, overproduction, unauthorized interference in the design of microcircuit, hardware Trojans require the development of methods and means of their timely detection. Trojans can be introduced into the integrated circuits structure both on the development stage and during the production process, including the stages of specification, design, verification and manufacturing. The inclusion of additional elements in the i
APA, Harvard, Vancouver, ISO, and other styles
49

Chandrakala, Dr N. "A SELF-RELIANT APPROACH TO SECURE DATA DELECTION IN CLOUD COMPUTING." International Scientific Journal of Engineering and Management 04, no. 05 (2025): 1–9. https://doi.org/10.55041/isjem03718.

Full text
Abstract:
Abstract - With the rapid growth of cloud computing, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques provide data confidentiality but fail to guarantee complete data removal when necessary. A secure data self-destructing scheme in cloud computing addresses this limitation by enabling the automatic and irreversible destruction of sensitive data after a predefined condition is met. This scheme ensures that both the encrypted data and the decryption keys become permanently inaccessible, preventing unauthorized access even if the cloud infrastruct
APA, Harvard, Vancouver, ISO, and other styles
50

Charly, Putri, Kadek Erik Diatmika, I. Made Panji Prayoga, and I. Made Edy Listartha. "Pendeteksian Keamanan Website SMA Greenschool Menggunakan Metode Owasp dengan Pengujian XSS." Format : Jurnal Ilmiah Teknik Informatika 11, no. 1 (2022): 77. http://dx.doi.org/10.22441/10.22441/format.2022.v11.i1.008.

Full text
Abstract:
Information security is an important thing that must be considered for every individual and agency, because if information can accessed by unauthorized people then accuracy of the information can be doubted, becoming misleading information and even various problems will be found. Such problems can be malware attacks, exploits, or database injections. In this study, the mechanism of risk assessment methods was carried out on the website information system of greenschool high school. As the name implies XSS or stands for Cross Site Scripting is one form of interference in the form of Code Inject
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!