Search

Your search keyword '"Elena Basan"' showing total 40 results

Search Constraints

Start Over You searched for: Author "Elena Basan" Remove constraint Author: "Elena Basan" Database OpenAIRE Remove constraint Database: OpenAIRE
40 results on '"Elena Basan"'

Search Results

1. Data Generation for Modeling Attacks on UAVs for the Purpose of Testing Intrusion Detection Systems

2. Trusted Operation of Cyber-Physical Processes Based on Assessment of the System’s State and Operating Mode

3. Spoofing Attack Detection Method for UAV Navigation System

6. A Data Normalization Technique for Detecting Cyber Attacks on UAVs

9. Automation of the Process of Analysis of Security Threats in Cyber-Physical Systems

10. GPS-Spoofing Attack Detection Technology for UAVs Based on Kullback–Leibler Divergence

11. Unmanned Aerial Vehicle Attack Knowledge Base

12. An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes

13. Radio Frequency Method for Emulating Multiple UAVs

14. Security architecture for UAV

16. Analysis of Security Problems in Groups of Intelligent Sensors

17. Intelligent Intrusion Detection System for a Group of UAVs

18. Behavior-Based Assessment of Trust in a Cyber-Physical System

19. Protection System for a Group of Robots Based on the Detection of Anomalous Behavior

21. Detection of Anomalies in the Robotic System Based on the Calculation of Kullback-Leibler Divergence

22. Analysis of the initial security of the robotics system

23. Analysis of the Security Problems of Robotic Systems

24. Method for Detecting Abnormal Activity in a Group of Mobile Robots

25. Method of Detecting and Blocking an Attacker in a Group of Mobile Robots

26. Analysis Of Methods And Systems For Detecting And Countering Uavs

27. A Self-Diagnosis Method for Detecting UAV Cyber Attacks Based on Analysis of Parameter Changes

28. Analysis of the Impact of Denial of Service Attacks on the Group of Robots

29. Evaluating and Detecting Internal Attacks in a Mobile Robotic Network

30. Development of the Methodology for Testing the Security of Group Management System for Mobile Robots

31. Development of a Protection System for a Group of Mobile Robots, Taking into Account the Requirements of Foreign and Russian Legislation

32. Development of the Anomaly Detection Method for a Group of Mobile Robots

33. Analysis of ways to secure group control for autonomous mobile robots

34. A Trust Evaluation Method for Active Attack Counteraction in Wireless Sensor Networks

35. Methodology of Countering Attacks for Wireless Sensor Networks Based on Trust

36. Development of the Hierarchal Trust management System for Mobile Cluster-based Wireless Sensor Network

37. Trust management system for mobile cluster-based wireless sensor network

38. An Energy-Efficient System of Counteraction Against Attacks in the Mobile Wireless Sensor Networks

39. Development of a secure cluster-based wireless sensor network model

Catalog

Books, media, physical & digital resources