DATAMOVIL: a practical implementation of TRADAMO mobile data transmission protocol
Security audit for embedded avionics systems
Security for space power systems
Overview of SAFENET and Its Implications for Aerospace Applications
A study on improvement of obscure video images
Space Based Internet Protocol System for Launch Vehicle Tracking and Control
Information Security: Corps of Engineers Making Improvements, But Weaknesses Continue
Aerospace Communications Security Technologies Demonstrated
Commercial-Off-The-Shelf Vehicles for Towed Array Magnetometry
The Design of Car Networking Based on WiMax and Zigbee Technology
Application of Closed Circuit Television for Highway Telematics
Attack-Defense Tree Based Security Assessment
Introduction to Vehicular Networks Security
Security Assessment via Attack Tree Model
Modelling of Multiple Phased Attack on VANET Security
V2V and V2I Communications—From Vision to Reality
Public preference for data privacy – A pan-European study on metro/train surveillance
Performance Evaluation of Vehicular Ad Hoc Network Using SUMO and NS2
Gini Coefficient for Voltage Security Assessment of Multi-stage Transmission Expansion Planning
Study of Automatic Anomalous Behaviour Detection Techniques for Maritime Vessels
Dealing with Sybil Attack in VANET
Traffic Jam Minimization and Accident Avoidance System Using IoT
Adaptive Security for Automatic Protection of Data
Envisioning a New Command and Control (C2) Architecture for All-Domain Operations
Unmanned Aerial Vehicle (UAV) Communications Using Multiple Antennas
Intelligence After Next: Breaking Past AI's Confirmation Bias
TrafficNN: CNN-Based Road Traffic Conditions Classification
Importance of the reputation of data manager in the acceptance of connected vehicles
A Survey on Applications of Unmanned Aerial Vehicles (UAVs)
State of Art and Comprehensive Study on Smart Meter Networking
Design and Realization of a Fusion Application Based on Beidou and National Encryption Algorithm
Pioneering Data Quality and Security in Smart Grid
The Resilience of Unmanned Aerial Vehicles to Cyberattacks and Assessment of Potential Threats