Jan. 2, 2023, 2:10 a.m. | Keshav Kaushik, Rahul Negi, Prabhav Dev

cs.CR updates on arXiv.org arxiv.org

Some prominent instances have been centered on electronic warfare. For
example, the American military has made significant investments in automation
through UAV programs, only for competitors like the Iranians to create
strategies to interfere with these systems. Iran managed to capture a
top-secret U.S. surveil-lance drone by fooling it into descending in the
incorrect place by jamming its control signals and providing it with bogus GPS
data. In this paper, the authors have focused on the electronic warfare
approach for …

american automation capture drone electronic warfare iran jammer managed military secret software systems warfare wi-fi

QA Customer Response Engineer

@ ORBCOMM | Sterling, VA Office, Sterling, VA, US

Enterprise Security Architect

@ Booz Allen Hamilton | USA, TX, San Antonio (3133 General Hudnell Dr) Client Site

DoD SkillBridge - Systems Security Engineer (Active Duty Military Only)

@ Sierra Nevada Corporation | Dayton, OH - OH OD1

Senior Development Security Analyst (REMOTE)

@ Oracle | United States

Software Engineer - Network Security

@ Cloudflare, Inc. | Remote

Software Engineer, Cryptography Services

@ Robinhood | Toronto, ON