Search

Your search keyword '"spoofing"' showing total 976 results

Search Constraints

Start Over You searched for: Descriptor "spoofing" Remove constraint Descriptor: "spoofing"
976 results on '"spoofing"'

Search Results

51. S-TrackS: A Secure Snapshot-Based Solution for Positioning and Timing †.

52. Antiference: New Concept for Evolutive Mitigation of RFI to GNSS †.

53. Jammertest 2022: Jamming and Spoofing Lessons Learned †.

54. Performance Characterization of Hexagon|NovAtel's Robust Dual-Antenna Receiver (RoDAR) during the Norwegian Jamming Trial 2022 †.

55. Interference Detection, Localization, and Mitigation Capabilities of Controlled Reception Pattern Antenna for Aviation †.

56. The Vulnerability of Inland Waterway AIS to GNSS Radio Frequency Interference †.

57. Robustness Levels of Critical Infrastructures Against Global Navigation Satellite System Signal Disturbances †.

58. CYBERSECURITY: BOTNET THREAT DETECTION ACROSS THE SEVEN-LAYER ISO-OSI MODEL USING MACHINE LEARNING TECHNIQUES.

59. Blockchain-Based E-Voting System with Face Recognition.

60. Advanced Smartphone-Based Identification of Transport Modes: Resilience under GNSS-Based Attacks

61. Information literacy of a university teacher as an important condition for an anti-plagiarism test

62. Spoofing’s Selection and Compensation in the Global Navigation Satellite System Consumer Navigation Equipment with Multi-Channel Antenna System

63. Detection and mitigation of GNSS interference for robust navigation and timing

64. CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment.

65. 一种基于功率可行域的卫星导航欺骗干扰 评估方法.

66. The Reality of Internet Infrastructure and Services Defacement: A Second Look at Characterizing Web-Based Vulnerabilities.

67. Radiofrequency Interference Strategies Targeting Marine Navigation Systems: Political Motives and Consequences.

68. PPP/PPP-RTK Message Authentication.

69. Advanced Smartphone-Based Identification of Transport Modes: Resilience under GNSS-Based Attacks.

70. YoloMask: An Enhanced YOLO Model for Detection of Face Mask Wearing Normality, Irregularity and Spoofing

71. SQL Injection Attacks, Detection Techniques on Web Application Databases

72. A Novel Study and Analysis on Global Navigation Satellite System Threats and Attacks

73. Deep Learning Detection of GPS Spoofing

74. Learning Incorrect Verdict Patterns of the Established Face Recognizing CNN Models Using Meta-Learning Supervisor ANN

75. Software Defined Radio-Based GPS Spoofing Attack Model on Road Navigation System

76. An optimal design of GNSS interference localisation wireless security network based on time-difference of arrivals for the Arlanda international airport

77. Analysis of the Security Challenges Facing the DS-Lite IPv6 Transition Technology.

78. GNSS 中基于调零天线的欺骗干扰抑制方法.

79. Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias.

80. Secure device control scheme with blockchain in a smart home.

81. 功率监测与 SQM 融合的 GNSS 欺骗干扰检测.

82. GNSS多波束抗干扰接收机的反欺骗性能分析.

83. Fingerprint liveness detection through fusion of pores perspiration and texture features

84. Voucher-Based Addressing & Sessions: A Simple, Flexible, Privacy-Preserving Recipe for Mitigating IPv6 Neighbor Discovery Redirection Attacks

85. Intelligent UAV Spoofing Detection Method

86. O SPOOFING NO MERCADO DE CAPITAIS BRASILEIRO: UMA PERSPECTIVA DE DIREITO E ECONOMIA

87. Preparations for Galileo PRS in Poland.

88. Optimal Configuration for Monitoring Stations in a Wireless Localisation Network Based on Received Signal Strength Differences.

89. Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework for Civilian Urban Air Mobility.

90. Enforcing a Source-end Cooperative Multilevel Defense Mechanism to Counter Flooding Attack.

91. Unravelling the JPMorgan spoofing case using particle physics visualization methods.

92. First results from three years of GNSS interference monitoring from low Earth orbit.

93. GNSS Positioning Security: Automatic Anomaly Detection on Reference Stations

95. Research on Civil GNSS Signal Authentication Service Design

96. Benchmarking of Fully Connected and Convolutional Neural Networks on Face Recognition: Case of Makeup and Occlusions

97. Benchmarking Accuracy and Precision of the Convolutional Neural Networks for Face Recognition on Makeup and Occluded Images

98. Challenges in Face Recognition Using Machine Learning Algorithms: Case of Makeup and Occlusions

99. THE PRACTICAL CYBERATTACK ON THE DATA TRANSMISSION CHANNEL OF THE DIGITAL SUBSTATION

100. Global positioning system spoofing detection based on Support Vector Machines

Catalog

Books, media, physical & digital resources