Search

Your search keyword '"spoofing"' showing total 976 results

Search Constraints

Start Over You searched for: Descriptor "spoofing" Remove constraint Descriptor: "spoofing"
976 results on '"spoofing"'

Search Results

151. Spoofing Attacks on FMCW Radars with Low-Cost Backscatter Tags.

152. Securing the Automatic Identification System (AIS): Using public key cryptography to prevent spoofing whilst retaining backwards compatibility.

153. Intelligent audio analysis techniques for identification of music in smart devices.

154. Deteksi Spoofing Wajah Menggunakan Faster R-CNN dengan Arsitektur Resnet50 pada Video

155. Jamming and Spoofing Protection for ADS-B Mode S Receiver Through Array Signal Processing

156. Software-Defined Networking—Imposed Security Measures Over Vulnerable Threats and Attacks

157. Cyclostationarity Analysis of GPS Signals for Spoofing Detection

158. A Robust and Real-Time Face Anti-spoofing Method Based on Texture Feature Analysis

159. Light CNN Architecture Enhancement for Different Types Spoofing Attack Detection

160. Spoofing: Law, materiality and boundary work in futures trading.

161. Global positioning system spoofing detection based on Support Vector Machines.

162. Venti di guerra nello Spazio.

163. Challenges and opportunities in biometric security: A survey.

164. First results from three years of GNSS interference monitoring from low Earth orbit.

165. Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework for Civilian Urban Air Mobility

166. A Frequency-Domain Spoofing Attack on FMCW Radars and Its Mitigation Technique Based on a Hybrid-Chirp Waveform.

167. An easy-to-use tool to inject DoS and spoofing networking attacks.

169. Statistical test for GNSS spoofing attack detection by using multiple receivers on a rigid body

170. Spoofing and Anti-Spoofing Technologies of Global Navigation Satellite System: A Survey

171. Dynamic Fingerprint Statistics: Application in Presentation Attack Detection

172. Let Us Prepare the Officer of the Watch on Jamming and Spoofing

173. GNSS Navigation Threats Management on-Board of Aircraft

174. An Inherent Limitative Parameter in Spoofing GNSS-Based Navigation Clients

175. A Data Normalization Technique for Detecting Cyber Attacks on UAVs

177. A Novel GPS Spoofing Algorithm Based on Modifying Navigation Message

181. Interactive Photo Liveness for Presentation Attacks Detection

182. A Modified Imperialist Competitive Algorithm for Spoofing Attack Detection in Single-Frequency GPS Receivers.

183. Fingerprint Recognition With Embedded Presentation Attacks Detection: Are We Ready?

184. AIS Data Vulnerability Indicated by a Spoofing Case-Study.

185. A novel optimized Bat Extreme Learning intrusion detection system for smart Internet of Things networks.

186. Enhancing the Robustness and Security Against Various Attacks in a Scale: Free Network.

187. SPOOFING IN AVIATION: SECURITY THREATS ON GPS AND ADS-B SYSTEMS.

188. ANALYSIS OF ATTACKS IN IEEE 802.11 NETWORKS AT DIFFERENT LEVELS OF OSI MODEL.

189. Unmanned Aerial Vehicle's Vulnerability to GPS Spoofing a Review.

190. Foundations of GNSS Spoofing Detection and Mitigation with Distributed GNSS SDR Receiver

191. Delay Spoofing Reduction in GPS Navigation System based on Time and Transform Domain Adaptive Filtering

192. Android-Based Liveness Detection for Access Control in Smart Homes

193. Anti-spoofing Methods for Automatic Speaker Verification System

194. Aspects of Time Distribution

196. Detection and Mitigation of Spoofing Attacks by Using SDN in LAN

197. A Mechanism to Authenticate Caller ID

198. By Clicking Submit Button, You will Lose Your Privacy and Control Over Your Personal Information

199. Biometric Counter-Spoofing for Mobile Devices Using Gaze Information

200. Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications

Catalog

Books, media, physical & digital resources