Search

Your search keyword '"spoofing"' showing total 975 results

Search Constraints

Start Over You searched for: Descriptor "spoofing" Remove constraint Descriptor: "spoofing"
975 results on '"spoofing"'

Search Results

4. Experimental Assessment of OSNMA-Enabled GNSS Positioning in Interference-Affected RF Environments.

5. Advancements and challenges in fingerprint presentation attack detection: a systematic literature review.

6. Automation of 5G network slicing security using intent-based networking.

7. Detection of Access Point Spoofing in the Wi-Fi Fingerprinting Based Positioning.

8. Investigating Threats Posed by SMS Origin Spoofing to IoT Devices.

9. Russian business in the context of the growth of cybercrime: changes in economic behavior and protective mechanisms

10. High-frequency trading, spoofing and conflicting epistemic regimes: Accounting for market abuse in the age of algorithms.

11. Survey on 5G Physical Layer Security Threats and Countermeasures.

13. Securing IPv6 Neighbor Discovery Address Resolution with Voucher-Based Addressing.

14. Securing IPv6 Neighbor Discovery Address Resolution with Voucher-Based Addressing

15. Intelligent mitigation of GPS spoofing using the Kalman filter in the tracking loop based on multi-correlator.

16. Deep insights on processing strata, features and detectors for fingerprint and iris liveness detection techniques.

17. Recent Advances on Jamming and Spoofing Detection in GNSS.

19. Cybersecurity of the Unmanned Marine Vehicles in the Conditions of Partial or Complete Interruption Multi-GNSS Signals by Jamming and/or Spoofing

21. Revealing the Criteria for Detecting the Spoofing and Premediated Interference of GNSS Signals Using the Experimental Simulation Model

23. Anti-Spoofing System for Face Detection Using Convolutional Neural Network

24. Evaluation of The Effect of Spoofing on Dual-Frequency Global Navigation Satellite System (GNSS)

25. Jamming and Spoofing Techniques for Drone Neutralization: An Experimental Study

29. 卫星导航欺骗干扰检测与抑制技术综述.

30. Dual Spectral Attention Model for Iris Presentation Attack Detection.

31. A statistical method of GPS spoofing detection using power spectral density for hardware.

32. Disaster, facial recognition technology, and the problem of the corpse.

33. A new face presentation attack detection method based on face-weighted multi-color multi-level texture features.

34. Demonstrating Spoofability of an Originating Number when Sending an SMS using SMPP.

35. Evaluation of The Effect of Spoofing on Dual-Frequency Global Navigation Satellite System (GNSS).

36. Attack Taxonomy Methodology Applied to Web Services

37. Novel Approach for Intrusion Detection Attacks on Small Drones Using ConvLSTM Model

38. A framework for preventing unauthorized drone intrusions through radar detection and GPS spoofing

39. GNSS Radio Frequency Interference Monitoring from LEO Satellites: An In-Laboratory Prototype.

40. Spoof, Bluff, Go For It: A Defence of Spoofing.

41. RĂZBOIUL ELECTRONIC – UN DRAGON TREZIT LA VIAŢĂ.

42. A Method for Deepfake Detection Using Convolutional Neural Networks.

43. Phishing Attack Detection Using Machine Learning

44. Social Media Account Hacking Using Kali Linux-Based Tool BeEF

45. Multi-order Replay Attack Detection Using Enhanced Feature Extraction and Deep Learning Classification

46. Analysis and Rendering of Deauthentication Attack Using IoT Technology

49. A Study Regarding the Impact of Navigation Data Manipulation on Unmanned Aerial Vehicle GNSS Sensors.

50. S-TrackS: A Secure Snapshot-Based Solution for Positioning and Timing †.

Catalog

Books, media, physical & digital resources