Search

Your search keyword '"spoofing"' showing total 79 results

Search Constraints

Start Over You searched for: Descriptor "spoofing" Remove constraint Descriptor: "spoofing" Topic computer science Remove constraint Topic: computer science
79 results on '"spoofing"'

Search Results

1. Impact of Spoofing of Navigation Systems on Maritime Situational Awareness

2. Global positioning system spoofing detection based on Support Vector Machines

3. RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach

4. Fingerprint Recognition With Embedded Presentation Attacks Detection: Are We Ready?

5. Spoofing in aviation: Security threats on GPS and ADS-B systems

6. Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks.

7. Deteksi Spoofing Wajah Menggunakan Faster R-CNN dengan Arsitektur Resnet50 pada Video

8. Spatial GNSS Spoofing Against Drone Swarms With Multiple Antennas and Wiener Filter

9. Spoofing and Anti-Spoofing Technologies of Global Navigation Satellite System: A Survey

10. PPP/PPP-RTK Message Authentication

11. Vascular Auscultation of Carotid Artery: Towards Biometric Identification and Verification of Individuals

12. Location Security under Reference Signals’ Spoofing Attacks: Threat Model and Bounds

13. ADS-B Crowd-Sensor Network and Two-Step Kalman Filter for GNSS and ADS-B Cyber-Attack Detection

14. AIS Data Vulnerability Indicated by a Spoofing Case-Study

15. Synchronization of Critical Infrastructures Dependent Upon GNSS: Current Vulnerabilities and Protection Provided by New Signals

16. An Inherent Limitative Parameter in Spoofing GNSS-Based Navigation Clients

17. Let Us Prepare the Officer of the Watch on Jamming and Spoofing

18. A Survey of Spoofer Detection Techniques via Radio Frequency Fingerprinting with Focus on the GNSS Pre-Correlation Sampled Data

19. Satellite-derived Time for Enhanced Telecom Networks Synchronization: the ROOT Project

20. Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal

21. Collaborative Solutions for Interference Management in GNSS-Based Aircraft Navigation

22. Spoofing Detection by Distortion of the Correlation Function

23. Use of Supervised Machine Learning for GNSS Signal Spoofing Detection with Validation on Real-World Meaconing and Spoofing Data—Part II †

24. Adaptive Spoofing Suppression Algorithm for GNSS Based on Multiple Antennas Array

25. Dynamic fingerprint statistics: Application in presentation attack detection

26. Statistical test for GNSS spoofing attack detection by using multiple receivers on a rigid body

27. Краткий анализ уязвимостей GNSS и LNSS с акцентом на спуфинг морских надводных и подводных автономных аппаратов

28. Development of a GPS spoofing apparatus to attack a DJI Matrice 100 Quadcopter

29. Development of Array Receivers with Anti-Jamming and Anti-Spoofing Capabilities with Help of Multi-Antenna GNSS Signal Simulators

30. Understanding the Vulnerabilities in Digital Components of An Integrated Bridge System (IBS)

31. ASVspoof 2019: Future Horizons in Spoofed and Fake Audio Detection

32. GNSS Navigation Threats Management on-Board of Aircraft

33. Voice Mimicry Attacks Assisted by Automatic Speaker Verification

34. Vulnerability Analysis of GPS Receiver Software

35. Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection

36. Phonespoof: A New Dataset for Spoofing Attack Detection in Telephone Channel

37. Increasing International Civil Aviation Resilience: A Proposal for Nomenclature, Categorization and Treatment of New Interference Threats

38. GNSS and LNSS Positioning of Unmanned Transport Systems: The Brief Classification of Terrorist Attacks on USVs and UUVs

39. A Self-Diagnosis Method for Detecting UAV Cyber Attacks Based on Analysis of Parameter Changes

40. Computational Load Analysis of a Galileo OSNMA-Ready Receiver for ARM-Based Embedded Platforms

41. Multimodal Fingerprint Spoof Detection Using White Light

42. A Mobile Offloading Game Against Smart Attacks

43. Use of Supervised Machine Learning for GNSS Signal Spoofing Detection with Validation on Real-World Meaconing and Spoofing Data—Part I

44. Dependancy of power grids to satellite-derived time: vulnerabilities and new protections

45. Integrated Presentation Attack Detection and Automatic Speaker Verification: Common Features and Gaussian Back-end Fusion

46. Which GNSS tracking loop configuration is most robust against spoofing?

47. Entropy-Based Face Recognition and Spoof Detection for Security Applications

48. Spoofing Detection Using GNSS/INS/Odometer Coupling for Vehicular Navigation

49. Feature Set Fusion for Spoof Iris Detection

50. Susceptibility of GPS-Dependent Complex Systems to Spoofing

Catalog

Books, media, physical & digital resources