Search

Your search keyword '"spoofing"' showing total 919 results

Search Constraints

Start Over You searched for: Descriptor "spoofing" Remove constraint Descriptor: "spoofing"
919 results on '"spoofing"'

Search Results

101. A Survey of Network Attacks in Wireless Sensor Networks

104. Presentation Attacks in Mobile and Continuous Behavioral Biometric Systems

106. Extending CNN Classification Capabilities Using a Novel Feature to Image Transformation (FIT) Algorithm

107. Spoofed/Unintentional Fingerprint Detection Using Behavioral Biometric Features

108. Deep Learning Approach: Detection of Replay Attack in ASV Systems

109. STRIDE-Based Threat Modeling for MySQL Databases

110. Strategic Information Operation in YouTube: The Case of the White Helmets

112. RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach

113. Análise de ataques cibernéticos de jamming e spoofing em drones.

114. A Deep-Learning-Based GPS Signal Spoofing Detection Method for Small UAVs

115. A robust framework for spoofing detection in faces using deep learning.

116. Fingerprint liveness detection through fusion of pores perspiration and texture features.

117. An Application-Oriented Taxonomy on Spoofing, Disguise and Countermeasures in Speaker Recognition.

118. SISTEMELE DE NAVIGAÞIE CU SATELIÞI - O ÞINTÃ EVITATÃ? -.

119. SATELLITE NAVIGATION SYSTEMS – AN AVOIDED TARGET? –.

120. ARP Spoofing-Based MITM Attack in Data Link Layer Using the Hybrid Method-CONVLSTM-ECC.

121. Physical Layer Authentication Scheme in Beamspace MIMO Systems.

122. Dynamic differential annealing-based anti-spoofing model for fingerprint detection using CNN.

123. A New Strategy to Enhance the Security of GPS Location by PGP Algorithm in Smart Containers.

124. O SPOOFING NO MERCADO DE CAPITAIS BRASILEIRO: UMA PERSPECTIVA DE DIREITO E ECONOMIA.

125. Spoofing in aviation: Security threats on GPS and ADS-B systems

126. A framework for preventing unauthorized drone intrusions through radar detection and GPS spoofing.

127. Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias

128. Preparations for Galileo PRS in Poland

129. Wearing Someone Else's Face: Biometric Technologies, Anti-spoofing and the Fear of the Unknown.

130. Self-supervised 2D face presentation attack detection via temporal sequence sampling.

131. Spoofing Attacks on FMCW Radars with Low-Cost Backscatter Tags.

132. Securing the Automatic Identification System (AIS): Using public key cryptography to prevent spoofing whilst retaining backwards compatibility.

133. Intelligent audio analysis techniques for identification of music in smart devices.

134. Global positioning system spoofing detection based on Support Vector Machines.

135. Spoofing: Law, materiality and boundary work in futures trading.

136. Jamming and Spoofing Protection for ADS-B Mode S Receiver Through Array Signal Processing

137. Software-Defined Networking—Imposed Security Measures Over Vulnerable Threats and Attacks

138. Cyclostationarity Analysis of GPS Signals for Spoofing Detection

139. A Robust and Real-Time Face Anti-spoofing Method Based on Texture Feature Analysis

140. Light CNN Architecture Enhancement for Different Types Spoofing Attack Detection

141. Multiple Spoofer Detection for Mobile GNSS Receivers Using Statistical Tests

142. Spoofing in civil aviation: Security and safety of GPS/GNSS and ADS-B systems

145. Venti di guerra nello Spazio.

146. Challenges and opportunities in biometric security: A survey.

147. First results from three years of GNSS interference monitoring from low Earth orbit.

148. A Frequency-Domain Spoofing Attack on FMCW Radars and Its Mitigation Technique Based on a Hybrid-Chirp Waveform.

149. Deteksi Spoofing Wajah Menggunakan Faster R-CNN dengan Arsitektur Resnet50 pada Video

150. Statistical test for GNSS spoofing attack detection by using multiple receivers on a rigid body

Catalog

Books, media, physical & digital resources