نتایج جستجو برای: spoofing order

تعداد نتایج: 910816  

Journal: :IEEE Trans. Information Forensics and Security 2015
Aleksandr Sizov Elie el Khoury Tomi Kinnunen Zhizheng Wu Sébastien Marcel

Any biometric recognizer is vulnerable to spoofing attacks and hence voice biometric, also called automatic speaker verification (ASV), is no exception; replay, synthesis and conversion attacks all provoke false acceptances unless countermeasures are used. We focus on voice conversion (VC) attacks considered as one of the most challenging for modern recognition systems. To detect spoofing, most...

2015
Mirjam Wester Zhizheng Wu Junichi Yamagishi

How well do humans detect spoofing attacks directed at automatic speaker verification systems? This paper investigates the performance of humans at detecting spoofing attacks from speech synthesis and voice conversion systems. Two speaker verification tasks, in which the speakers were either humans or machines, were also conducted. The three tasks were carried out with two types of data: wideba...

2005
Fanglu Guo Tzi-cker Chiueh

The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that exploit vulnerabilities at the IP layer or above can be readily addressed by intrusion detection systems designed for wired networks. However, attacks exploiting linklayer protocol vulnerabilities require a different set of intrusi...

2013
D. McPherson

The Source Address Validation Improvement (SAVI) effort aims to complement ingress filtering with finer-grained, standardized IP source address validation. This document describes threats enabled by IP source address spoofing both in the global and finer-grained context, describes currently available solutions and challenges, and provides a starting point analysis for finer-grained (host granul...

2013
D. McPherson

The Source Address Validation Improvement (SAVI) effort aims to complement ingress filtering with finer-grained, standardized IP source address validation. This document describes threats enabled by IP source address spoofing both in the global and finer-grained context, describes currently available solutions and challenges, and provides a starting point analysis for finer-grained (host granul...

2017
Olegs Nikisins Amir Mohammadi André Anjos

While face recognition systems got a significant boost in terms of recognition performance in recent years, they are known to be vulnerable to presentation attacks. Up to date, most of the research in the field of face anti-spoofing or presentation attack detection was considered as a two-class classification task: features of bona-fide samples versus features coming from spoofing attempts. The...

2003
Austin Godber Partha Dasgupta

Wired networks are prone to the same attacks as wireless ones, including sniffing, spoofing and Man-in-the-middle attacks (MITM). In this paper we show how wireless networks are particularly vulnerable to a simple MITM that can make even rudimentary web surfing dangerous. We describe how we performed the attack and its ramifications. We argue why it is essential to have a VPN tunnel from the cl...

Journal: :IJITEE (International Journal of Information Technology and Electrical Engineering) 2021

The biometric system is a security technology that uses information based on living person's characteristics to verify or recognize the identity, such as facial recognition. Face recognition has numerous applications in real world, access control and surveillance. But face issue of spoofing. A anti-spoofing, task prevent fake authorization by breaching systems using photo, video, mask, differen...

Journal: :J. High Speed Networks 1996
Isabelle Chrisment Christian Huitema

The lack of exibility and eeciency of the traditional layered model has led researchers to consider new approaches when designing communication subsystems. In particular, one approach consists of implementing protocol subsystems tailored to application requirements. The Application Level Framing concept in which the communication subsystem is able to process data in chunks of application-specii...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید