نتایج جستجو برای: spoofing order

تعداد نتایج: 910816  

Journal: :J I M P - Jurnal Informatika Merdeka Pasuruan 2021

2015
Jesús Antonio Villalba López Antonio Miguel Alfonso Ortega Eduardo Lleida

Speaker verification systems have achieved great performance in recent times. However, we usually measure performance on a ideal scenarios with naive impostors that do not modify their voices to impersonate the target speakers. The fact of impersonating a legitimate user is known as spoofing attack. Recent works show the vulnerability of current speaker verification technology to several types ...

Journal: :Computer and Information Science 2012
Mahdi Hariri Shahriar B. Shokouhi

Nowadays biometric authentication systems have been more developed, especially in secure and financial systems; so cracking a biometric authentication system is now a growing concern. But their security has not received enough attention. Imitating a biometric trait of a genuine user to deceive a system, spoofing, is the most important attacking method. Multi biometric systems have been develope...

2014
Tin Htay Hlaing Yoshiki MIKAMI

With the development of new technologies, not only online contents but also domain names can be represented in local languages and this makes human society with better communication, better education and better business. Though domain names in some Asian languages such as Japanese, Indian languages, Sinhala and Urdu, are already implemented, not many works have been attempted on domain names in...

2014
T. Priya

Wireless spoofing attack is a combine physical and application level attacker, spoofing attack model first affected node compromised one node MAC address and group of node attack in wireless sensor network. So ireless spoofing attacks are easy to launch and can extensively impact the performance of network. In the new methodology there are three phases of work. First one is, to implement to rec...

Journal: :Symmetry 2017
Shun-Yi Wang Shih-Hung Yang Yon-Ping Chen Jyun-We Huang

Face recognition systems have been widely adopted for user authentication in security systems due to their simplicity and effectiveness. However, spoofing attacks, including printed photos, displayed photos, and replayed video attacks, are critical challenges to authentication, and these spoofing attacks allow malicious invaders to gain access to the system. This paper proposes two novel featur...

2011
Shashank Lagishetty Pruthvi Reddy Sabbu K. Srinathan

The usage of internet has increased in all fields of the globe and its size is increasing at a high rate. The network providers are not able to afford enough resources like computation power and bandwidth which are needed to maintain their quality of service. This inability is exploited by the attackers in the form of Denial of Service attacks (DoS) and Distributed Denial of Service attacks (DD...

2013
AMALA GRACY CHINNAPPAN JAYAKUMAR

Wireless networks are vulnerable to identity-based attacks, including spoofing attacks, significantly impact the performance of networks. Conventionally, ensuring the identity of the communicator and detecting an adversarial presence is performed via cryptographic authentication. Unfortunately, full-scale authentication is not always desirable as it requires key management, coupled with additio...

2015
Xiong Xiao Xiaohai Tian Steven Du Haihua Xu Chng Eng Siong Haizhou Li

Recent improvement in text-to-speech (TTS) and voice conversion (VC) techniques presents a threat to automatic speaker verification (ASV) systems. An attacker can use the TTS or VC systems to impersonate a target speaker’s voice. To overcome such a challenge, we study the detection of such synthetic speech (called spoofing speech) in this paper. We propose to use high dimensional magnitude and ...

2005
Vivek Ramachandran Sukumar Nandi

The Address Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for verifying the identity of the sender has a long history of being prone to spoofing attacks. ARP spoofing is sometimes the starting point for more sophisticated LAN attacks like denial of service, man in the middle and session hijacking. The current methods of detection use a passive approa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید